Overview
overview
10Static
static
3bin/NativeTrainer.dll
windows7-x64
3bin/NativeTrainer.dll
windows10-2004-x64
bin/ScriptHookV.dll
windows7-x64
3bin/ScriptHookV.dll
windows10-2004-x64
10bin/dinput8.dll
windows7-x64
7bin/dinput8.dll
windows10-2004-x64
7readme.vbs
windows7-x64
1readme.vbs
windows10-2004-x64
1www.dev-c.com.url
windows7-x64
6www.dev-c.com.url
windows10-2004-x64
3Analysis
-
max time kernel
1151s -
max time network
1157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
bin/NativeTrainer.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bin/NativeTrainer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
bin/ScriptHookV.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
bin/ScriptHookV.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
bin/dinput8.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
bin/dinput8.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
readme.vbs
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
readme.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
www.dev-c.com.url
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
www.dev-c.com.url
Resource
win10v2004-20241007-en
General
-
Target
bin/dinput8.dll
-
Size
128KB
-
MD5
c9b973183908a6631b31ca29f863b4d1
-
SHA1
6b32c09f1404be8f9eb21e6c1b8955f4bf00e51d
-
SHA256
9fd9e02353b7d39fe07b9667f7ea2697229a7f2d0e7d389eb79eb212b1bb181d
-
SHA512
aa63cfba16d5c134b7478fc27b32e4b1e588f5910205e050d94b59a15f95d886ecaa4c2d494c7c3496b2bb8f386e7a540ec999190714b6e048c6bc07d1a43755
-
SSDEEP
3072:OBK5kXMCQ9hTn7TYgESRbApwUEfo9c+SJwVvjPIB:8K5kXMl5TYgXR02UWPrJAjPI
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{25E609E5-B259-11CF-BFC7-444553540000} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{25E609E5-B259-11CF-BFC7-444553540000}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{25E609E4-B259-11CF-BFC7-444553540000} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{25E609E4-B259-11CF-BFC7-444553540000}\InProcServer32 regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4820 regsvr32.exe