Overview
overview
10Static
static
3UpdateV4.zip
windows7-x64
10UpdateV4.zip
windows10-2004-x64
7New_Update.zip
windows7-x64
7New_Update.zip
windows10-2004-x64
1ClientSDK/...es.rtf
windows7-x64
4ClientSDK/...es.rtf
windows10-2004-x64
1ClientSDK/...es.rtf
windows7-x64
4ClientSDK/...es.rtf
windows10-2004-x64
1ClientSDK/...NU.txt
windows7-x64
1ClientSDK/...NU.txt
windows10-2004-x64
1ClientSDK/...csql.h
windows7-x64
3ClientSDK/...csql.h
windows10-2004-x64
3ClientSDK/...17.lib
windows7-x64
3ClientSDK/...17.lib
windows10-2004-x64
3ClientSDK/...17.lib
windows7-x64
3ClientSDK/...17.lib
windows10-2004-x64
3DAC_DB/bin...ck.dll
windows7-x64
1DAC_DB/bin...ck.dll
windows10-2004-x64
1DAC_DB/bin...es.dll
windows7-x64
1DAC_DB/bin...es.dll
windows10-2004-x64
1DAC_DB/bin...es.dll
windows7-x64
1DAC_DB/bin...es.dll
windows10-2004-x64
1DAC_DB/bin...es.dll
windows7-x64
1DAC_DB/bin...es.dll
windows10-2004-x64
1DAC_DB/bin...es.dll
windows7-x64
1DAC_DB/bin...es.dll
windows10-2004-x64
1DAC_DB/bin...es.dll
windows7-x64
1DAC_DB/bin...es.dll
windows10-2004-x64
1DAC_DB/bin...es.dll
windows7-x64
1DAC_DB/bin...es.dll
windows10-2004-x64
1DAC_DB/bin...es.dll
windows7-x64
1DAC_DB/bin...es.dll
windows10-2004-x64
1Analysis
-
max time kernel
559s -
max time network
547s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 04:50
Static task
static1
Behavioral task
behavioral1
Sample
UpdateV4.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
UpdateV4.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
New_Update.zip
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
New_Update.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ClientSDK/90/Shared/Resources/1028/License_SysClrTypes.rtf
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
ClientSDK/90/Shared/Resources/1028/License_SysClrTypes.rtf
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
ClientSDK/90/Shared/Resources/1031/License_SysClrTypes.rtf
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ClientSDK/90/Shared/Resources/1031/License_SysClrTypes.rtf
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ClientSDK/ODBC_sdk/170/License Terms/License_msodbcsql_ENU.txt
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ClientSDK/ODBC_sdk/170/License Terms/License_msodbcsql_ENU.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ClientSDK/ODBC_sdk/170/SDK/Include/msodbcsql.h
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
ClientSDK/ODBC_sdk/170/SDK/Include/msodbcsql.h
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
ClientSDK/ODBC_sdk/170/SDK/Lib/x64/msodbcsql17.lib
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
ClientSDK/ODBC_sdk/170/SDK/Lib/x64/msodbcsql17.lib
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
ClientSDK/ODBC_sdk/170/SDK/Lib/x86/msodbcsql17.lib
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
ClientSDK/ODBC_sdk/170/SDK/Lib/x86/msodbcsql17.lib
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
DAC_DB/bin/1036/DacUnpack.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
DAC_DB/bin/1036/DacUnpack.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
DAC_DB/bin/de/Microsoft.Data.Tools.Utilities.resources.dll
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
DAC_DB/bin/de/Microsoft.Data.Tools.Utilities.resources.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
DAC_DB/bin/fr/Microsoft.Data.Tools.Schema.Sql.resources.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
DAC_DB/bin/fr/Microsoft.Data.Tools.Schema.Sql.resources.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
DAC_DB/bin/fr/SqlPackage.resources.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
DAC_DB/bin/fr/SqlPackage.resources.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
DAC_DB/bin/it/DacUnpack.Resources.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
DAC_DB/bin/it/DacUnpack.Resources.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
DAC_DB/bin/it/Microsoft.Data.Tools.Schema.Sql.resources.dll
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
DAC_DB/bin/it/Microsoft.Data.Tools.Schema.Sql.resources.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
DAC_DB/bin/ja/Microsoft.Data.Tools.Schema.Sql.resources.dll
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
DAC_DB/bin/ja/Microsoft.Data.Tools.Schema.Sql.resources.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
DAC_DB/bin/ja/Microsoft.Data.Tools.Utilities.resources.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
DAC_DB/bin/ja/Microsoft.Data.Tools.Utilities.resources.dll
Resource
win10v2004-20241007-en
General
-
Target
UpdateV4.zip
-
Size
175.2MB
-
MD5
bf3b4184c09f57a735a28200e974f861
-
SHA1
1184d6af33e3a7da4e49c40999bb643042c6dc4c
-
SHA256
da485f602448b5e9d1aeb7fffb94fb5515bb319476ecb6c9e159cef8d96bb46a
-
SHA512
ba403e78816e3bd109199490d7e7c1406810989d762055587f64c35ab50cc561c930d49210bd3e19f035af32077711b05f040ae49938749792c0578fdd603df8
-
SSDEEP
3145728:iEZR9BCohjY/J2JCiC2ZKbKIsFfsfgSwkJf7jLrjWKrpbT9XmT4BCohjY/J2JCiL:iEZR5hjSJF2s25NsISxWKrZxwyhjSJFi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Solara.exepid Process 432 Solara.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 4720 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
taskmgr.exepid Process 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid Process 1004 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
7zFM.exetaskmgr.exe7zG.exe7zG.exedescription pid Process Token: SeRestorePrivilege 1004 7zFM.exe Token: 35 1004 7zFM.exe Token: SeSecurityPrivilege 1004 7zFM.exe Token: SeDebugPrivilege 3580 taskmgr.exe Token: SeSystemProfilePrivilege 3580 taskmgr.exe Token: SeCreateGlobalPrivilege 3580 taskmgr.exe Token: 33 3580 taskmgr.exe Token: SeIncBasePriorityPrivilege 3580 taskmgr.exe Token: SeRestorePrivilege 5092 7zG.exe Token: 35 5092 7zG.exe Token: SeSecurityPrivilege 5092 7zG.exe Token: SeSecurityPrivilege 5092 7zG.exe Token: SeRestorePrivilege 892 7zG.exe Token: 35 892 7zG.exe Token: SeSecurityPrivilege 892 7zG.exe Token: SeSecurityPrivilege 892 7zG.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
7zFM.exetaskmgr.exe7zG.exe7zG.exepid Process 1004 7zFM.exe 1004 7zFM.exe 1004 7zFM.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 5092 7zG.exe 892 7zG.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
taskmgr.exepid Process 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid Process 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE 4720 EXCEL.EXE
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\UpdateV4.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1004
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3580
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Documents\DenyUninstall.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4720
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2824
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\" -an -ai#7zMap16308:100:7zEvent83001⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5092
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\New_Update\" -spe -an -ai#7zMap4552:100:7zEvent110691⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:892
-
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"1⤵
- Executes dropped EXE
PID:432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD55e54cb9759d1a9416f51ac1e759bbccf
SHA11a033a7aae7c294967b1baba0b1e6673d4eeefc6
SHA256f7e5cae32e2ec2c35346954bfb0b7352f9a697c08586e52494a71ef00e40d948
SHA51232dcca4432ec0d2a8ad35fe555f201fef828b2f467a2b95417b42ff5b5149aee39d626d244bc295dca8a00cd81ef33a20f9e681dd47eb6ee47932d5d8dd2c664
-
Filesize
150KB
MD5423671a408eedd5e51f4d4f6a3de4589
SHA17a96a2c6e2381e78bdd152e3caef75146460f488
SHA256b62fab3be134e7765720c0eb579be5a65ae719771b1e39c14ac39958d554b90e
SHA5124e9aa8c9ff248d4ec86d79b8515dbe51fa30aa5b28124a2c1872270c30e7887c1d49c573116237f393c29ef431b97110212fdac9d3a27134b6effdc5d373c11c
-
Filesize
200KB
MD55fca59a96ad276ee95bc6ab297c3b374
SHA108cf8d5ddf77fb7b51e210a316b5f89b81acb514
SHA25619e4a2a8676a9f4a488d67f1f7e44bf8a013f0ab5c51d7a0d4911e4b2300e2d6
SHA51283dffee067f9b6e5349e3b3f4db469ff9e44028e1ccfbcea8b89d2ee3946b75c31aff4a2f04058e22cbf7afe663f650a105c14e1dd9ee096d4d026da0023ff56
-
Filesize
1KB
MD5e880d4f5587eb5d0aaa1b3e9b6a67df1
SHA1abdc8cdf87375d70b5c135930737c50021d2cf2c
SHA25693185d3e7a527c760f2e9b98704b8c93ae7a7e30ad52dfb21f1e1ea5238be7e2
SHA512e6a365b32a4294fc0b68b1a1e47af5a14e081e78eb3b5c1428477f596719ac46c957f514317d95a204ded340ec585126a8da5a8dede1fa02b2dc8e328e4c24ef
-
Filesize
13KB
MD5166a4eb063fbff4d85b7647b9b3819b0
SHA11738ea07615836656f9d5579e1de65a1a9fa6ca4
SHA256c51a51d4e3734765d1352dbf09511e49a2773b3d6bd9a704ee664fb8e3059e42
SHA512d178a00dd133698bc04c9d641c4c77cd6547c05e2fb4b81d9b86db53b12ee49def2496360eee2d8b84c7461adc1db8cc0f1632d6bd8938957fb34880e8df992f
-
Filesize
374KB
MD525656a196ed967bcd4b152a4073b8b44
SHA1a9b64b8a42c9da3243378f2a17a9ff8057154116
SHA25636c3e5efd0731ccf5ac9a341c488b4fd14c69747f5a3f6e4cd976a7c1288b3b0
SHA5123903556d2130a219e9795856a14eb28926e3b798eabfe96353300ccc1c11925aff2f417c9ca588f2ddd0df47d6a64517980a39752edade9ad725f6ee4aa16383
-
Filesize
346B
MD5018848bd432a23f3a9f63c8a50791c11
SHA1c6db9c489b01c5e75c1dfa768319574d6eb275f8
SHA25689ad860e7edcf615cc94fbe61be49b7cc0ec8c741a524b89db2e174220072587
SHA512627d2308e7a6d111bfa27f5d41f9ed965c8a18babebb02c3e81177e6c55c0242a098eb64befd8884a087a18f9ef5436ce5f21931330db50b7ab317ce5ac34f11
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD51ef0ffca0674cc3bbff66f8588f71a50
SHA137f4b1f88e0a0b9cb083d4ffe04112767dd3a14c
SHA2567c610db1821b4f12e84d810e8683fb8672229d840d1d5091ae21482ffdda73a8
SHA512fc3233fc4c843ef12351754ef4886f060e0ab7b4fb75425dd66618b292f26268b3c4debeb8477acef2835e51b8326c6fd2ce2e797cca9b4f606fb78a037331e3