Overview
overview
10Static
static
1yyy.zip
windows10-ltsc 2021-x64
1HTCTL32.dll
windows10-ltsc 2021-x64
3Logo.png
windows10-ltsc 2021-x64
7LogoBeta.png
windows10-ltsc 2021-x64
7LogoCanary.png
windows10-ltsc 2021-x64
7LogoDev.png
windows10-ltsc 2021-x64
7NSM.lic
windows10-ltsc 2021-x64
3NSM.ini
windows10-ltsc 2021-x64
1PCICHEK.dll
windows10-ltsc 2021-x64
3PCICL32.dll
windows10-ltsc 2021-x64
3TCCTL32.dll
windows10-ltsc 2021-x64
3cAlient32.ini
windows10-ltsc 2021-x64
1client32.exe
windows10-ltsc 2021-x64
10client32.ini
windows10-ltsc 2021-x64
1ie_to_edge_bho.dll
windows10-ltsc 2021-x64
3ie_to_edge_bho_64.dll
windows10-ltsc 2021-x64
1install_state.json
windows10-ltsc 2021-x64
3msvcr100.dll
windows10-ltsc 2021-x64
3nskbfltr.inf
windows10-ltsc 2021-x64
1nsm_vpro.ini
windows10-ltsc 2021-x64
1pcicapi.dll
windows10-ltsc 2021-x64
3remcmdstub.exe
windows10-ltsc 2021-x64
3temp/5B8FE...7493Es
windows10-ltsc 2021-x64
1temp/5F301...103ABs
windows10-ltsc 2021-x64
1temp/6D746...21E0Fs
windows10-ltsc 2021-x64
1temp/8C071...720F3s
windows10-ltsc 2021-x64
1temp/quit_2.ico
windows10-ltsc 2021-x64
3Resubmissions
04-12-2024 04:28
241204-e3ta3sxlep 104-12-2024 03:02
241204-djgmhatpdm 104-12-2024 02:46
241204-c9ep6axpg1 10Analysis
-
max time kernel
97s -
max time network
144s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04-12-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
yyy.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
HTCTL32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
Logo.png
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
LogoBeta.png
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
LogoCanary.png
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
LogoDev.png
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
NSM.lic
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
NSM.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
PCICHEK.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
PCICL32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
TCCTL32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
cAlient32.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
client32.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
client32.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
ie_to_edge_bho.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
ie_to_edge_bho_64.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
install_state.json
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
msvcr100.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
nskbfltr.inf
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
nsm_vpro.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
pcicapi.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
remcmdstub.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
temp/5B8FEB2AF817493Es
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
temp/5F3010ACA99103ABs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
temp/6D746DDFF1121E0Fs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
temp/8C071BA874B720F3s
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
temp/quit_2.ico
Resource
win10ltsc2021-20241023-en
General
-
Target
Logo.png
-
Size
27KB
-
MD5
7fd31ab02a460425b02424d88516e231
-
SHA1
69d6c2e823eb4a4b4714e3e454316cca6465ed9e
-
SHA256
d5ff2f45dd0e5cdc6fbffd3f5fa9098676d46f8aafd74d6d52d298231d6dc394
-
SHA512
c02b3a0b99d426ab2b37fd6a97b0f72624622d71af7f923e2057ca533b58cefb006f2562ea7554031fc5eaa779e748918ecf2029779e80a1b73332637c63bab8
-
SSDEEP
768:JpJTH80OiNAR+xnHYKHgHgOwy8B+Om0LOu6:JphLNO+nlx3N0/0LZ6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1361837696-2276465416-1936241636-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1361837696-2276465416-1936241636-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3836 mspaint.exe 3836 mspaint.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3836 mspaint.exe 3836 mspaint.exe 3836 mspaint.exe 3836 mspaint.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3836 2372 cmd.exe 81 PID 2372 wrote to memory of 3836 2372 cmd.exe 81
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Logo.png1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\Logo.png"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3836
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:5024