Overview
overview
10Static
static
1yyy.zip
windows10-ltsc 2021-x64
1HTCTL32.dll
windows10-ltsc 2021-x64
3Logo.png
windows10-ltsc 2021-x64
7LogoBeta.png
windows10-ltsc 2021-x64
7LogoCanary.png
windows10-ltsc 2021-x64
7LogoDev.png
windows10-ltsc 2021-x64
7NSM.lic
windows10-ltsc 2021-x64
3NSM.ini
windows10-ltsc 2021-x64
1PCICHEK.dll
windows10-ltsc 2021-x64
3PCICL32.dll
windows10-ltsc 2021-x64
3TCCTL32.dll
windows10-ltsc 2021-x64
3cAlient32.ini
windows10-ltsc 2021-x64
1client32.exe
windows10-ltsc 2021-x64
10client32.ini
windows10-ltsc 2021-x64
1ie_to_edge_bho.dll
windows10-ltsc 2021-x64
3ie_to_edge_bho_64.dll
windows10-ltsc 2021-x64
1install_state.json
windows10-ltsc 2021-x64
3msvcr100.dll
windows10-ltsc 2021-x64
3nskbfltr.inf
windows10-ltsc 2021-x64
1nsm_vpro.ini
windows10-ltsc 2021-x64
1pcicapi.dll
windows10-ltsc 2021-x64
3remcmdstub.exe
windows10-ltsc 2021-x64
3temp/5B8FE...7493Es
windows10-ltsc 2021-x64
1temp/5F301...103ABs
windows10-ltsc 2021-x64
1temp/6D746...21E0Fs
windows10-ltsc 2021-x64
1temp/8C071...720F3s
windows10-ltsc 2021-x64
1temp/quit_2.ico
windows10-ltsc 2021-x64
3Resubmissions
04-12-2024 04:28
241204-e3ta3sxlep 104-12-2024 03:02
241204-djgmhatpdm 104-12-2024 02:46
241204-c9ep6axpg1 10Analysis
-
max time kernel
98s -
max time network
155s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04-12-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
yyy.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
HTCTL32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
Logo.png
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
LogoBeta.png
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
LogoCanary.png
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
LogoDev.png
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
NSM.lic
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
NSM.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
PCICHEK.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
PCICL32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
TCCTL32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
cAlient32.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
client32.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
client32.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
ie_to_edge_bho.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
ie_to_edge_bho_64.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
install_state.json
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
msvcr100.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
nskbfltr.inf
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
nsm_vpro.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
pcicapi.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
remcmdstub.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
temp/5B8FEB2AF817493Es
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
temp/5F3010ACA99103ABs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
temp/6D746DDFF1121E0Fs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
temp/8C071BA874B720F3s
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
temp/quit_2.ico
Resource
win10ltsc2021-20241023-en
General
-
Target
LogoBeta.png
-
Size
23KB
-
MD5
550183b3229a2868fe3b6bfd87b2f526
-
SHA1
a90239bfb7562b868d4a60981c146ec4e12f98d1
-
SHA256
d172d5ce446919158db1c30a2dc2e215112ae6ec0611ddc3df99476cacf0f16d
-
SHA512
d3384c5e0d3a51f720b76eddf05dbe5e9de75cca821521a5ecef0ecdc3ee6a19f1584984aaee136c97afe5adac13e73dceab9e76174c7bad4b330b0f8756fff3
-
SSDEEP
384:9gKFm8g2PHDR3WylvbEB7XbcQCTJ5z1I1LEdJyfGB3jCLv6zSoHvA+ln8ew:95FF/vD8CakQCJXI1GJzjSISew
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-87863914-780023816-688321450-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-87863914-780023816-688321450-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid Process 1148 mspaint.exe 1148 mspaint.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
mspaint.exepid Process 1148 mspaint.exe 1148 mspaint.exe 1148 mspaint.exe 1148 mspaint.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid Process procid_target PID 2172 wrote to memory of 1148 2172 cmd.exe 82 PID 2172 wrote to memory of 1148 2172 cmd.exe 82
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\LogoBeta.png1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\LogoBeta.png"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1148
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4992