Overview
overview
10Static
static
1yyy.zip
windows10-ltsc 2021-x64
1HTCTL32.dll
windows10-ltsc 2021-x64
3Logo.png
windows10-ltsc 2021-x64
7LogoBeta.png
windows10-ltsc 2021-x64
7LogoCanary.png
windows10-ltsc 2021-x64
7LogoDev.png
windows10-ltsc 2021-x64
7NSM.lic
windows10-ltsc 2021-x64
3NSM.ini
windows10-ltsc 2021-x64
1PCICHEK.dll
windows10-ltsc 2021-x64
3PCICL32.dll
windows10-ltsc 2021-x64
3TCCTL32.dll
windows10-ltsc 2021-x64
3cAlient32.ini
windows10-ltsc 2021-x64
1client32.exe
windows10-ltsc 2021-x64
10client32.ini
windows10-ltsc 2021-x64
1ie_to_edge_bho.dll
windows10-ltsc 2021-x64
3ie_to_edge_bho_64.dll
windows10-ltsc 2021-x64
1install_state.json
windows10-ltsc 2021-x64
3msvcr100.dll
windows10-ltsc 2021-x64
3nskbfltr.inf
windows10-ltsc 2021-x64
1nsm_vpro.ini
windows10-ltsc 2021-x64
1pcicapi.dll
windows10-ltsc 2021-x64
3remcmdstub.exe
windows10-ltsc 2021-x64
3temp/5B8FE...7493Es
windows10-ltsc 2021-x64
1temp/5F301...103ABs
windows10-ltsc 2021-x64
1temp/6D746...21E0Fs
windows10-ltsc 2021-x64
1temp/8C071...720F3s
windows10-ltsc 2021-x64
1temp/quit_2.ico
windows10-ltsc 2021-x64
3Resubmissions
04-12-2024 04:28
241204-e3ta3sxlep 104-12-2024 03:02
241204-djgmhatpdm 104-12-2024 02:46
241204-c9ep6axpg1 10Analysis
-
max time kernel
94s -
max time network
140s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04-12-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
yyy.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
HTCTL32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
Logo.png
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
LogoBeta.png
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
LogoCanary.png
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
LogoDev.png
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
NSM.lic
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
NSM.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
PCICHEK.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
PCICL32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
TCCTL32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
cAlient32.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
client32.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
client32.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
ie_to_edge_bho.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
ie_to_edge_bho_64.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
install_state.json
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
msvcr100.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
nskbfltr.inf
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
nsm_vpro.ini
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
pcicapi.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
remcmdstub.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
temp/5B8FEB2AF817493Es
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
temp/5F3010ACA99103ABs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
temp/6D746DDFF1121E0Fs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
temp/8C071BA874B720F3s
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
temp/quit_2.ico
Resource
win10ltsc2021-20241023-en
General
-
Target
LogoCanary.png
-
Size
27KB
-
MD5
ef8a81d1e1070f20ce809cca75588612
-
SHA1
2eb8ca5797859d8f6642878215f5a89887964f1c
-
SHA256
6f2f599bc3e34e11072ce7ddbab2d484371563f0bc79de785df075db5e17ae1b
-
SHA512
7e94a94b30ce3657d6fd0f4f6078e01c655e13a0b8bce4b0331eb7d50ff2639dad578c059ea5804aa60cd0f7bf181f46cfc9e5a7755405769139065b7bc2b444
-
SSDEEP
384:ZbN1yJ4veZSqzz3j9THvHCbH+vZM+WP6LwYq4vRQyd5nRTl/XjtSRRUnbKYVbKmI:ZbNa4S9lrfZM+Gmj7nR5/XPnbFVbZ2V
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
mspaint.exepid Process 5868 mspaint.exe 5868 mspaint.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
mspaint.exepid Process 5868 mspaint.exe 5868 mspaint.exe 5868 mspaint.exe 5868 mspaint.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid Process procid_target PID 1736 wrote to memory of 5868 1736 cmd.exe 82 PID 1736 wrote to memory of 5868 1736 cmd.exe 82
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\LogoCanary.png1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\LogoCanary.png"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5868
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:732