Analysis
-
max time kernel
94s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 05:32
Behavioral task
behavioral1
Sample
Exifer/Exifer/Exifer.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Exifer/Exifer/Exifer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Exifer/Exifer/Exifer.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Exifer/Exifer/Exifer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Exifer/Exifer/ExiferShellExt.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Exifer/Exifer/ExiferShellExt.dll
Resource
win10v2004-20241007-en
General
-
Target
Exifer/Exifer/ExiferShellExt.dll
-
Size
176KB
-
MD5
1b1dd283e9935cd00608741e21687719
-
SHA1
3ea13318bd5a4da9db2eab8893aae4881970f544
-
SHA256
d784baf22afc09627d552b633feabb3aba13d9e76025addb6b4de078511eee10
-
SHA512
cf6361d2a006be2a71278dac6539617602b030c618418a847cc8e600c57d804bd465c8e89eca92a0301452d5c7f629a828a55766a416d33f7bb3f589c04fffef
-
SSDEEP
3072:a0X1lJywHkirB4x/aO+llVyc/bz2AKrcGYrPEJnBosdjuWHOcut5lCCTp+oXpatF:RJf3uxSnHVyen2OrifjK5l43tK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\ContMenu\ = "{FCF608CF-5716-47C3-A1A8-991D873AF72B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ACDSee.JPG\shellex\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ACDSee.JPG\shellex\ContextMenuHandlers\ContMenu regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ACDSee.JPG\shellex\ContextMenuHandlers\ContMenu\ = "{FCF608CF-5716-47C3-A1A8-991D873AF72B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCF608CF-5716-47C3-A1A8-991D873AF72B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\ContMenu regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCF608CF-5716-47C3-A1A8-991D873AF72B}\ = "Delphi Context Menu Shell Extension Example" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ACDSee.JPG\shellex\ContextMenuHandlers regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCF608CF-5716-47C3-A1A8-991D873AF72B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ACDSee.JPG\shellex regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ACDSee.JPG\shellex\ContextMenuHandlers\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCF608CF-5716-47C3-A1A8-991D873AF72B}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCF608CF-5716-47C3-A1A8-991D873AF72B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Exifer\\Exifer\\ExiferShellExt.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ACDSee.JPG regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2680 wrote to memory of 3564 2680 regsvr32.exe 82 PID 2680 wrote to memory of 3564 2680 regsvr32.exe 82 PID 2680 wrote to memory of 3564 2680 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\Exifer\Exifer\ExiferShellExt.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\Exifer\Exifer\ExiferShellExt.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3564
-