Analysis

  • max time kernel
    56s
  • max time network
    57s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2024 11:55

General

  • Target

    XMouseButtonControlSetup.2.20.5.exe

  • Size

    2.9MB

  • MD5

    2e9725bc1d71ad1b8006dfc5a2510f88

  • SHA1

    6e1f7d12881696944bf5e030a7d131b969de0c6c

  • SHA256

    2240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818

  • SHA512

    62bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39

  • SSDEEP

    49152:n65SJw48kZN+nCYk7c44+Y0hdwn4Km2A5aT/pVE0hYYajihV2Qso0SWMrboF:tfpeno4oY0QZm2dlNJsrHM4

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe
    "C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    PID:2756
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.highrez.co.uk/scripts/postinstall.asp?package=XMouse&major=2&minor=20&build=5&revision=0&platform=x64
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2152
  • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
    "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /Installed /notportable
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll

    Filesize

    1.0MB

    MD5

    d62a4279ebba19c9bf0037d4f7cbf0bc

    SHA1

    5257d9505cca6b75fe55dfdaf2ea83a7d2d28170

    SHA256

    c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0

    SHA512

    6895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6525274CBC2077D43D7D17A33C868C4F

    Filesize

    959B

    MD5

    d5e98140c51869fc462c8975620faa78

    SHA1

    07e032e020b72c3f192f0628a2593a19a70f069e

    SHA256

    5c58468d55f58e497e743982d2b50010b6d165374acf83a7d4a32db768c4408e

    SHA512

    9bd164cc4b9ef07386762d3775c6d9528b82d4a9dc508c3040104b8d41cfec52eb0b7e6f8dc47c5021ce2fe3ca542c4ae2b54fd02d76b0eabd9724484621a105

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6525274CBC2077D43D7D17A33C868C4F

    Filesize

    192B

    MD5

    cf234c4590f795d48a31f82e1e60bf30

    SHA1

    9a57f9d4df26ac222f7c9b1c2af5496e6a926072

    SHA256

    6caec7a3d7250fbd527006479926b8ff812f1f260ce0f1b8d2e6a808c399a36b

    SHA512

    624c06f98397dc8f112441be5017bf5091d1c8295365f6101750cf3bf01cb715d4d96b476bdd7aced23b6d1e0c06a6850da9dc771534d94e9d270b6525e99e66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2aab172c7d678ec098177b42c050759b

    SHA1

    337edf3bd7b7a4c00e9a2275d94439cbc644ff8f

    SHA256

    564dbc1d899525087eadafdf759d53ab59292207e5b718cbde62eeab93ba600b

    SHA512

    bbec8d686b5527bbd08d5e4ca571fadbb46e873b75eed45017b619822ecfd3663eaad04058480dece603b35671d4089f8c7b78c6b044ade0f9ff76a5b3880a5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1765919616b824c776d7905c2035500

    SHA1

    94faec085e2dffe1a4b9dac51114f43ee937c124

    SHA256

    2f536d789a2349d85b35edf2b87ccbd6910f9952e04b973c589315ef95dd8c54

    SHA512

    94acb6ee2000ed8715bfa75727ff57f1a6ce6db25437a228f6524782028d89efa04df927729756c484c2a3bb267e218d7e04ddc25d2be6bdb7d0f3942ed30801

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68c26d6ea32e255eafed69abfd77f024

    SHA1

    66643fd53375bad354fe3f05edea55f8e24520f6

    SHA256

    2c2dbbc231f44799df3bd4c27644729be94c12b5b932383c73723e3f1c4540ab

    SHA512

    e3c0d347b28ddc646989e1961eed5f42ce35ebd9f415f49c392708f936afd3c28305818ca23c6ea9fbbc4cfdaef67274aaa082da194c8a5c0e894ce8f4073386

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58ed3c5ae4c2fe3d843f3f8b2b8b385f

    SHA1

    f1faa06ba63636cb490d71adad2c0f9527327713

    SHA256

    7bd541fec4e69175717a2a514ce5c68defe5f8e9aaa5dba3e9198a817332aec8

    SHA512

    dcb6b4edf78a84dde20f7a23d223de6e75a43aaad07b8bc9a040e463e7e769b1a49def1c85c0fa78eb4cdea5ea76ef2c1e16dc04086e9bd4cbcd589cc37ac2be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e47eeeefef2c6007ca40f5a26712d8a4

    SHA1

    a98491b02633585dd23713c53f733b84c7df014f

    SHA256

    55a31c107c01a8e9805749bedd781dbeddc18fa313aca13da688e5ff714504fe

    SHA512

    5f17de1bb2335d3f03c703d75a8137583e8f75a5710a34e94f4cf3b459053fa1ce2537b74740d583650039f3b759bac6395aa6a6189118515a5168f9811a20d0

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\gsz3hkd\imagestore.dat

    Filesize

    3KB

    MD5

    3d51c16c6bdcbf287105506811334886

    SHA1

    96c7f21b202c9e164774fe90e247603b0f2e03fb

    SHA256

    61286e370f7850c4d760fda60e8d2eeeb336024423d60a152d23e812257f67a8

    SHA512

    c630988793a3629ba1a7cb9388ddb91c1e602c6db1058a311694057e9df45c7521f229813599908603b65512295745c5bc3008676e41c530d081ccda1465749c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8452S9S3\f[1].txt

    Filesize

    186KB

    MD5

    7fb833d4f979451b503be8575d293ccd

    SHA1

    2f56615a440b5ffd8bd745be93e1f24694e49fad

    SHA256

    dcf5152d9ef3bc2c130cead7da9c4be2dab080ca944a717701090292c0ecb74d

    SHA512

    026de70f5cb5dfa4ffc397673fbb070d30f94ee16b884f029f287c8d63df1d9024e5aa43b087cab78f21bbfa70ac6646fe54592d157c204f9ce49c6ca81b33ce

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\xmbc[1].ico

    Filesize

    3KB

    MD5

    1279bf31d9659ad2017369ec1b90473c

    SHA1

    0f21c5a8266c36af7909118899e1fa07590f2df8

    SHA256

    74e3162830413f502277c221381f07b34d77a155f5cbeca379e1a4ffc29af116

    SHA512

    18ab594628c7873c56a85cc748585a3422f06d3f3ad70e5d33e86bed8bb9595d43513960731db89820d89b2ed950b48d6b891dbda768164f968ab06f5a86c277

  • C:\Users\Admin\AppData\Local\Temp\CabC3DD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC3E0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nstEE47.tmp\ioSpecial.ini

    Filesize

    709B

    MD5

    063f6b3ae8d040428c406f0e146786e4

    SHA1

    84d9b3a24287d3f993de35d0c2444be3a391aeed

    SHA256

    cba8bd24c469c0842285817dd7e27452061a4cc7606437f9372f0b8047b9897c

    SHA512

    9dfcb068ff564093c2b77d14f108ca59e90f40216e48f2a7eac8791b64391f4bd8143c60db0eb7aa043cc3d2637594f5fb461535b38707f5f4aef2875bb850aa

  • C:\Users\Admin\AppData\Local\Temp\nstEE47.tmp\ioSpecial.ini

    Filesize

    726B

    MD5

    1a0006fb2d1d60647bbf3320734ef3a7

    SHA1

    9cdbf9e8cf80838145f32faa4ef8d6ee1d1d5e17

    SHA256

    a263d584e51426a7aaed402e6f246c8f4e4fa526f889ea0c361ca332cd4ceac9

    SHA512

    e1b49db6618a757fa379d3f5258294fee1d676c7b9b48dc11fdbe80c8180b7c7f9dc98417a6187634f72cef3a9c23297554632f2c605c2394caa6f6158622b61

  • C:\Users\Admin\AppData\Local\Temp\nstEE47.tmp\ioSpecial.ini

    Filesize

    765B

    MD5

    e722b9b277cddf6880985fb02f94a25a

    SHA1

    58cf99a36ad1752aea803055de41d23a7de56f66

    SHA256

    ed1c4f66a0ee36fb18043ed2f24c1eba779e0ae945909975a7d7350cf7d80d6c

    SHA512

    f7ba7bc2bb93d43f01e3a8b2a662d51ab4ad935557c53a48e275a80e0f88650a5658083459c643788e660f045cb09832f27c5f28e10826dd2aef77d6f3d4a2b5

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll

    Filesize

    364KB

    MD5

    80d5f32b3fc515402b9e1fe958dedf81

    SHA1

    a80ffd7907e0de2ee4e13c592b888fe00551b7e0

    SHA256

    0ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a

    SHA512

    1589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe

    Filesize

    1.7MB

    MD5

    bb632bc4c4414303c783a0153f6609f7

    SHA1

    eb16bf0d8ce0af4d72dff415741fd0d7aac3020e

    SHA256

    7cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8

    SHA512

    15b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\uninstaller.exe

    Filesize

    74KB

    MD5

    bfffc38fff05079b15a5317e279dc7a9

    SHA1

    0c18db954f11646d65d0300e58fefcd9ff7634de

    SHA256

    c4e59737ffd988ef4bc7a62e3316a470b1b09a9889f65908110fba3d7b1c6500

    SHA512

    d30220e024ac242285ea757006e7da3874e5f889951de226d48c372a6a8701b76d4a917134ecc1e72c6c3a8d43444762288e7134a25d837e9f43d972675c81d6

  • \Users\Admin\AppData\Local\Temp\nstEE47.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    d753362649aecd60ff434adf171a4e7f

    SHA1

    3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

    SHA256

    8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

    SHA512

    41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

  • \Users\Admin\AppData\Local\Temp\nstEE47.tmp\ShellExecAsUser.dll

    Filesize

    7KB

    MD5

    86a81b9ab7de83aa01024593a03d1872

    SHA1

    8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

    SHA256

    27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

    SHA512

    cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

  • \Users\Admin\AppData\Local\Temp\nstEE47.tmp\System.dll

    Filesize

    10KB

    MD5

    56a321bd011112ec5d8a32b2f6fd3231

    SHA1

    df20e3a35a1636de64df5290ae5e4e7572447f78

    SHA256

    bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

    SHA512

    5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

  • \Users\Admin\AppData\Local\Temp\nstEE47.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    f832e4279c8ff9029b94027803e10e1b

    SHA1

    134ff09f9c70999da35e73f57b70522dc817e681

    SHA256

    4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

    SHA512

    bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

  • memory/2756-232-0x0000000000830000-0x0000000000832000-memory.dmp

    Filesize

    8KB