Overview
overview
10Static
static
3app-0.89.2...rl.dll
windows7-x64
1app-0.89.2...rl.dll
windows10-2004-x64
1app-0.89.2...ll.exe
windows7-x64
6app-0.89.2...ll.exe
windows10-2004-x64
10app-0.89.2...pi.dll
windows7-x64
1app-0.89.2...pi.dll
windows10-2004-x64
1app-0.89.2...ll.exe
windows7-x64
6app-0.89.2...ll.exe
windows10-2004-x64
10Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
app-0.89.2/app-0.89.2/libcurl.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
app-0.89.2/app-0.89.2/libcurl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
app-0.89.2/app-0.89.2/svrcderll.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
app-0.89.2/app-0.89.2/svrcderll.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
app-0.89.2/app-0.89.2/zlibwapi.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
app-0.89.2/app-0.89.2/zlibwapi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
app-0.89.2/svrcderll.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
app-0.89.2/svrcderll.exe
Resource
win10v2004-20241007-en
General
-
Target
app-0.89.2/app-0.89.2/svrcderll.exe
-
Size
2.2MB
-
MD5
6cf29dbf1fa710cccf6ba1c4c01f6b85
-
SHA1
a1debdb076c8c655e3d78c6ae82f1beba386a2ba
-
SHA256
f85ce4492e1354f8310027c5f70ef73aae654fcd8fd9a58034e4f82a41a9826b
-
SHA512
ebcc6599c33a80bb3e5c627a5f861fc9742d8558c4551544109288f80155885791a3f701af1aa7a4513cc5d121b77678a4cd46ca38a7bdd3cf7288e58e01f4f5
-
SSDEEP
24576:GmKWcYmmUMlLklbOEyeeQaSpRnO9xGboTOLFI78hqT3tiBco21c6D5mHK+iwu7:Gm/mmUiLklb6e+YMDGaAhIt5o2WqmFXM
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: svrcderll.exe File opened (read-only) \??\O: svrcderll.exe File opened (read-only) \??\Q: svrcderll.exe File opened (read-only) \??\J: svrcderll.exe File opened (read-only) \??\K: svrcderll.exe File opened (read-only) \??\N: svrcderll.exe File opened (read-only) \??\V: svrcderll.exe File opened (read-only) \??\W: svrcderll.exe File opened (read-only) \??\B: svrcderll.exe File opened (read-only) \??\I: svrcderll.exe File opened (read-only) \??\L: svrcderll.exe File opened (read-only) \??\M: svrcderll.exe File opened (read-only) \??\P: svrcderll.exe File opened (read-only) \??\R: svrcderll.exe File opened (read-only) \??\T: svrcderll.exe File opened (read-only) \??\Y: svrcderll.exe File opened (read-only) \??\G: svrcderll.exe File opened (read-only) \??\H: svrcderll.exe File opened (read-only) \??\Z: svrcderll.exe File opened (read-only) \??\X: svrcderll.exe File opened (read-only) \??\E: svrcderll.exe File opened (read-only) \??\U: svrcderll.exe -
Deletes itself 1 IoCs
pid Process 1636 svrcderll.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\ZhJQZxErORYg\svrcderll.exe svrcderll.exe File opened for modification C:\Windows\ZhJQZxErORYg\app-0.89.2\svrcderll.exe svrcderll.exe File created C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\svrcderll.exe svrcderll.exe File opened for modification C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\svrcderll.exe svrcderll.exe File opened for modification C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\B494DF77ED66BD6F9E2EC9A.3b6 svrcderll.exe File opened for modification C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\libcurl.dll svrcderll.exe File opened for modification C:\Windows\ZhJQZxErORYg\svrcderll.exe svrcderll.exe File created C:\Windows\ZhJQZxErORYg\app-0.89.2\svrcderll.exe svrcderll.exe File created C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\B494DF77ED66BD6F9E2EC9A.3b6 svrcderll.exe File created C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\zlibwapi.dll svrcderll.exe File opened for modification C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\zlibwapi.dll svrcderll.exe File created C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\libcurl.dll svrcderll.exe -
Executes dropped EXE 8 IoCs
pid Process 2092 svrcderll.exe 1840 svrcderll.exe 1532 svrcderll.exe 1636 svrcderll.exe 1676 svrcderll.exe 936 svrcderll.exe 1364 svrcderll.exe 1140 svrcderll.exe -
Loads dropped DLL 10 IoCs
pid Process 2092 svrcderll.exe 1840 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1636 svrcderll.exe 1636 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1140 svrcderll.exe 1140 svrcderll.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svrcderll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svrcderll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svrcderll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svrcderll.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svrcderll.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svrcderll.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 2396 svrcderll.exe 2396 svrcderll.exe 2396 svrcderll.exe 2396 svrcderll.exe 2396 svrcderll.exe 2396 svrcderll.exe 2396 svrcderll.exe 2396 svrcderll.exe 2396 svrcderll.exe 2396 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1532 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe 1676 svrcderll.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2684 2760 cmd.exe 32 PID 2760 wrote to memory of 2684 2760 cmd.exe 32 PID 2760 wrote to memory of 2684 2760 cmd.exe 32 PID 2092 wrote to memory of 1840 2092 svrcderll.exe 34 PID 2092 wrote to memory of 1840 2092 svrcderll.exe 34 PID 2092 wrote to memory of 1840 2092 svrcderll.exe 34 PID 2092 wrote to memory of 1840 2092 svrcderll.exe 34 PID 1840 wrote to memory of 1532 1840 svrcderll.exe 35 PID 1840 wrote to memory of 1532 1840 svrcderll.exe 35 PID 1840 wrote to memory of 1532 1840 svrcderll.exe 35 PID 1840 wrote to memory of 1532 1840 svrcderll.exe 35 PID 2284 wrote to memory of 1636 2284 cmd.exe 37 PID 2284 wrote to memory of 1636 2284 cmd.exe 37 PID 2284 wrote to memory of 1636 2284 cmd.exe 37 PID 1532 wrote to memory of 1676 1532 svrcderll.exe 38 PID 1532 wrote to memory of 1676 1532 svrcderll.exe 38 PID 1532 wrote to memory of 1676 1532 svrcderll.exe 38 PID 2148 wrote to memory of 936 2148 taskeng.exe 40 PID 2148 wrote to memory of 936 2148 taskeng.exe 40 PID 2148 wrote to memory of 936 2148 taskeng.exe 40 PID 2148 wrote to memory of 936 2148 taskeng.exe 40 PID 936 wrote to memory of 1364 936 svrcderll.exe 41 PID 936 wrote to memory of 1364 936 svrcderll.exe 41 PID 936 wrote to memory of 1364 936 svrcderll.exe 41 PID 936 wrote to memory of 1364 936 svrcderll.exe 41 PID 1364 wrote to memory of 1140 1364 svrcderll.exe 42 PID 1364 wrote to memory of 1140 1364 svrcderll.exe 42 PID 1364 wrote to memory of 1140 1364 svrcderll.exe 42 PID 1364 wrote to memory of 1140 1364 svrcderll.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\svrcderll.exe"C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\svrcderll.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
C:\Windows\system32\cmd.execmd /c start "" "C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\svrcderll.exe" 13820647f 2396 "C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\"1⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\svrcderll.exe"C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\svrcderll.exe" 13820647f 2396 "C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\"2⤵
- Drops file in Windows directory
PID:2684
-
-
C:\Windows\ZhJQZxErORYg\svrcderll.exe"C:\Windows\ZhJQZxErORYg\svrcderll.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\ZhJQZxErORYg\app-0.89.2\svrcderll.exe"C:\Windows\ZhJQZxErORYg\app-0.89.2\svrcderll.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\svrcderll.exe"C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\svrcderll.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\svrcderll.exe"C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\svrcderll.exe" "6f985ec46131bfedeee86f510"4⤵
- Enumerates connected drives
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
-
-
C:\Windows\system32\cmd.execmd /c start "" "C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\svrcderll.exe" e37180d57512f2324f8 2396 "C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\"1⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\svrcderll.exe"C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\svrcderll.exe" e37180d57512f2324f8 2396 "C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
PID:1636
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A487114D-9DF3-4A3A-89C8-1A37A845689F} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\ZhJQZxErORYg\svrcderll.exeC:\Windows\ZhJQZxErORYg\svrcderll.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\ZhJQZxErORYg\app-0.89.2\svrcderll.exe"C:\Windows\ZhJQZxErORYg\app-0.89.2\svrcderll.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\svrcderll.exe"C:\Windows\ZhJQZxErORYg\app-0.89.2\app-0.89.2\svrcderll.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1140
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520B
MD53f10d2794b37fcb4be7442d58a55f01f
SHA1e975924d9c3bb028491043f24942f3ea2be8f9c2
SHA2567f5846cb140a09b70dec2ba520ab71e886763889c9d28ad695509bcd25270b1c
SHA51223b6ef22664b5403f95400a43f84cd7e5e43dbd05b433d362513a3741cbb81554677dbf2cbcaf6c74914ec0680bbb21a7140cce5b38c778befb01327311f1010
-
Filesize
12.3MB
MD58abd98831e34544fcbcd1a33f79b9617
SHA18b23bfa64eb0087983433cc3f85a5dd087bf4eca
SHA25695c2cfee008c27a4a9c7b10e759c3dd25480c882eee6f4f8f20aa4ccfc534bc1
SHA5122e26f26b636e10fa6d8c3a572ea76fc17e83572079b3906694fc53fa8d1ae3603e5fe314a7775d56607e8c2d14699b9d7e7817289563960a08c22f3d0ad04efe
-
Filesize
556KB
MD56b2548cc404f3dd55634efa291fa98d0
SHA1a076a60d99d70fd8aa7664a2534445a502febe27
SHA2567ae384b8695d7a9c2b6640927cb6ac592229aef9ebeeb80b91d556777c6dfb5d
SHA51214068e9e7d5f7e4494ffa75d369068234cdb050286d3356298e0387cf13d7681c0d68b57b6b299958c86ee3ae1dc3e54adc4c376e7b869d7d76fc2e91ed95009
-
Filesize
324KB
MD5b75a201484fe177e6460c08a1f2be3ca
SHA144eedc44deb82c77e82483dadd0575915b47a4b7
SHA256fdd525739c5f4d55d3a65271c3389b34c79c236342ccedf31b34c539acea08d0
SHA512f922f1c5fc876a2fcc1c14d8c1665d2172dbd5fbea53e964e0229f07da449fbea72c9509a532f37c48dd1faec2df4271561191bfb9aa62495104f5828c69b07f
-
Filesize
586KB
MD5f6f6ff4e9b359bc005a25fadb3a0aa61
SHA1831fe06ce2015e2d66467d04f2d46ec3e96524d3
SHA2566eb2a5f8ba7b7e2438a9608b7a2d5eefa1f8b66aaf7060c208678e47c3565324
SHA512db29271f28a3bff4bd3f4073b522c662f70865cc1067e0de2c11ef284d8d88fe9ca165485da6fe52372bf3db33764f195853b883d8fdab1b502e960b0915da14
-
Filesize
2.2MB
MD56cf29dbf1fa710cccf6ba1c4c01f6b85
SHA1a1debdb076c8c655e3d78c6ae82f1beba386a2ba
SHA256f85ce4492e1354f8310027c5f70ef73aae654fcd8fd9a58034e4f82a41a9826b
SHA512ebcc6599c33a80bb3e5c627a5f861fc9742d8558c4551544109288f80155885791a3f701af1aa7a4513cc5d121b77678a4cd46ca38a7bdd3cf7288e58e01f4f5