Overview
overview
10Static
static
3app-0.89.2...rl.dll
windows7-x64
1app-0.89.2...rl.dll
windows10-2004-x64
1app-0.89.2...ll.exe
windows7-x64
6app-0.89.2...ll.exe
windows10-2004-x64
10app-0.89.2...pi.dll
windows7-x64
1app-0.89.2...pi.dll
windows10-2004-x64
1app-0.89.2...ll.exe
windows7-x64
6app-0.89.2...ll.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
app-0.89.2/app-0.89.2/libcurl.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
app-0.89.2/app-0.89.2/libcurl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
app-0.89.2/app-0.89.2/svrcderll.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
app-0.89.2/app-0.89.2/svrcderll.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
app-0.89.2/app-0.89.2/zlibwapi.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
app-0.89.2/app-0.89.2/zlibwapi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
app-0.89.2/svrcderll.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
app-0.89.2/svrcderll.exe
Resource
win10v2004-20241007-en
General
-
Target
app-0.89.2/svrcderll.exe
-
Size
586KB
-
MD5
f6f6ff4e9b359bc005a25fadb3a0aa61
-
SHA1
831fe06ce2015e2d66467d04f2d46ec3e96524d3
-
SHA256
6eb2a5f8ba7b7e2438a9608b7a2d5eefa1f8b66aaf7060c208678e47c3565324
-
SHA512
db29271f28a3bff4bd3f4073b522c662f70865cc1067e0de2c11ef284d8d88fe9ca165485da6fe52372bf3db33764f195853b883d8fdab1b502e960b0915da14
-
SSDEEP
6144:xc2XFRJ3DNuzAOS9FOU6CNmKQEiispigdlDAlZVl49q7r+:7FvYzU9QU6CNmKsPtdsXl49qX+
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1648 created 4872 1648 svrcderll.exe 111 -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: svrcderll.exe File opened (read-only) \??\V: svrcderll.exe File opened (read-only) \??\E: svrcderll.exe File opened (read-only) \??\H: svrcderll.exe File opened (read-only) \??\L: svrcderll.exe File opened (read-only) \??\O: svrcderll.exe File opened (read-only) \??\P: svrcderll.exe File opened (read-only) \??\S: svrcderll.exe File opened (read-only) \??\T: svrcderll.exe File opened (read-only) \??\Z: svrcderll.exe File opened (read-only) \??\B: svrcderll.exe File opened (read-only) \??\G: svrcderll.exe File opened (read-only) \??\K: svrcderll.exe File opened (read-only) \??\N: svrcderll.exe File opened (read-only) \??\R: svrcderll.exe File opened (read-only) \??\I: svrcderll.exe File opened (read-only) \??\J: svrcderll.exe File opened (read-only) \??\W: svrcderll.exe File opened (read-only) \??\X: svrcderll.exe File opened (read-only) \??\Y: svrcderll.exe File opened (read-only) \??\M: svrcderll.exe File opened (read-only) \??\U: svrcderll.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\pXuqFUIlyRpP\svrcderll.exe svrcderll.exe File opened for modification C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\zlibwapi.dll svrcderll.exe File created C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\libcurl.dll svrcderll.exe File opened for modification C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\libcurl.dll svrcderll.exe File created C:\Windows\pXuqFUIlyRpP\svrcderll.exe svrcderll.exe File created C:\Windows\pXuqFUIlyRpP\app-0.89.2\svrcderll.exe svrcderll.exe File opened for modification C:\Windows\pXuqFUIlyRpP\app-0.89.2\svrcderll.exe svrcderll.exe File created C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\svrcderll.exe svrcderll.exe File opened for modification C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\svrcderll.exe svrcderll.exe File created C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\B494DF77ED66BD6F9E2EC9A.3b6 svrcderll.exe File opened for modification C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\B494DF77ED66BD6F9E2EC9A.3b6 svrcderll.exe File created C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\zlibwapi.dll svrcderll.exe -
Executes dropped EXE 9 IoCs
pid Process 4460 svrcderll.exe 2748 svrcderll.exe 3692 svrcderll.exe 4300 svrcderll.exe 1648 svrcderll.exe 1368 svrcderll.exe 2096 svrcderll.exe 1064 svrcderll.exe 3868 svrcderll.exe -
Loads dropped DLL 10 IoCs
pid Process 3692 svrcderll.exe 3692 svrcderll.exe 4300 svrcderll.exe 4300 svrcderll.exe 1648 svrcderll.exe 1648 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 3868 svrcderll.exe 3868 svrcderll.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svrcderll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svrcderll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svrcderll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svrcderll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svrcderll.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svrcderll.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svrcderll.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4672 svrcderll.exe 4672 svrcderll.exe 4672 svrcderll.exe 4672 svrcderll.exe 4672 svrcderll.exe 4672 svrcderll.exe 4672 svrcderll.exe 4672 svrcderll.exe 4672 svrcderll.exe 4672 svrcderll.exe 4672 svrcderll.exe 4672 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 3692 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe 1368 svrcderll.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2536 wrote to memory of 4672 2536 svrcderll.exe 83 PID 2536 wrote to memory of 4672 2536 svrcderll.exe 83 PID 3268 wrote to memory of 4232 3268 cmd.exe 93 PID 3268 wrote to memory of 4232 3268 cmd.exe 93 PID 4460 wrote to memory of 2748 4460 svrcderll.exe 101 PID 4460 wrote to memory of 2748 4460 svrcderll.exe 101 PID 4460 wrote to memory of 2748 4460 svrcderll.exe 101 PID 2748 wrote to memory of 3692 2748 svrcderll.exe 102 PID 2748 wrote to memory of 3692 2748 svrcderll.exe 102 PID 4128 wrote to memory of 4300 4128 cmd.exe 106 PID 4128 wrote to memory of 4300 4128 cmd.exe 106 PID 3692 wrote to memory of 1648 3692 svrcderll.exe 108 PID 3692 wrote to memory of 1648 3692 svrcderll.exe 108 PID 1648 wrote to memory of 1368 1648 svrcderll.exe 112 PID 1648 wrote to memory of 1368 1648 svrcderll.exe 112 PID 2096 wrote to memory of 1064 2096 svrcderll.exe 116 PID 2096 wrote to memory of 1064 2096 svrcderll.exe 116 PID 2096 wrote to memory of 1064 2096 svrcderll.exe 116 PID 1064 wrote to memory of 3868 1064 svrcderll.exe 117 PID 1064 wrote to memory of 3868 1064 svrcderll.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\app-0.89.2\svrcderll.exe"C:\Users\Admin\AppData\Local\Temp\app-0.89.2\svrcderll.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\svrcderll.exe"C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\svrcderll.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Windows\system32\cmd.execmd /c start "" "C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\svrcderll.exe" 13820647f 4672 "C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\"1⤵
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\svrcderll.exe"C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\svrcderll.exe" 13820647f 4672 "C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\"2⤵
- Drops file in Windows directory
PID:4232
-
-
C:\Windows\pXuqFUIlyRpP\svrcderll.exe"C:\Windows\pXuqFUIlyRpP\svrcderll.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\pXuqFUIlyRpP\app-0.89.2\svrcderll.exe"C:\Windows\pXuqFUIlyRpP\app-0.89.2\svrcderll.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\svrcderll.exe"C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\svrcderll.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\svrcderll.exe"C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\svrcderll.exe" "b51a8a"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\system32\newdev.exeC:\Windows\system32\newdev.exe5⤵PID:2156
-
-
C:\Windows\system32\WinSAT.exeC:\Windows\system32\WinSAT.exe5⤵PID:4872
-
C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\svrcderll.exe"C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\svrcderll.exe" 6f985ec46131bfedeee86f510 16486⤵
- Enumerates connected drives
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /c start "" "C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\svrcderll.exe" e37180d57512f2324f8 4672 "C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\"1⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\svrcderll.exe"C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\svrcderll.exe" e37180d57512f2324f8 4672 "C:\Users\Admin\AppData\Local\Temp\app-0.89.2\app-0.89.2\"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4300
-
-
C:\Windows\pXuqFUIlyRpP\svrcderll.exeC:\Windows\pXuqFUIlyRpP\svrcderll.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\pXuqFUIlyRpP\app-0.89.2\svrcderll.exe"C:\Windows\pXuqFUIlyRpP\app-0.89.2\svrcderll.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\svrcderll.exe"C:\Windows\pXuqFUIlyRpP\app-0.89.2\app-0.89.2\svrcderll.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520B
MD50531cb240b76b170552d4626263bf22b
SHA1ecc171de96b7634dd29da8f594a13c9de5f38c79
SHA2567d9766ee40a041e4f59534436619f30a653184c21072a68fd8ad430296f05870
SHA5129ebae89321e162a5e9edbcb432ec2d2e93ade2830d7abf41325caf35637eff849d934638886cc3a8c1df1a92a71780f7864fb5b964cd35666e571b44f9985941
-
Filesize
12.3MB
MD58abd98831e34544fcbcd1a33f79b9617
SHA18b23bfa64eb0087983433cc3f85a5dd087bf4eca
SHA25695c2cfee008c27a4a9c7b10e759c3dd25480c882eee6f4f8f20aa4ccfc534bc1
SHA5122e26f26b636e10fa6d8c3a572ea76fc17e83572079b3906694fc53fa8d1ae3603e5fe314a7775d56607e8c2d14699b9d7e7817289563960a08c22f3d0ad04efe
-
Filesize
556KB
MD56b2548cc404f3dd55634efa291fa98d0
SHA1a076a60d99d70fd8aa7664a2534445a502febe27
SHA2567ae384b8695d7a9c2b6640927cb6ac592229aef9ebeeb80b91d556777c6dfb5d
SHA51214068e9e7d5f7e4494ffa75d369068234cdb050286d3356298e0387cf13d7681c0d68b57b6b299958c86ee3ae1dc3e54adc4c376e7b869d7d76fc2e91ed95009
-
Filesize
2.2MB
MD56cf29dbf1fa710cccf6ba1c4c01f6b85
SHA1a1debdb076c8c655e3d78c6ae82f1beba386a2ba
SHA256f85ce4492e1354f8310027c5f70ef73aae654fcd8fd9a58034e4f82a41a9826b
SHA512ebcc6599c33a80bb3e5c627a5f861fc9742d8558c4551544109288f80155885791a3f701af1aa7a4513cc5d121b77678a4cd46ca38a7bdd3cf7288e58e01f4f5
-
Filesize
324KB
MD5b75a201484fe177e6460c08a1f2be3ca
SHA144eedc44deb82c77e82483dadd0575915b47a4b7
SHA256fdd525739c5f4d55d3a65271c3389b34c79c236342ccedf31b34c539acea08d0
SHA512f922f1c5fc876a2fcc1c14d8c1665d2172dbd5fbea53e964e0229f07da449fbea72c9509a532f37c48dd1faec2df4271561191bfb9aa62495104f5828c69b07f
-
Filesize
586KB
MD5f6f6ff4e9b359bc005a25fadb3a0aa61
SHA1831fe06ce2015e2d66467d04f2d46ec3e96524d3
SHA2566eb2a5f8ba7b7e2438a9608b7a2d5eefa1f8b66aaf7060c208678e47c3565324
SHA512db29271f28a3bff4bd3f4073b522c662f70865cc1067e0de2c11ef284d8d88fe9ca165485da6fe52372bf3db33764f195853b883d8fdab1b502e960b0915da14