Overview
overview
10Static
static
10Paranoid C...FS.dll
windows7-x64
1Paranoid C...FS.dll
windows10-2004-x64
1Paranoid C...et.dll
windows7-x64
1Paranoid C...et.dll
windows10-2004-x64
1Paranoid C...se.dll
windows7-x64
1Paranoid C...se.dll
windows10-2004-x64
1Paranoid C...on.dll
windows7-x64
1Paranoid C...on.dll
windows10-2004-x64
1Paranoid C...pf.dll
windows7-x64
1Paranoid C...pf.dll
windows10-2004-x64
1Paranoid C....7.exe
windows7-x64
10Paranoid C....7.exe
windows10-2004-x64
10Paranoid C...el.dll
windows7-x64
1Paranoid C...el.dll
windows10-2004-x64
1Paranoid C...cs.dll
windows7-x64
1Paranoid C...cs.dll
windows10-2004-x64
3Paranoid C...ls.dll
windows7-x64
1Paranoid C...ls.dll
windows10-2004-x64
3Paranoid C...v2.dll
windows7-x64
1Paranoid C...v2.dll
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 12:56
Behavioral task
behavioral1
Sample
Paranoid Checker 4.1.7/AlphaFS.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Paranoid Checker 4.1.7/AlphaFS.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Paranoid Checker 4.1.7/Extreme.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Paranoid Checker 4.1.7/Extreme.Net.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Paranoid Checker 4.1.7/License.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Paranoid Checker 4.1.7/License.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Paranoid Checker 4.1.7/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Paranoid Checker 4.1.7/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Paranoid Checker 4.1.7/Ookii.Dialogs.Wpf.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Paranoid Checker 4.1.7/Ookii.Dialogs.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Paranoid Checker 4.1.7/Paranoid Checker 4.1.7.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Paranoid Checker 4.1.7/Paranoid Checker 4.1.7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Paranoid Checker 4.1.7/Pastel.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Paranoid Checker 4.1.7/Pastel.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Paranoid Checker 4.1.7/SMDiagnostics.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
Paranoid Checker 4.1.7/SMDiagnostics.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Paranoid Checker 4.1.7/System.ServiceModel.Internals.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Paranoid Checker 4.1.7/System.ServiceModel.Internals.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Paranoid Checker 4.1.7/libGLESv2.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Paranoid Checker 4.1.7/libGLESv2.dll
Resource
win10v2004-20241007-en
General
-
Target
Paranoid Checker 4.1.7/System.ServiceModel.Internals.dll
-
Size
804KB
-
MD5
bc3dbd339745e51c60dbd0a095eb50d5
-
SHA1
d90c71463ca0c55aa942bf71c308daed386bd8fa
-
SHA256
0be5890dee0dc8ccd1444781287dfeed46bbfbdbf4ee289e564ea98ea94e006d
-
SHA512
2894b4c55e868920945a45de1b5b1d6a3f5685049ad7e005b872be1fd7744b818137f4e153ff68c15911a77a6a757d20925aae28202b838741ca4e2945369263
-
SSDEEP
24576:uvdATaScs0gmCWtS4B9plalsmUdJFxtZVnL7CO2XO8mYv:uFATaScs0gzhbQYv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4088 wrote to memory of 3832 4088 rundll32.exe 83 PID 4088 wrote to memory of 3832 4088 rundll32.exe 83 PID 4088 wrote to memory of 3832 4088 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Paranoid Checker 4.1.7\System.ServiceModel.Internals.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Paranoid Checker 4.1.7\System.ServiceModel.Internals.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:3832
-