Analysis

  • max time kernel
    46s
  • max time network
    48s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23-12-2024 21:31

General

  • Target

    XMouse_Button_Control_V2.20.5.exe

  • Size

    2.9MB

  • MD5

    2e9725bc1d71ad1b8006dfc5a2510f88

  • SHA1

    6e1f7d12881696944bf5e030a7d131b969de0c6c

  • SHA256

    2240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818

  • SHA512

    62bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39

  • SSDEEP

    49152:n65SJw48kZN+nCYk7c44+Y0hdwn4Km2A5aT/pVE0hYYajihV2Qso0SWMrboF:tfpeno4oY0QZm2dlNJsrHM4

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 8 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 38 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XMouse_Button_Control_V2.20.5.exe
    "C:\Users\Admin\AppData\Local\Temp\XMouse_Button_Control_V2.20.5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    PID:4304
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.highrez.co.uk/scripts/postinstall.asp?package=XMouse&major=2&minor=20&build=5&revision=0&platform=x64
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffbea103cb8,0x7ffbea103cc8,0x7ffbea103cd8
      2⤵
        PID:4796
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,10728172122015563448,11404808868812387164,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:2
        2⤵
          PID:1688
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,10728172122015563448,11404808868812387164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1192
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,10728172122015563448,11404808868812387164,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:8
          2⤵
            PID:2528
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10728172122015563448,11404808868812387164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1
            2⤵
              PID:4764
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10728172122015563448,11404808868812387164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
              2⤵
                PID:2256
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,10728172122015563448,11404808868812387164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1364
            • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
              "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /Installed /notportable
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies system certificate store
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:5028
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:1764
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:5048
                • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                  "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                  1⤵
                  • Modifies registry class
                  • Suspicious use of SetWindowsHookEx
                  PID:2520
                • C:\Windows\system32\BackgroundTransferHost.exe
                  "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
                  1⤵
                  • Modifies registry class
                  PID:1568
                • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
                  "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /notportable
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:2832

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll

                  Filesize

                  364KB

                  MD5

                  80d5f32b3fc515402b9e1fe958dedf81

                  SHA1

                  a80ffd7907e0de2ee4e13c592b888fe00551b7e0

                  SHA256

                  0ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a

                  SHA512

                  1589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0

                • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe

                  Filesize

                  1.7MB

                  MD5

                  bb632bc4c4414303c783a0153f6609f7

                  SHA1

                  eb16bf0d8ce0af4d72dff415741fd0d7aac3020e

                  SHA256

                  7cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8

                  SHA512

                  15b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5

                • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll

                  Filesize

                  1.0MB

                  MD5

                  d62a4279ebba19c9bf0037d4f7cbf0bc

                  SHA1

                  5257d9505cca6b75fe55dfdaf2ea83a7d2d28170

                  SHA256

                  c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0

                  SHA512

                  6895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  02a4b762e84a74f9ee8a7d8ddd34fedb

                  SHA1

                  4a870e3bd7fd56235062789d780610f95e3b8785

                  SHA256

                  366e497233268d7cdf699242e4b2c7ecc1999d0a84e12744f5af2b638e9d86da

                  SHA512

                  19028c45f2e05a0cb32865a2554513c1536bf9da63512ff4e964c94a3e171f373493c7787d2d2a6df8012648bbefab63a9de924f119c50c39c727cf81bdc659f

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  826c7cac03e3ae47bfe2a7e50281605e

                  SHA1

                  100fbea3e078edec43db48c3312fbbf83f11fca0

                  SHA256

                  239b1d7cc6f76e1d1832b0587664f114f38a21539cb8548e25626ed5053ea2ab

                  SHA512

                  a82f3c817a6460fd8907a4ac6ab37c2129fb5466707edcfb565c255680d7f7212a5669fe2a42976150f16e4e549ea8310078f22ed35514ee1b7b45b46d8cc96e

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  5KB

                  MD5

                  cac43a292153d9b2ffa36f63b08215eb

                  SHA1

                  6f9225887cd025928edf17c8da94565a15fddb98

                  SHA256

                  0e9afe6c3fe08328fa34cf4359fecdb290b6bf2e189357ec95db5b87370abbf1

                  SHA512

                  9715200999dd1399163c1f7b88a33165a137bd77716762825dbba098d92f031145a4f4a2378d2beb9380eec631e5c6722165561c430ef84217e56c0cdc16dec2

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  5KB

                  MD5

                  202a5447382023ed28d016c7a2a59f0c

                  SHA1

                  56ed06f0a8816d3a0960f5373926d159cf68d14e

                  SHA256

                  884ba73a4f712c717d41a5cad1f12692654a322ba5dd4a44ce2fb4a1b7a67350

                  SHA512

                  865ddd3c06ed552eaae1fee2bb54decc87aa82bf4f0b43ed20f97aac20f553c9f74d427c484a04bfae6d98bad551545c7c3c3ea00bb0f95872af23e277aae1da

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  10KB

                  MD5

                  7a5bab52ce81569b995f013684ed2e64

                  SHA1

                  568beae29f9f2b3f96b05a1a1b2b46a053d21704

                  SHA256

                  030bfd1820efd484accb3dbaf6fdf4e38c7d2ec336d1bc4c7679a1bfa5e5d3ac

                  SHA512

                  afe966a6c0ec419ea3c7951c5ee4dd64d30e12203b58bcc0bc722501a9b334f5544de9214c3324219210dbc329d00de9be6ca8efa4bc36adfaae2215a3d39c5a

                • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\9311b31e-8c7d-44aa-8b16-cc2e4ea98e7f.down_data

                  Filesize

                  555KB

                  MD5

                  5683c0028832cae4ef93ca39c8ac5029

                  SHA1

                  248755e4e1db552e0b6f8651b04ca6d1b31a86fb

                  SHA256

                  855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

                  SHA512

                  aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

                • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                  Filesize

                  11KB

                  MD5

                  f47534c9afba84dec2f28aa7ac827a6f

                  SHA1

                  b80ab610ad2ba187fbc1cd9a811cd3fee554694f

                  SHA256

                  d947c9cdbee0f04953eb02ff0eb39b9158d06b70bf096b1f6b3b62b36cb981ef

                  SHA512

                  074f9d052a69e8d424abb245b84be7271597ad58bba9994f6f0c2906045260158aed32b7c6776ffd079cfb474d9f5593116ff081f9643399cdb16aee1ca05385

                • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                  Filesize

                  11KB

                  MD5

                  feae31d21ce38e8cd0816a87d228485a

                  SHA1

                  c5ce70aa98ddc20e5808dfb07e3835b51c35372e

                  SHA256

                  9275edeeaab9b0d4a904946c3a5e36f2526a0b5c8e7755ce658f03050df5e5da

                  SHA512

                  13503718a837b903e89ed6a31f7d9b7906e43c74ae3fb6389acb059ee84d080a3af47718c0a95f1468f4f212121e73ed9033470c5b59fb9d1f1fd14e5b95e5d0

                • C:\Users\Admin\AppData\Local\Temp\nsyB5E4.tmp\InstallOptions.dll

                  Filesize

                  14KB

                  MD5

                  d753362649aecd60ff434adf171a4e7f

                  SHA1

                  3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

                  SHA256

                  8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

                  SHA512

                  41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

                • C:\Users\Admin\AppData\Local\Temp\nsyB5E4.tmp\ShellExecAsUser.dll

                  Filesize

                  7KB

                  MD5

                  86a81b9ab7de83aa01024593a03d1872

                  SHA1

                  8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

                  SHA256

                  27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

                  SHA512

                  cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

                • C:\Users\Admin\AppData\Local\Temp\nsyB5E4.tmp\System.dll

                  Filesize

                  10KB

                  MD5

                  56a321bd011112ec5d8a32b2f6fd3231

                  SHA1

                  df20e3a35a1636de64df5290ae5e4e7572447f78

                  SHA256

                  bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

                  SHA512

                  5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

                • C:\Users\Admin\AppData\Local\Temp\nsyB5E4.tmp\ioSpecial.ini

                  Filesize

                  696B

                  MD5

                  239f1ab2554e44180dac3aaafb24c5aa

                  SHA1

                  dbe0a88415c66acc2b77c2c81024390b89199451

                  SHA256

                  822adb67f6aefff7453565f9b64fb9fc56b231641fbafbc8a8100d45b79b70b1

                  SHA512

                  40add84b974dc6bcb0f50dc1b9245d9911beb6d1697fe280112cad03f1b4e46f7d9f4364902c781a0a96df0de82b85faad49343883a05f2a7b519af564a397b8

                • C:\Users\Admin\AppData\Local\Temp\nsyB5E4.tmp\ioSpecial.ini

                  Filesize

                  709B

                  MD5

                  4f0fa35c98090f450333cb17227bf095

                  SHA1

                  3a1775695dd246131c4af04c6cba6e5f70fadf5e

                  SHA256

                  6260eca86978b6df23f4eb1d9569acfbaeabbda419dbf90580fd88956f7a5cde

                  SHA512

                  9c4d8996be1ad0cebb3dbd79f4cc20f0a6db68d11c6150bcd8e10715e39f44947c2ec2062b63929cb2e0a510f57d1701e76801efd356933d060e9e6814598dd7

                • C:\Users\Admin\AppData\Local\Temp\nsyB5E4.tmp\ioSpecial.ini

                  Filesize

                  765B

                  MD5

                  f059b79c428f408b5e4fd3e9e7d8ebb5

                  SHA1

                  4dd43b9e64084b492f20a5e7566223a22c08a3ac

                  SHA256

                  e8dd4339247d38f186262fa949635197eccf82319661d1483a4992f814690c2c

                  SHA512

                  ed684d5fe1d468b18d58d0c0ba48f078c013d6195df6de8b189a985c48553f073290626b4a19b4f0b49a93dac1d4df62d913fe8f71866d586a483585d799ca0e

                • C:\Users\Admin\AppData\Local\Temp\nsyB5E4.tmp\ioSpecial.ini

                  Filesize

                  765B

                  MD5

                  955ee14c5c2f19d6be22a01265eae88b

                  SHA1

                  0ac6702e4bed4b97610763230fc41ad831216e69

                  SHA256

                  7dc57667ad58e8aab13cad4c1f99bf0e25a5c8061d6bb1e8f9c1da3bfa25d6ab

                  SHA512

                  72366abc1ff6ec1beda6242f6170625a12f0ac3f2b58cb266a4eff1608c642f14bfa5724044cd4e88b98714ad0b11284d427f7bd9c2f8210638546091b520f99

                • C:\Users\Admin\AppData\Local\Temp\nsyB5E4.tmp\nsDialogs.dll

                  Filesize

                  9KB

                  MD5

                  f832e4279c8ff9029b94027803e10e1b

                  SHA1

                  134ff09f9c70999da35e73f57b70522dc817e681

                  SHA256

                  4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

                  SHA512

                  bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

                • C:\Users\Admin\AppData\Roaming\Highresolution Enterprises\XMouseButtonControl\XMouseButtonControl.log

                  Filesize

                  1KB

                  MD5

                  8e5894da0df54c2bbe65c9898fcffa94

                  SHA1

                  f81bf98deb527d048f7c2ce550f82817b9ed33dd

                  SHA256

                  81e0ebd7d919e8aa7b992493772b201212a4080b9fd3e763b8a6c16aef919dd2

                  SHA512

                  4a709ea20a7c15a5afdd5a73e3802ac8ed9a11e9a17863622e86caf5741e642ab039e20935d513aa39aec09ffbcd3d3b11da2df340a5c525a5ac404232690a7b