Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2025 18:42

General

  • Target

    x-mouse-button-control-2-20-5.exe

  • Size

    2.9MB

  • MD5

    2e9725bc1d71ad1b8006dfc5a2510f88

  • SHA1

    6e1f7d12881696944bf5e030a7d131b969de0c6c

  • SHA256

    2240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818

  • SHA512

    62bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39

  • SSDEEP

    49152:n65SJw48kZN+nCYk7c44+Y0hdwn4Km2A5aT/pVE0hYYajihV2Qso0SWMrboF:tfpeno4oY0QZm2dlNJsrHM4

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x-mouse-button-control-2-20-5.exe
    "C:\Users\Admin\AppData\Local\Temp\x-mouse-button-control-2-20-5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    PID:2680
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.highrez.co.uk/scripts/postinstall.asp?package=XMouse&major=2&minor=20&build=5&revision=0&platform=x64
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2976
  • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
    "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /Installed /notportable
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7174f1011f0c62bfe749ab73df7116db

    SHA1

    b04f9afe0232fd5ea56dd7514aacb4199cc97b8a

    SHA256

    b77901740527edf19403838946cedfaf28c7329b8178ae0854dfe9b508a40c44

    SHA512

    6ca4c034f1d98268d2ea6118da01c7d809cb9521ea198dcfb5455270112ffb2d6904bf0522f746e5e672d0af6c7d9b05e51f88f3be326bd55830dfccfe28f2dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5a4d63f28e586eed70a05932bc81e18

    SHA1

    eee2521662e9d3e9960f85df547865333add57a2

    SHA256

    b1a194206040062493eac6954f7ba90d58c932c90c52c717291948d92a594ea8

    SHA512

    2210de1bbd4d741159b9fc8ccf27b64767af2fa7c5c5411ee069b4c7b7b566a191056e92b393dcb34d4cecc2f6048dde276b854aa9fb92efc471d605e12eb42d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8343e78ea6afc9113248b77d4f3a6f20

    SHA1

    bd689a524aecdc3920ddbeb3a0558975ac9c6ec0

    SHA256

    3f210521908aa93c222c67741e35b7032f6611a54818312976744fc5f32401b7

    SHA512

    17b28260db64492dbcbef069867954bd37f549a95053da2d4475c5d158eaa99af5e1c038250670539ede92da1a2f18753af2b4fb953bbda69259692632f3de7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e889cfa3c92e16a33e98f31b816df71

    SHA1

    7db0bb01b8ce005a634b3610cfe6ca8ccff6fca7

    SHA256

    31ad18c14fd4a0781ebeb786f5381dc4e273382a0ad017db4e01fddb41a9816d

    SHA512

    6a1ea621f219bd918ecfa6658125c430770be5704685459467b7d736af47e772e97be51f2956df31a2dbddc2e656bca8cb6106cc58314edde60d0545f615e56b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    185083ac35319c03116291ce91e256fd

    SHA1

    95f9063fd85c37e47e79687d1319267a810a89b8

    SHA256

    2908952724bbcc2322826243f4fe4433eb96f97a87e27d0a33ec1e4f89827508

    SHA512

    2331da7bde14f334a27ed88bb67ba510398cd6a37918a024a3eecfe4c572cab267f264d551c9b9cd568c2529a3c3357336b31aced43242c8a872f129e1d1fdb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c852b567ed897d7ee78d8c3be7b82389

    SHA1

    e9be7aaf6780b3dadf2f0e5e73853856461c7b0a

    SHA256

    c2d7944933281371f145d5d89ff9ecc00497f0a230972f30c634c73b21cfabda

    SHA512

    f1cd6ad0c6c6c29ad737213f9bb66df97de73c62879a7f89d136e671a48b206068d53d95f08a49d21772da15fe591c4b17eda1d97a72b0643b3a66005c385770

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffb8a4239fd908cdc50035f61e0b4ffd

    SHA1

    cd5a4dd29a5b11789fd9b24604cca049c774a5a2

    SHA256

    a43b28284778f1cafddf336b3e17b300bd4af61fd0129748c309b94a2826b69b

    SHA512

    48d683f02935a356843a00bbc54564361bc14bd03ea0c85958c6b017977fade170670b2ae06ef03a145bf2fa738c512fafd8beba00f67da075a89024da9f031d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    035f763ea8e286aa5c32b55b40bda90e

    SHA1

    c671ba29f825c1410f497e3308543b8beeb6cf44

    SHA256

    13645d72093e575fba1c1441f1dc7b24de2174d1eaa93bee81eb5c9279b39843

    SHA512

    28ef1576a8949c940a4660d90f8f7f7c4cba287361e18a37bdc7acf8b79f64750e28a34be8b53bee67ce68226d7089b0cf519a67f6b757cceffc80b7bae7fee4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c26792975cc6e22718e6c41e73bf82cc

    SHA1

    42eb79e2568b708bdd0435bd2e74a0daccdaa3cb

    SHA256

    625c7221f7497232fd473f707ad506bc7b79e3a0b02d0146ee8a57421a77ba1c

    SHA512

    d7da35e20b25b37a008825c5589721ecd920afed17fa5d14d19e867d69f66144271cda666b32aad93908f580c6d7e3f4a214ef6d6a96a73ac503980b2ff1888d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0df29d0ae3a1ed8e482e5292f49a349

    SHA1

    05336655f9dfecbbf850f1cfbe8dc3baaf61ec88

    SHA256

    cd017707bce010d0f491ebf41d1f97db3ef190a3e5cc226a187ac6e17c4f5e51

    SHA512

    ee9abf8b4d04f2362a5bd7274527986aa46b6220d2fdc32ea0d681bb475af34789355f875eefe18697d7af49ee8ba22d717ffeb053fa6b64a347bb15aec82a46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    933c1eaac89ddafaad0eddccb5b09de3

    SHA1

    fd971b551560c325cd3cadeefaaef1edb495ee14

    SHA256

    8dba9042de8a2e91ed0131d90040e98ae3f059a0b419a6df041def6ad907ac9e

    SHA512

    8286f90e99e7f576edbc3f46fed7bc59bc28c57426cd186af757be2ec4720941b043a7ccad40190ee70a7528571d259ed6ab5772d947d1f131a0ee99d823e623

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19126608521fa2d061fccb56c6dab7bb

    SHA1

    de2bc210e055734d8e13eaa5841c627d31108cc4

    SHA256

    7275a0c6d65d3c90d8411376e895f0e95881102c9b9da0335db2c3af18aee041

    SHA512

    399cd61e5f96605d3fab1f29c373b71f4daaf5bf36d4dd2432806773a6cbe9a52d1ea99d0abfda953801b544912691b81b81ad812efb770be4b1e339a25ed0f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b342bc86f70045269fb7f3252a8ce59

    SHA1

    546c96fdbfdf1082a3966e469193c4dd5f1dd8cf

    SHA256

    8b869dc66d2f0e7b148a88a709e925d5a44223cfbf26066d948f2a216b154903

    SHA512

    59d68cebc0fa693fa8a3e795f561acf6e4d19610c1718d9d4e2fb872f48b0ac814fd0f1b65d8e01705f546bab305565f0dbd5efc9accb419b0ddafc5277b1b30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc6d812eeff8c294c141edf3268f3ef6

    SHA1

    90ca73534ad9e3add7a216e2af3481184c2ba746

    SHA256

    423d7769489793f4a23090e34690b8604107df6fea0785503a8e56b375b9fea7

    SHA512

    eb4989d56bf6b2072134dd1f624f8909523af1e119380c26268e676b163ff2270921352e8d839251b94e5315eda72b29f8a608efd3ca2e6e74ba15413f5dd016

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58ce70ed3b9782fcfdcdb82438b89650

    SHA1

    6f6d20446087291d498b3f2a7df3b1c1081a84be

    SHA256

    af252da0fa076ddfec08ee94d6f487554497842ef4e478592061d17788828da9

    SHA512

    f7a822d5b3fd400e5efbd12b6a7512d1c11c82a82118526e5eefb878bedef1d43ee6708e5e7e2785a6ed736015d86f495f7e645e0740a52090a16069f0894894

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    181bc07f1a3a554955941d2984869f0e

    SHA1

    bb728d019aa8435d8ec101ed1fbbb28ad16774d7

    SHA256

    9fb549d098cfcb0d6662766ba6801c5a23f90f7568b71353e0e73511700a75cc

    SHA512

    b2a0ad60c02bcf7605d2e258ab3edd7a318c3a76924b7ba460e5f153098150b8097f2fee7a5eabd6c43405f7a453664b31e9bb271250adc5a9dca41d677c9f01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    099ee25ea2d833168d6e43a45f4bef0f

    SHA1

    2dbdd504cb015977442597ab2d791ab1bef11cb8

    SHA256

    defde169718029b15617cd8ca133b72409a48e01ea4c7cb2c340e251e51f3d33

    SHA512

    0cc4e07c2999438dcffce2a2192ec15f97f0d0f94119244f72ae6275bd5a06c0ce71dbd0122ebbd785b4b37b06abb75f10786148513b1d4322795e217b3d3bd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bb4dd49c3148a30b8adcc12218dbf0f

    SHA1

    6cd1b0c356e622fecd0878748a21e22924cd51e1

    SHA256

    1e72697295afdb9c087e440fb34b359266e675d199401f515ea3cd45674d3f86

    SHA512

    343fa9dc7caa926799549d9051c13fc56e7be1f1860f2df70f71abbae6f3dde49d9c78c39a54b7a4648d10e5b98e21cc9d9742a571caa6af5f168251e40382d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a13e160af7a0ff9dd007183e8c89f562

    SHA1

    fbc5952cb083eb5155070f3f272e59120a1d169f

    SHA256

    b6bbf6dd11c227f83d15c0db14a2c5d8bc66be51858c5290c6999c03f6b935d0

    SHA512

    1270609064632e8e49e4f7e5a307651a7b7e33402e3b4b2c201cee8080d984635291dc72aba5e5b8d70466fe0f821d90478adcf3e5bffbcaf6a79c000aa91ba2

  • C:\Users\Admin\AppData\Local\Temp\CabF440.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF481.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nso9C32.tmp\ioSpecial.ini

    Filesize

    709B

    MD5

    19719c3f4b7321cdff3e16356ea6305e

    SHA1

    fd9d55d9d3eb978b1ca808d4b5457066707d1a68

    SHA256

    9912cad7f2e926cb251d0b5f20da54c35b1417a89de85e4712674e88b6710803

    SHA512

    1a66d2f136a9b3c683c0d312e88cacc8779d0fb42c03b3a6e0b87a5fa6e956efdfcbbe79fc6d5b681882179bdce0a19489dad065d428434c1e133a34e84d38b3

  • C:\Users\Admin\AppData\Local\Temp\nso9C32.tmp\ioSpecial.ini

    Filesize

    726B

    MD5

    158897310e67aa8b2c9b00fac998bb10

    SHA1

    7adce7531d1a380bdc810c0abfc7e5064642f9ab

    SHA256

    bb722064b3627b6a116a7830e3d6d6210b098d6bd5b31d441c69e621352f951a

    SHA512

    18810c205d11e5c63d25866383332280d6af727d187b606f2e42af48ab12a1df7912d57a5075dacc73f410fecd2db995c32ea3bec37772d590730185649ced72

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll

    Filesize

    364KB

    MD5

    80d5f32b3fc515402b9e1fe958dedf81

    SHA1

    a80ffd7907e0de2ee4e13c592b888fe00551b7e0

    SHA256

    0ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a

    SHA512

    1589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe

    Filesize

    1.7MB

    MD5

    bb632bc4c4414303c783a0153f6609f7

    SHA1

    eb16bf0d8ce0af4d72dff415741fd0d7aac3020e

    SHA256

    7cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8

    SHA512

    15b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll

    Filesize

    1.0MB

    MD5

    d62a4279ebba19c9bf0037d4f7cbf0bc

    SHA1

    5257d9505cca6b75fe55dfdaf2ea83a7d2d28170

    SHA256

    c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0

    SHA512

    6895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323

  • \Program Files\Highresolution Enterprises\X-Mouse Button Control\uninstaller.exe

    Filesize

    74KB

    MD5

    bfffc38fff05079b15a5317e279dc7a9

    SHA1

    0c18db954f11646d65d0300e58fefcd9ff7634de

    SHA256

    c4e59737ffd988ef4bc7a62e3316a470b1b09a9889f65908110fba3d7b1c6500

    SHA512

    d30220e024ac242285ea757006e7da3874e5f889951de226d48c372a6a8701b76d4a917134ecc1e72c6c3a8d43444762288e7134a25d837e9f43d972675c81d6

  • \Users\Admin\AppData\Local\Temp\nso9C32.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    d753362649aecd60ff434adf171a4e7f

    SHA1

    3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

    SHA256

    8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

    SHA512

    41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

  • \Users\Admin\AppData\Local\Temp\nso9C32.tmp\ShellExecAsUser.dll

    Filesize

    7KB

    MD5

    86a81b9ab7de83aa01024593a03d1872

    SHA1

    8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

    SHA256

    27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

    SHA512

    cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

  • \Users\Admin\AppData\Local\Temp\nso9C32.tmp\System.dll

    Filesize

    10KB

    MD5

    56a321bd011112ec5d8a32b2f6fd3231

    SHA1

    df20e3a35a1636de64df5290ae5e4e7572447f78

    SHA256

    bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

    SHA512

    5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

  • \Users\Admin\AppData\Local\Temp\nso9C32.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    f832e4279c8ff9029b94027803e10e1b

    SHA1

    134ff09f9c70999da35e73f57b70522dc817e681

    SHA256

    4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

    SHA512

    bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

  • memory/2680-232-0x0000000000560000-0x0000000000562000-memory.dmp

    Filesize

    8KB