Overview
overview
10Static
static
10Img.exe
windows7-x64
3Img.exe
windows10-2004-x64
3setup_akl.exe
windows7-x64
10setup_akl.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3AKV.exe
windows7-x64
3AKV.exe
windows10-2004-x64
3POL.dll
windows7-x64
3POL.dll
windows10-2004-x64
3POL.exe
windows7-x64
6POL.exe
windows10-2004-x64
6POL.dll
windows7-x64
3POL.dll
windows10-2004-x64
3POL.dll
windows7-x64
3POL.dll
windows10-2004-x64
3POL.chm
windows7-x64
1POL.chm
windows10-2004-x64
1POL.exe
windows7-x64
6POL.exe
windows10-2004-x64
6Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7qs.html
windows7-x64
3qs.html
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 01:34
Behavioral task
behavioral1
Sample
Img.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Img.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
setup_akl.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
setup_akl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
AKV.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
AKV.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
POL.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
POL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
POL.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
POL.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
POL.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
POL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
POL.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
POL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
POL.chm
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
POL.chm
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
POL.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
POL.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Uninstall.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
Uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
qs.html
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
qs.html
Resource
win10v2004-20241007-en
General
-
Target
POL.exe
-
Size
649KB
-
MD5
2bff0c75a04401dada0adfab933e46a7
-
SHA1
364d97f90b137f8e359d998164fb15d474be7bbb
-
SHA256
2aa53bc5da3294817f95d8806effdf28e5af49661a955256c46db2b67cb6e6da
-
SHA512
88b82973d3c042bceb75e12297111fa7b8bd4e2a7a37d26b698c595d8d75ec670cc7aebfa2572206c1b2a4ecbbfa3103affb8bee6d7ef47428a225e2cd1bea3f
-
SSDEEP
12288:z+/bmnuDF7LsmaIZumD5YBZq6xGJOpqtAnWGgAIb3NEnCztPvnK3STFiJ:zMYW/sma25Y+0Gkp0AWG1Imw83OFQ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\POL Agent = "C:\\Users\\Admin\\AppData\\Local\\Temp\\POL.exe" POL.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POL.exe -
Modifies registry class 31 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\ProgID POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\ProgID\ = "HtmlDlgSafeHelper.HtmlDlgSafeHelper.1" POL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3860694E-C762-EEFB-729D-C2A0DFD832A6}\2.2 POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\ = "Bahalet.Ajadic object" POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\Implemented Categories\ POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\VersionIndependentProgID\ = "HtmlDlgSafeHelper.HtmlDlgSafeHelper" POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\Programmable\ POL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3860694E-C762-EEFB-729D-C2A0DFD832A6} POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3860694E-C762-EEFB-729D-C2A0DFD832A6}\2.2\ POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\Version\ = "4.0" POL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\VersionIndependentProgID POL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\ToolboxBitmap32 POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\VersionIndependentProgID\ POL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD} POL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\InprocServer32 POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\InprocServer32\ = "C:\\Windows\\SysWOW64\\mshtmled.dll" POL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\Programmable POL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\TypeLib POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\MiscStatus\ POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\ToolboxBitmap32\ POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\ToolboxBitmap32\ = "C:\\Windows\\SysWOW64\\mshtmled.dll, 1" POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\Version\ POL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\MiscStatus POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\MiscStatus\ = "0" POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\ProgID\ POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3860694E-C762-EEFB-729D-C2A0DFD832A6}\ POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\TypeLib\ POL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\Implemented Categories POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\InprocServer32\ POL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\TypeLib\ = "{3860694E-C762-EEFB-729D-C2A0DFD832A6}" POL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A4EF3-7941-4E56-60BA-1711ABFC9CAD}\Version POL.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2620 POL.exe Token: SeIncBasePriorityPrivilege 2620 POL.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2620 POL.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2620 POL.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2620 POL.exe 2620 POL.exe 2620 POL.exe 2620 POL.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\POL.exe"C:\Users\Admin\AppData\Local\Temp\POL.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2620