Overview
overview
10Static
static
10πποΏ½...οΏ½οΏ½).7z
windows10-2004-x64
8All Files/...ll.dll
windows10-2004-x64
8All Files/...RT.dll
windows10-2004-x64
8All Files/...es.dll
windows10-2004-x64
8All Files/...ar.exe
windows10-2004-x64
6All Files/...32.dll
windows10-2004-x64
6All Files/...re.pkg
windows10-2004-x64
8All Files/...ar.dll
windows10-2004-x64
6All Files/...me.dll
windows10-2004-x64
8All Files/...re.dll
windows10-2004-x64
8All Files/...tp.exe
windows10-2004-x64
6All Files/...017.js
windows10-2004-x64
8All Files/...st.dll
windows10-2004-x64
8All Files/...ng.dll
windows10-2004-x64
8All Files/...er.exe
windows10-2004-x64
6All Files/...64.dll
windows10-2004-x64
8All Files/...556.js
windows10-2004-x64
8All Files/...ts.dll
windows10-2004-x64
8All Files/...ed.dll
windows10-2004-x64
6All Files/...tp.exe
windows10-2004-x64
6All Files/...32.dll
windows10-2004-x64
6All Files/...pa.dll
windows10-2004-x64
8All Files/...sm.dll
windows10-2004-x64
8All Files/...ble.js
windows10-2004-x64
8All Files/...dor.js
windows10-2004-x64
8All Files/...xt.exe
windows10-2004-x64
8All Files/...nv.exe
windows10-2004-x64
8All Files/...sh.exe
windows10-2004-x64
8All Files/...-2.dll
windows10-2004-x64
8All Files/...sm.dll
windows10-2004-x64
8All Files/...32.dll
windows10-2004-x64
6All Files/...58.dll
windows10-2004-x64
6Resubmissions
13-02-2025 00:07
250213-aetjqazndp 1013-02-2025 00:06
250213-adthbs1jbt 1013-02-2025 00:02
250213-abyn9szrhw 10Analysis
-
max time kernel
878s -
max time network
912s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2025 00:06
Behavioral task
behavioral1
Sample
πππππΌπππΎππππ+ππΎ_πππππ_(πΈπΆπΈπ»).7z
Resource
win10v2004-20250207-en
Behavioral task
behavioral2
Sample
All Files/Assets/Backup/ICQLiteShell.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
All Files/Assets/Backup/ICQRT.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral4
Sample
All Files/Assets/Backup/Language/LiteRes.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
All Files/Assets/Backup/Language/WinRar.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral6
Sample
All Files/Assets/Backup/Language/madHcNet32.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
All Files/Assets/Backup/Language/nolimetangere.pkg
Resource
win10v2004-20250207-en
Behavioral task
behavioral8
Sample
All Files/Assets/Backup/Language/unrar.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
All Files/Assets/Backup/cgame.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral10
Sample
All Files/Assets/Backup/fullware.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
All Files/Assets/Backup/izanptp.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral12
Sample
All Files/Assets/Data/017.js
Resource
win10v2004-20250207-en
Behavioral task
behavioral13
Sample
All Files/Assets/Data/EppManifest.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral14
Sample
All Files/Assets/Data/NuGet.Packaging.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral15
Sample
All Files/Assets/Data/StartupHelper.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral16
Sample
All Files/Assets/Data/TMRegEx64.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral17
Sample
All Files/Assets/Data/bug18556.js
Resource
win10v2004-20250207-en
Behavioral task
behavioral18
Sample
All Files/Assets/Data/insights.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral19
Sample
All Files/Assets/Data/installed.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral20
Sample
All Files/Assets/Data/izanptp.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral21
Sample
All Files/Assets/Data/lowSshC32.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral22
Sample
All Files/Assets/Data/mc_enc_mpa.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral23
Sample
All Files/Assets/Data/msm.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral24
Sample
All Files/Assets/Data/portable.js
Resource
win10v2004-20250211-en
Behavioral task
behavioral25
Sample
All Files/Assets/Data/test_vendor.js
Resource
win10v2004-20250211-en
Behavioral task
behavioral26
Sample
All Files/Assets/MigrationService/legal/bin/odt2txt.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral27
Sample
All Files/Assets/MigrationService/legal/bin/sexp-conv.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral28
Sample
All Files/Assets/MigrationService/legal/bin/wish.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral29
Sample
All Files/Assets/MigrationService/libsmi-2.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral30
Sample
All Files/Assets/MigrationService/msm.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral31
Sample
All Files/Plugins/cache/Language/madHcNet32.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral32
Sample
All Files/Plugins/lang-1058.dll
Resource
win10v2004-20250211-en
General
-
Target
All Files/Assets/Data/insights.dll
-
Size
56KB
-
MD5
05e61539b8917fca37c03756bbdd043d
-
SHA1
5a72e0e528260de0ea5b34badb9e5f9873cb4245
-
SHA256
515c8e0b93f0fef15da3e2573ad92b7e7840374140e65e5d73df63d8e22cb3e8
-
SHA512
565d57783e6044d6e7e2026c79dbd897e637c5e1d96e7930dc704ef2b6d801669b38f0c26382f00e67e26668439274941e937a0ade54666de50b5d84f6da7e97
-
SSDEEP
768:YEGJ9blT7XZBSbHwJU+tGR0KZUyGKZ0ZgwmF1+3UVambg:YEGJ9bln5o0KZjGKZ0Z1mF1+3UVayg
Malware Config
Signatures
-
Downloads MZ/PE file 3 IoCs
flow pid Process 39 536 Process not Found 60 4060 Process not Found 62 536 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1048 MicrosoftEdgeUpdate.exe -
Modifies registry class 54 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50DF956F-CA2B-4616-83DE-4BB3AD8CF4E2}\ProxyStubClsid32\ = "{50DF956F-CA2B-4616-83DE-4BB3AD8CF4E2}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3B2B86E2-601D-41A5-8FAB-CEBB3342EE8F}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{346F8AC1-CEB1-4E3E-944B-87D9840505C3}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\All Files\\Assets\\Data\\insights.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ICQLiteShell.MCLiteShellExt\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{346F8AC1-CEB1-4E3E-944B-87D9840505C3}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000_Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50DF956F-CA2B-4616-83DE-4BB3AD8CF4E2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3B2B86E2-601D-41A5-8FAB-CEBB3342EE8F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73B24247-042E-4EF5-ADC2-42F62E6FD654}\TypeLib\ = "{346F8AC1-CEB1-4E3E-944B-87D9840505C3}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{346F8AC1-CEB1-4E3E-944B-87D9840505C3}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50DF956F-CA2B-4616-83DE-4BB3AD8CF4E2}\NumMethods\ = "7" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3B2B86E2-601D-41A5-8FAB-CEBB3342EE8F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3B2B86E2-601D-41A5-8FAB-CEBB3342EE8F}\NumMethods\ = "3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73B24247-042E-4EF5-ADC2-42F62E6FD654}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\All Files\\Assets\\Data\\insights.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\ICQLiteMenu regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{346F8AC1-CEB1-4E3E-944B-87D9840505C3}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\All Files\\Assets\\Data\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ICQLiteShell.MCLiteShellExt.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ICQLiteShell.MCLiteShellExt.1\CLSID\ = "{73B24247-042E-4EF5-ADC2-42F62E6FD654}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ICQLiteShell.MCLiteShellExt\ = "MCLiteShellExt Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{50DF956F-CA2B-4616-83DE-4BB3AD8CF4E2}\ = "PSFactoryBuffer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73B24247-042E-4EF5-ADC2-42F62E6FD654}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73B24247-042E-4EF5-ADC2-42F62E6FD654}\ProgID\ = "ICQLiteShell.MCLiteShellExt.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73B24247-042E-4EF5-ADC2-42F62E6FD654}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{50DF956F-CA2B-4616-83DE-4BB3AD8CF4E2}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\All Files\\Assets\\Data\\insights.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{50DF956F-CA2B-4616-83DE-4BB3AD8CF4E2}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50DF956F-CA2B-4616-83DE-4BB3AD8CF4E2}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50DF956F-CA2B-4616-83DE-4BB3AD8CF4E2}\ = "MIBLiteShellExt" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ICQLiteShell.MCLiteShellExt.1\ = "MCLiteShellExt Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{346F8AC1-CEB1-4E3E-944B-87D9840505C3} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{50DF956F-CA2B-4616-83DE-4BB3AD8CF4E2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ICQLiteShell.MCLiteShellExt\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73B24247-042E-4EF5-ADC2-42F62E6FD654}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{346F8AC1-CEB1-4E3E-944B-87D9840505C3}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{346F8AC1-CEB1-4E3E-944B-87D9840505C3}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\ICQLiteMenu regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73B24247-042E-4EF5-ADC2-42F62E6FD654}\ = "MCLiteShellExt Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{50DF956F-CA2B-4616-83DE-4BB3AD8CF4E2}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ICQLiteShell.MCLiteShellExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73B24247-042E-4EF5-ADC2-42F62E6FD654}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\ICQLiteMenu\ = "{73B24247-042E-4EF5-ADC2-42F62E6FD654}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{346F8AC1-CEB1-4E3E-944B-87D9840505C3}\1.0\ = "ICQLiteShell 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{346F8AC1-CEB1-4E3E-944B-87D9840505C3}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3B2B86E2-601D-41A5-8FAB-CEBB3342EE8F}\ProxyStubClsid32\ = "{50DF956F-CA2B-4616-83DE-4BB3AD8CF4E2}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ICQLiteShell.MCLiteShellExt.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73B24247-042E-4EF5-ADC2-42F62E6FD654}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{346F8AC1-CEB1-4E3E-944B-87D9840505C3}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73B24247-042E-4EF5-ADC2-42F62E6FD654} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000_Classes\WOW6432Node\Interface regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50DF956F-CA2B-4616-83DE-4BB3AD8CF4E2}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ICQLiteShell.MCLiteShellExt\CLSID\ = "{73B24247-042E-4EF5-ADC2-42F62E6FD654}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\ICQLiteMenu\ = "{73B24247-042E-4EF5-ADC2-42F62E6FD654}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3B2B86E2-601D-41A5-8FAB-CEBB3342EE8F}\ = "IMCLiteShellExt" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ICQLiteShell.MCLiteShellExt\CurVer\ = "ICQLiteShell.MCLiteShellExt.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{73B24247-042E-4EF5-ADC2-42F62E6FD654}\VersionIndependentProgID\ = "ICQLiteShell.MCLiteShellExt" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1264 wrote to memory of 3344 1264 regsvr32.exe 85 PID 1264 wrote to memory of 3344 1264 regsvr32.exe 85 PID 1264 wrote to memory of 3344 1264 regsvr32.exe 85
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\All Files\Assets\Data\insights.dll"1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\All Files\Assets\Data\insights.dll"2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3344
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTk3OTE0MTk0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1048