Overview
overview
10Static
static
3AudioCapture.dll
windows7-x64
3AudioCapture.dll
windows10-2004-x64
6HTCTL32.dll
windows7-x64
3HTCTL32.dll
windows10-2004-x64
8KBDTAM99.dll
windows10-2004-x64
8PCICHEK.dll
windows7-x64
3PCICHEK.dll
windows10-2004-x64
6PCICL32.dll
windows7-x64
3PCICL32.dll
windows10-2004-x64
8TsUsbRedir...on.dll
windows10-2004-x64
8WiaExtensi...64.dll
windows10-2004-x64
8client32.exe
windows7-x64
10client32.exe
windows10-2004-x64
10comcat.dll
windows10-2004-x64
8getuname.dll
windows10-2004-x64
8ifsutilx.dll
windows10-2004-x64
8f_000001.js
windows7-x64
3f_000001.js
windows10-2004-x64
8f_000002.js
windows7-x64
3f_000002.js
windows10-2004-x64
8mprext.dll
windows10-2004-x64
8msidle.dll
windows10-2004-x64
8msidntld.dll
windows10-2004-x64
8msvcr100.dll
windows7-x64
3msvcr100.dll
windows10-2004-x64
8neth.dll
windows10-2004-x64
8netmsg.dll
windows10-2004-x64
8panmap.dll
windows10-2004-x64
8pcicapi.dll
windows7-x64
3pcicapi.dll
windows10-2004-x64
6prflbmsg.dll
windows10-2004-x64
8provdiagnostics.dll
windows10-2004-x64
8Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2025 14:34
Static task
static1
Behavioral task
behavioral1
Sample
AudioCapture.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AudioCapture.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
HTCTL32.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
HTCTL32.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
KBDTAM99.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral6
Sample
PCICHEK.dll
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
PCICHEK.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral8
Sample
PCICL32.dll
Resource
win7-20240729-en
Behavioral task
behavioral9
Sample
PCICL32.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral10
Sample
TsUsbRedirectionGroupPolicyExtension.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
WiaExtensionHost64.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral12
Sample
client32.exe
Resource
win7-20241010-en
Behavioral task
behavioral13
Sample
client32.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral14
Sample
comcat.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral15
Sample
getuname.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral16
Sample
ifsutilx.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral17
Sample
f_000001.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
f_000001.js
Resource
win10v2004-20250211-en
Behavioral task
behavioral19
Sample
f_000002.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
f_000002.js
Resource
win10v2004-20250207-en
Behavioral task
behavioral21
Sample
mprext.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral22
Sample
msidle.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral23
Sample
msidntld.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral24
Sample
msvcr100.dll
Resource
win7-20241010-en
Behavioral task
behavioral25
Sample
msvcr100.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral26
Sample
neth.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral27
Sample
netmsg.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral28
Sample
panmap.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral29
Sample
pcicapi.dll
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
pcicapi.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral31
Sample
prflbmsg.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral32
Sample
provdiagnostics.dll
Resource
win10v2004-20250211-en
General
-
Target
TsUsbRedirectionGroupPolicyExtension.dll
-
Size
13KB
-
MD5
d89cda3ff8427da82de6cce39008c5bc
-
SHA1
33889517517b8953707796d12d6907b039c715d1
-
SHA256
f44cc1e23d0d192dcfd84069b27704cd0b2a8e7720eee43656f57cb474433762
-
SHA512
4a73be7228960719236f39abc6dba7741498d3a3539f7bcc31b6d28a2574e41e4f85e6c2e0fbcffe9ba3b6a646fa3fa078adc0a53c46a4676b871fb92e11fe4f
-
SSDEEP
192:wWMcTgQEri3hPkpzRK7KVM6cqm+saSLysnlsam4oIWa+W8:wWpTgTu3ypzRo61mVag9Jm4oIWa+W
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 51 3068 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\inf\TsUsbHubFilter.PNF rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3436 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3956 wrote to memory of 5024 3956 rundll32.exe 87 PID 3956 wrote to memory of 5024 3956 rundll32.exe 87 PID 5024 wrote to memory of 452 5024 runonce.exe 89 PID 5024 wrote to memory of 452 5024 runonce.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\TsUsbRedirectionGroupPolicyExtension.dll,#11⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r2⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o3⤵PID:452
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDUzNzQ0Mjg4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3436
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1