Overview
overview
10Static
static
3b56e537748...32.exe
windows7-x64
7b56e537748...32.exe
windows10-2004-x64
10$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
4d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1resources/...dex.js
windows7-x64
3resources/...dex.js
windows10-2004-x64
3resources/....2.bat
windows7-x64
7resources/....2.bat
windows10-2004-x64
7resources/elevate.exe
windows7-x64
3resources/elevate.exe
windows10-2004-x64
3vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1vulkan-1.dll
windows10-2004-x64
1zadasd.exe
windows7-x64
1zadasd.exe
windows10-2004-x64
10$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3Analysis
-
max time kernel
108s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2025, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
b56e537748f6b1c35ab9a4ef5e45191be683b0feb81114555dd9cc5f3ecfd532.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b56e537748f6b1c35ab9a4ef5e45191be683b0feb81114555dd9cc5f3ecfd532.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
LICENSES.chromium.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
LICENSES.chromium.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
d3dcompiler_47.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral10
Sample
ffmpeg.dll
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
ffmpeg.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral12
Sample
libEGL.dll
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
libEGL.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
libGLESv2.dll
Resource
win7-20241010-en
Behavioral task
behavioral15
Sample
libGLESv2.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral16
Sample
resources/app.asar.unpacked/node_modules/screenshot-desktop/lib/win32/index.js
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
resources/app.asar.unpacked/node_modules/screenshot-desktop/lib/win32/index.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral18
Sample
resources/app.asar.unpacked/node_modules/screenshot-desktop/lib/win32/screenCapture_1.3.2.bat
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
resources/app.asar.unpacked/node_modules/screenshot-desktop/lib/win32/screenCapture_1.3.2.bat
Resource
win10v2004-20250314-en
Behavioral task
behavioral20
Sample
resources/elevate.exe
Resource
win7-20240729-en
Behavioral task
behavioral21
Sample
resources/elevate.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral22
Sample
vk_swiftshader.dll
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
vk_swiftshader.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral24
Sample
vulkan-1.dll
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
vulkan-1.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral26
Sample
zadasd.exe
Resource
win7-20241010-en
Behavioral task
behavioral27
Sample
zadasd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20241010-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20250314-en
General
-
Target
resources/app.asar.unpacked/node_modules/screenshot-desktop/lib/win32/screenCapture_1.3.2.bat
-
Size
13KB
-
MD5
da0f40d84d72ae3e9324ad9a040a2e58
-
SHA1
4ca7f6f90fb67dce8470b67010aa19aa0fd6253f
-
SHA256
818350a4fb4146072a25f0467c5c99571c854d58bec30330e7db343bceca008b
-
SHA512
30b7d4921f39c2601d94a3e3bb0e3be79b4b7b505e52523d2562f2e2f32154d555a593df87a71cddb61b98403265f42e0d6705950b37a155dc1d64113c719fd9
-
SSDEEP
384:4cr8sEcBeIXxqXhQsBxf5oBLBfXQM8ybCpGW1KTM+:4KEcRQBTxWlPZxWpG+Qx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3176 screenCapture_1.3.2.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5740 wrote to memory of 3140 5740 cmd.exe 86 PID 5740 wrote to memory of 3140 5740 cmd.exe 86 PID 5740 wrote to memory of 3140 5740 cmd.exe 86 PID 3140 wrote to memory of 3152 3140 csc.exe 87 PID 3140 wrote to memory of 3152 3140 csc.exe 87 PID 3140 wrote to memory of 3152 3140 csc.exe 87 PID 5740 wrote to memory of 3176 5740 cmd.exe 88 PID 5740 wrote to memory of 3176 5740 cmd.exe 88
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\screenCapture_1.3.2.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:5740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /nologo /r:"Microsoft.VisualBasic.dll" /win32manifest:"app.manifest" /out:"screenCapture_1.3.2.exe" "C:\Users\Admin\AppData\Local\Temp\RESOUR~1\APPASA~1.UNP\NODE_M~1\SCREEN~1\lib\win32\SCREEN~1.BAT"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9B84.tmp" "c:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\CSC48DC80C728974569878D53DE52E9EEE.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3152
-
-
-
C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\screenCapture_1.3.2.exescreenCapture_1.3.2.exe2⤵
- Executes dropped EXE
PID:3176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d1bbb292439973928ecdaf9815617d3a
SHA103f6ad48631671e66f28b045757195e9c42a7104
SHA25692ace0b779a8857335974726bfdca7b1600064c25c4ddbc90e6af8b506e143e6
SHA51291c637f282467bc2e97b1456fad8b73ce90a74cf60ff0cd400c73444716c41edec3adad64095fc043cf703477d46308d97e4490cd58002c2b982942ac4681b8e
-
C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\screenCapture_1.3.2.exe
Filesize12KB
MD50509c255e4773c2dbbba37b3f6bc2abd
SHA1f4f2f02a8a35065eaebb4b66819cff9ae44d21a3
SHA25608f7fdea520fdf3482bf08158bf7999ca8f2c7b89fb99930159da1db7c65c376
SHA5128e37ae879fb57fdce0fd7ee52c68152248f6dc2e644dc66ad73a7e8c96f232d7dab34b8900d39c408a10a1b81be93c7ba538385438b0b6e1bea4419cbd0bb295
-
\??\c:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\CSC48DC80C728974569878D53DE52E9EEE.TMP
Filesize1KB
MD5a6f2d21624678f54a2abed46e9f3ab17
SHA1a2a6f07684c79719007d434cbd1cd2164565734a
SHA256ab96911d094b6070cbfb48e07407371ddb41b86e36628b6a10cdb11478192344
SHA5120b286df41c3887eecff5c38cbd6818078313b555ef001151b41ac11b80466b2f4f39da518ab9c51eeff35295cb39d52824de13e026c35270917d7274f764c676