Overview
overview
10Static
static
5EMV Reader....5.exe
windows10-ltsc_2021-x64
10EMV Reader...al.rtf
windows10-ltsc_2021-x64
1EMV Reader...MV.exe
windows10-ltsc_2021-x64
10EMV Reader...al.rtf
windows10-ltsc_2021-x64
1EMV Reader...cy.rtf
windows10-ltsc_2021-x64
1EMV Reader...in.dll
windows10-ltsc_2021-x64
3EMV Reader...rm.dll
windows10-ltsc_2021-x64
3EMV Reader...ll.exe
windows10-ltsc_2021-x64
3EMV Reader...b1.dll
windows10-ltsc_2021-x64
3EMV Reader...in.dll
windows10-ltsc_2021-x64
3EMV Reader...rm.dll
windows10-ltsc_2021-x64
3EMV Reader...X1.exe
windows10-ltsc_2021-x64
10EMV Reader...e3.dll
windows10-ltsc_2021-x64
3EMV Reader...b1.dll
windows10-ltsc_2021-x64
3Analysis
-
max time kernel
451s -
max time network
571s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
03/04/2025, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
EMV Reader Writer/EMV Reader Writer/EMV Reader Writer Software V8.5.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
EMV Reader Writer/EMV Reader Writer/EmvManual.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
EMV Reader Writer/EMV.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
EMV Reader Writer/EmvManual.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
EMV Reader Writer/X1 4.1/Cardpeek currency.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
EMV Reader Writer/X1 4.1/GPPcScConnectionPlugin.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
EMV Reader Writer/X1 4.1/GlobalPlatform.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral8
Sample
EMV Reader Writer/X1 4.1/bins.dll.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
EMV Reader Writer/X1 4.1/zlib1.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
EMV Reader Writer/X1v5/GPPcScConnectionPlugin.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral11
Sample
EMV Reader Writer/X1v5/GlobalPlatform.dll
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral12
Sample
EMV Reader Writer/X1v5/X1.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral13
Sample
EMV Reader Writer/X1v5/sqlite3.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral14
Sample
EMV Reader Writer/X1v5/zlib1.dll
Resource
win10ltsc2021-20250314-en
General
-
Target
EMV Reader Writer/X1v5/GPPcScConnectionPlugin.dll
-
Size
12KB
-
MD5
d65463fc8a37261b6bf5afbc4139bdd5
-
SHA1
954076a2b56da1ff82eebe0c0c287110137f7cb1
-
SHA256
789734bbab7b606e27fab43f4706250399108dba98e4428d1b95589db0a42ea2
-
SHA512
cd3673e1feb07dfc86a33d499cddf7f34368bcacbbe8207826b81f9a96d9ebc74e7455170e195ae316785b42dcc871f842dfa1d0949df9f77e8738b8906339b0
-
SSDEEP
192:udqzHW3G3Vxv3bV/4DaRWu1Fh8+5FseTqt1emjQjA11Tml3X+EqEvaKGZ:udqzHW3G3DvbV/4Daw27vtTqtQU1xm5D
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1180 5340 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2428 wrote to memory of 5340 2428 rundll32.exe 81 PID 2428 wrote to memory of 5340 2428 rundll32.exe 81 PID 2428 wrote to memory of 5340 2428 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\X1v5\GPPcScConnectionPlugin.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\X1v5\GPPcScConnectionPlugin.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:5340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5340 -s 6363⤵
- Program crash
PID:1180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5340 -ip 53401⤵PID:1696