Overview
overview
10Static
static
5EMV Reader....5.exe
windows10-ltsc_2021-x64
10EMV Reader...al.rtf
windows10-ltsc_2021-x64
1EMV Reader...MV.exe
windows10-ltsc_2021-x64
10EMV Reader...al.rtf
windows10-ltsc_2021-x64
1EMV Reader...cy.rtf
windows10-ltsc_2021-x64
1EMV Reader...in.dll
windows10-ltsc_2021-x64
3EMV Reader...rm.dll
windows10-ltsc_2021-x64
3EMV Reader...ll.exe
windows10-ltsc_2021-x64
3EMV Reader...b1.dll
windows10-ltsc_2021-x64
3EMV Reader...in.dll
windows10-ltsc_2021-x64
3EMV Reader...rm.dll
windows10-ltsc_2021-x64
3EMV Reader...X1.exe
windows10-ltsc_2021-x64
10EMV Reader...e3.dll
windows10-ltsc_2021-x64
3EMV Reader...b1.dll
windows10-ltsc_2021-x64
3Analysis
-
max time kernel
433s -
max time network
551s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
03/04/2025, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
EMV Reader Writer/EMV Reader Writer/EMV Reader Writer Software V8.5.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
EMV Reader Writer/EMV Reader Writer/EmvManual.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
EMV Reader Writer/EMV.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
EMV Reader Writer/EmvManual.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
EMV Reader Writer/X1 4.1/Cardpeek currency.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
EMV Reader Writer/X1 4.1/GPPcScConnectionPlugin.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
EMV Reader Writer/X1 4.1/GlobalPlatform.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral8
Sample
EMV Reader Writer/X1 4.1/bins.dll.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
EMV Reader Writer/X1 4.1/zlib1.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
EMV Reader Writer/X1v5/GPPcScConnectionPlugin.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral11
Sample
EMV Reader Writer/X1v5/GlobalPlatform.dll
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral12
Sample
EMV Reader Writer/X1v5/X1.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral13
Sample
EMV Reader Writer/X1v5/sqlite3.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral14
Sample
EMV Reader Writer/X1v5/zlib1.dll
Resource
win10ltsc2021-20250314-en
General
-
Target
EMV Reader Writer/X1v5/sqlite3.dll
-
Size
628KB
-
MD5
2db34c7d07707168429b0b2633ff75c0
-
SHA1
0b29505703900208db71e8d8ae0e675fac2c4d57
-
SHA256
b645921e5d6ef89a1899d5cde3f3a54caec9280416290922c9d3638d3ecf49ab
-
SHA512
fda845b49ca94f7f2e6ca1b52819385adc46000b8cc7f7f58ca9811bbdb4e8afc3954a41a0050c4f5a44f82dc6d9c41dce38f12e81c254ce2088b139f7750d84
-
SSDEEP
12288:KdqTscFyl44oV1p7q5QyDYrUb+eGbOTV7KFnAzcR:KJl44Sz7iQbrPdOTJzcR
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 5600 6012 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1860 wrote to memory of 6012 1860 rundll32.exe 83 PID 1860 wrote to memory of 6012 1860 rundll32.exe 83 PID 1860 wrote to memory of 6012 1860 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\X1v5\sqlite3.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\X1v5\sqlite3.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:6012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6012 -s 6043⤵
- Program crash
PID:5600
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 6012 -ip 60121⤵PID:4428