Overview
overview
10Static
static
5EMV Reader....5.exe
windows10-ltsc_2021-x64
10EMV Reader...al.rtf
windows10-ltsc_2021-x64
1EMV Reader...MV.exe
windows10-ltsc_2021-x64
10EMV Reader...al.rtf
windows10-ltsc_2021-x64
1EMV Reader...cy.rtf
windows10-ltsc_2021-x64
1EMV Reader...in.dll
windows10-ltsc_2021-x64
3EMV Reader...rm.dll
windows10-ltsc_2021-x64
3EMV Reader...ll.exe
windows10-ltsc_2021-x64
3EMV Reader...b1.dll
windows10-ltsc_2021-x64
3EMV Reader...in.dll
windows10-ltsc_2021-x64
3EMV Reader...rm.dll
windows10-ltsc_2021-x64
3EMV Reader...X1.exe
windows10-ltsc_2021-x64
10EMV Reader...e3.dll
windows10-ltsc_2021-x64
3EMV Reader...b1.dll
windows10-ltsc_2021-x64
3Analysis
-
max time kernel
438s -
max time network
444s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
03/04/2025, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
EMV Reader Writer/EMV Reader Writer/EMV Reader Writer Software V8.5.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
EMV Reader Writer/EMV Reader Writer/EmvManual.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
EMV Reader Writer/EMV.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
EMV Reader Writer/EmvManual.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
EMV Reader Writer/X1 4.1/Cardpeek currency.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
EMV Reader Writer/X1 4.1/GPPcScConnectionPlugin.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
EMV Reader Writer/X1 4.1/GlobalPlatform.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral8
Sample
EMV Reader Writer/X1 4.1/bins.dll.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
EMV Reader Writer/X1 4.1/zlib1.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
EMV Reader Writer/X1v5/GPPcScConnectionPlugin.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral11
Sample
EMV Reader Writer/X1v5/GlobalPlatform.dll
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral12
Sample
EMV Reader Writer/X1v5/X1.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral13
Sample
EMV Reader Writer/X1v5/sqlite3.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral14
Sample
EMV Reader Writer/X1v5/zlib1.dll
Resource
win10ltsc2021-20250314-en
General
-
Target
EMV Reader Writer/X1v5/zlib1.dll
-
Size
105KB
-
MD5
b8a9e91134e7c89440a0f95470d5e47b
-
SHA1
3cbcee30fc0a7e9807931bc0dafceb627042bfc9
-
SHA256
42967a768f341d9ce5174eb38a4d63754c3c41739e7d88f4e39cd7354c1fac71
-
SHA512
e8583ea94b9d1321889359317e367abc88e90e96d0d9243258244a527ffa2b13ab97d0787693ca328960ceb934ea11eefd14abafd640a654473c26e420d2ec54
-
SSDEEP
3072:Y15jVjUqf9CtXH/4UghkGTBfmJyqLEC9BRY:Yf81wpTB+Jyqb
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 908 4400 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5572 wrote to memory of 4400 5572 rundll32.exe 84 PID 5572 wrote to memory of 4400 5572 rundll32.exe 84 PID 5572 wrote to memory of 4400 5572 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\X1v5\zlib1.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:5572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\X1v5\zlib1.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:4400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 6003⤵
- Program crash
PID:908
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4400 -ip 44001⤵PID:4516