Overview
overview
10Static
static
5EMV Reader....5.exe
windows10-ltsc_2021-x64
10EMV Reader...al.rtf
windows10-ltsc_2021-x64
1EMV Reader...MV.exe
windows10-ltsc_2021-x64
10EMV Reader...al.rtf
windows10-ltsc_2021-x64
1EMV Reader...cy.rtf
windows10-ltsc_2021-x64
1EMV Reader...in.dll
windows10-ltsc_2021-x64
3EMV Reader...rm.dll
windows10-ltsc_2021-x64
3EMV Reader...ll.exe
windows10-ltsc_2021-x64
3EMV Reader...b1.dll
windows10-ltsc_2021-x64
3EMV Reader...in.dll
windows10-ltsc_2021-x64
3EMV Reader...rm.dll
windows10-ltsc_2021-x64
3EMV Reader...X1.exe
windows10-ltsc_2021-x64
10EMV Reader...e3.dll
windows10-ltsc_2021-x64
3EMV Reader...b1.dll
windows10-ltsc_2021-x64
3Analysis
-
max time kernel
900s -
max time network
555s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
03/04/2025, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
EMV Reader Writer/EMV Reader Writer/EMV Reader Writer Software V8.5.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
EMV Reader Writer/EMV Reader Writer/EmvManual.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
EMV Reader Writer/EMV.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
EMV Reader Writer/EmvManual.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
EMV Reader Writer/X1 4.1/Cardpeek currency.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
EMV Reader Writer/X1 4.1/GPPcScConnectionPlugin.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
EMV Reader Writer/X1 4.1/GlobalPlatform.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral8
Sample
EMV Reader Writer/X1 4.1/bins.dll.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
EMV Reader Writer/X1 4.1/zlib1.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
EMV Reader Writer/X1v5/GPPcScConnectionPlugin.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral11
Sample
EMV Reader Writer/X1v5/GlobalPlatform.dll
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral12
Sample
EMV Reader Writer/X1v5/X1.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral13
Sample
EMV Reader Writer/X1v5/sqlite3.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral14
Sample
EMV Reader Writer/X1v5/zlib1.dll
Resource
win10ltsc2021-20250314-en
General
-
Target
EMV Reader Writer/EMV.exe
-
Size
676KB
-
MD5
c02eb2922d0d441d0feb165978bace0b
-
SHA1
1742e04ea8268a87d4308bf462ea0b2196c04363
-
SHA256
e7c4ccc44305bbf8832946347be0774fee2bbce6dd1602651f1bfcb7ba3c0e6a
-
SHA512
a61eadd7eded59fc855ea5e068fb25037d869972d309944eb79f466552334a12c41caae5754b293539693ff93d1a0d1651dfd321e272c439d41143ae01398ec7
-
SSDEEP
12288:20Yu2IAbjFm4Eq7duqXXyFsKJ0kXky/u523DjUN3npCeYHfDugU+6:LYutAbjwo7dhyS4W523UN5C72
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-73851796-4078923053-1419757224-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\yHvp7YTZVsXh7jst\\vLdlxiQDuedN.exe\",explorer.exe" EMV.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN EMV.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EMV.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe 2020 EMV.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2020 EMV.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\EMV.exe"C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\EMV.exe"1⤵
- Modifies WinLogon for persistence
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020