Analysis

  • max time kernel
    900s
  • max time network
    555s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    03/04/2025, 09:22

General

  • Target

    EMV Reader Writer/EMV.exe

  • Size

    676KB

  • MD5

    c02eb2922d0d441d0feb165978bace0b

  • SHA1

    1742e04ea8268a87d4308bf462ea0b2196c04363

  • SHA256

    e7c4ccc44305bbf8832946347be0774fee2bbce6dd1602651f1bfcb7ba3c0e6a

  • SHA512

    a61eadd7eded59fc855ea5e068fb25037d869972d309944eb79f466552334a12c41caae5754b293539693ff93d1a0d1651dfd321e272c439d41143ae01398ec7

  • SSDEEP

    12288:20Yu2IAbjFm4Eq7duqXXyFsKJ0kXky/u523DjUN3npCeYHfDugU+6:LYutAbjwo7dhyS4W523UN5C72

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\EMV.exe
    "C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\EMV.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks for VirtualBox DLLs, possible anti-VM trick
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2020-0-0x0000000075132000-0x0000000075133000-memory.dmp

    Filesize

    4KB

  • memory/2020-1-0x0000000075130000-0x00000000756E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2020-2-0x0000000075130000-0x00000000756E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2020-3-0x0000000075130000-0x00000000756E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2020-4-0x0000000075130000-0x00000000756E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2020-5-0x0000000075130000-0x00000000756E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2020-6-0x0000000075132000-0x0000000075133000-memory.dmp

    Filesize

    4KB

  • memory/2020-7-0x0000000075130000-0x00000000756E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2020-8-0x0000000075130000-0x00000000756E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2020-9-0x0000000075130000-0x00000000756E1000-memory.dmp

    Filesize

    5.7MB

  • memory/2020-10-0x0000000075130000-0x00000000756E1000-memory.dmp

    Filesize

    5.7MB