Overview
overview
10Static
static
5EMV Reader....5.exe
windows10-ltsc_2021-x64
10EMV Reader...al.rtf
windows10-ltsc_2021-x64
1EMV Reader...MV.exe
windows10-ltsc_2021-x64
10EMV Reader...al.rtf
windows10-ltsc_2021-x64
1EMV Reader...cy.rtf
windows10-ltsc_2021-x64
1EMV Reader...in.dll
windows10-ltsc_2021-x64
3EMV Reader...rm.dll
windows10-ltsc_2021-x64
3EMV Reader...ll.exe
windows10-ltsc_2021-x64
3EMV Reader...b1.dll
windows10-ltsc_2021-x64
3EMV Reader...in.dll
windows10-ltsc_2021-x64
3EMV Reader...rm.dll
windows10-ltsc_2021-x64
3EMV Reader...X1.exe
windows10-ltsc_2021-x64
10EMV Reader...e3.dll
windows10-ltsc_2021-x64
3EMV Reader...b1.dll
windows10-ltsc_2021-x64
3Analysis
-
max time kernel
890s -
max time network
535s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
03/04/2025, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
EMV Reader Writer/EMV Reader Writer/EMV Reader Writer Software V8.5.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
EMV Reader Writer/EMV Reader Writer/EmvManual.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
EMV Reader Writer/EMV.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
EMV Reader Writer/EmvManual.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
EMV Reader Writer/X1 4.1/Cardpeek currency.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
EMV Reader Writer/X1 4.1/GPPcScConnectionPlugin.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
EMV Reader Writer/X1 4.1/GlobalPlatform.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral8
Sample
EMV Reader Writer/X1 4.1/bins.dll.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
EMV Reader Writer/X1 4.1/zlib1.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
EMV Reader Writer/X1v5/GPPcScConnectionPlugin.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral11
Sample
EMV Reader Writer/X1v5/GlobalPlatform.dll
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral12
Sample
EMV Reader Writer/X1v5/X1.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral13
Sample
EMV Reader Writer/X1v5/sqlite3.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral14
Sample
EMV Reader Writer/X1v5/zlib1.dll
Resource
win10ltsc2021-20250314-en
General
-
Target
EMV Reader Writer/X1 4.1/bins.dll.exe
-
Size
2.1MB
-
MD5
7ab812d82b3baaf3cd337aa43e91acde
-
SHA1
cbb7f418139eada36eaa57d4f39dde11fc577108
-
SHA256
c0fd4a64f7e529f3b5e98b70c048e2a2009cba5ba03eb919eaef864000c416cc
-
SHA512
d40b019150ca06bf3eed54941f84675529db32d5654bc1ca69af838032552489d2d767372cf7bb18560bef297263a731e96bbaa9d0c9760f1b164f20200c5df7
-
SSDEEP
24576:0PkGgW8ugdGJYDLoL/vddOUmB5I4LjbrMChWVeTsAkYGipeT:XwxH1ah4UTtkYVw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bins.dll.exe -
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell bins.dll.exe Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 bins.dll.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell bins.dll.exe Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff bins.dll.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 bins.dll.exe Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 bins.dll.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU bins.dll.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 bins.dll.exe Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 14002e80922b16d365937a46956b92703aca08af0000 bins.dll.exe Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff bins.dll.exe Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff bins.dll.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags bins.dll.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 bins.dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Documents" bins.dll.exe Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff bins.dll.exe Set value (data) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 bins.dll.exe Set value (int) \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "2" bins.dll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ bins.dll.exe Key created \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000_Classes\Local Settings bins.dll.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2016 bins.dll.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2016 bins.dll.exe 2016 bins.dll.exe 2016 bins.dll.exe 2016 bins.dll.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\X1 4.1\bins.dll.exe"C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\X1 4.1\bins.dll.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2016