Analysis

  • max time kernel
    890s
  • max time network
    535s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    03/04/2025, 09:22

General

  • Target

    EMV Reader Writer/X1 4.1/bins.dll.exe

  • Size

    2.1MB

  • MD5

    7ab812d82b3baaf3cd337aa43e91acde

  • SHA1

    cbb7f418139eada36eaa57d4f39dde11fc577108

  • SHA256

    c0fd4a64f7e529f3b5e98b70c048e2a2009cba5ba03eb919eaef864000c416cc

  • SHA512

    d40b019150ca06bf3eed54941f84675529db32d5654bc1ca69af838032552489d2d767372cf7bb18560bef297263a731e96bbaa9d0c9760f1b164f20200c5df7

  • SSDEEP

    24576:0PkGgW8ugdGJYDLoL/vddOUmB5I4LjbrMChWVeTsAkYGipeT:XwxH1ah4UTtkYVw

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 19 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\X1 4.1\bins.dll.exe
    "C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\X1 4.1\bins.dll.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2016-0-0x0000000060900000-0x0000000060992000-memory.dmp

    Filesize

    584KB

  • memory/2016-1-0x0000000062E80000-0x0000000062EA2000-memory.dmp

    Filesize

    136KB