Overview
overview
10Static
static
1Anime-Figh...24.exe
windows7_x64
8Anime-Figh...24.exe
windows7_x64
10Anime-Figh...24.exe
windows7_x64
10Anime-Figh...24.exe
windows7_x64
8Anime-Figh...24.exe
windows11_x64
8Anime-Figh...24.exe
windows10_x64
10Anime-Figh...24.exe
windows10_x64
Anime-Figh...24.exe
windows10_x64
10Anime-Figh...24.exe
windows10_x64
10Anime-Figh...24.exe
windows10_x64
10Analysis
-
max time kernel
601s -
max time network
605s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
02-09-2021 19:12
Static task
static1
Behavioral task
behavioral1
Sample
Anime-Fighters-Infin_734316524.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
Anime-Fighters-Infin_734316524.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
Anime-Fighters-Infin_734316524.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
Anime-Fighters-Infin_734316524.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
Anime-Fighters-Infin_734316524.exe
Resource
win11
Behavioral task
behavioral6
Sample
Anime-Fighters-Infin_734316524.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
Anime-Fighters-Infin_734316524.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
Anime-Fighters-Infin_734316524.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
Anime-Fighters-Infin_734316524.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
Anime-Fighters-Infin_734316524.exe
Resource
win10-de
General
-
Target
Anime-Fighters-Infin_734316524.exe
-
Size
3.9MB
-
MD5
bd2b73492acf20dec004360b1605032d
-
SHA1
60ddf3c107d94bbeb102a2d7ede945eb5edd2b35
-
SHA256
12b6272825140a15eabec58f97b49aed3ce5db7816a0b3c2674f6ae8746367ca
-
SHA512
dae236259e32a9e4b789f020dbd8082b376e3c2b56fd94523a44cf4b5a557f3661aeefc24b5605218ba0479ee1b9a8cb7b5c1df6c103673a99f13bc4210c90da
Malware Config
Signatures
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
Anime-Fighters-Infin_734316524.tmpExpedita.exeAhR5fTcQ7d3AIKYU5U.exelxju7i.exevpn.exepid process 3988 Anime-Fighters-Infin_734316524.tmp 2572 Expedita.exe 1880 AhR5fTcQ7d3AIKYU5U.exe 3332 lxju7i.exe 1576 vpn.exe -
Loads dropped DLL 2 IoCs
Processes:
Anime-Fighters-Infin_734316524.tmpAhR5fTcQ7d3AIKYU5U.exepid process 3988 Anime-Fighters-Infin_734316524.tmp 1880 AhR5fTcQ7d3AIKYU5U.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 16 IoCs
Processes:
Anime-Fighters-Infin_734316524.tmpdescription ioc process File created C:\Program Files (x86)\Vel\voluptas\is-T6MNB.tmp Anime-Fighters-Infin_734316524.tmp File opened for modification C:\Program Files (x86)\Vel\magnam\Expedita.exe Anime-Fighters-Infin_734316524.tmp File created C:\Program Files (x86)\Vel\is-GM8RT.tmp Anime-Fighters-Infin_734316524.tmp File created C:\Program Files (x86)\Vel\is-4HKF0.tmp Anime-Fighters-Infin_734316524.tmp File created C:\Program Files (x86)\Vel\is-J5DEO.tmp Anime-Fighters-Infin_734316524.tmp File created C:\Program Files (x86)\Vel\nesciunt\is-4AQEL.tmp Anime-Fighters-Infin_734316524.tmp File created C:\Program Files (x86)\Vel\nesciunt\is-QQK8D.tmp Anime-Fighters-Infin_734316524.tmp File created C:\Program Files (x86)\Vel\voluptas\is-7TL9M.tmp Anime-Fighters-Infin_734316524.tmp File opened for modification C:\Program Files (x86)\Vel\unins000.dat Anime-Fighters-Infin_734316524.tmp File created C:\Program Files (x86)\Vel\unins000.dat Anime-Fighters-Infin_734316524.tmp File created C:\Program Files (x86)\Vel\is-GN34K.tmp Anime-Fighters-Infin_734316524.tmp File created C:\Program Files (x86)\Vel\magnam\is-U6DLB.tmp Anime-Fighters-Infin_734316524.tmp File created C:\Program Files (x86)\Vel\nesciunt\is-9OSHD.tmp Anime-Fighters-Infin_734316524.tmp File created C:\Program Files (x86)\Vel\magnam\is-8VS01.tmp Anime-Fighters-Infin_734316524.tmp File created C:\Program Files (x86)\Vel\magnam\is-P0OT3.tmp Anime-Fighters-Infin_734316524.tmp File created C:\Program Files (x86)\Vel\nesciunt\is-N9NM5.tmp Anime-Fighters-Infin_734316524.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
Expedita.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings Expedita.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Anime-Fighters-Infin_734316524.tmpExpedita.exepid process 3988 Anime-Fighters-Infin_734316524.tmp 3988 Anime-Fighters-Infin_734316524.tmp 2572 Expedita.exe 2572 Expedita.exe 2572 Expedita.exe 2572 Expedita.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Anime-Fighters-Infin_734316524.tmpAhR5fTcQ7d3AIKYU5U.exepid process 3988 Anime-Fighters-Infin_734316524.tmp 1880 AhR5fTcQ7d3AIKYU5U.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Anime-Fighters-Infin_734316524.exeAnime-Fighters-Infin_734316524.tmpExpedita.exevpn.exedescription pid process target process PID 416 wrote to memory of 3988 416 Anime-Fighters-Infin_734316524.exe Anime-Fighters-Infin_734316524.tmp PID 416 wrote to memory of 3988 416 Anime-Fighters-Infin_734316524.exe Anime-Fighters-Infin_734316524.tmp PID 416 wrote to memory of 3988 416 Anime-Fighters-Infin_734316524.exe Anime-Fighters-Infin_734316524.tmp PID 3988 wrote to memory of 2572 3988 Anime-Fighters-Infin_734316524.tmp Expedita.exe PID 3988 wrote to memory of 2572 3988 Anime-Fighters-Infin_734316524.tmp Expedita.exe PID 3988 wrote to memory of 2572 3988 Anime-Fighters-Infin_734316524.tmp Expedita.exe PID 2572 wrote to memory of 1880 2572 Expedita.exe AhR5fTcQ7d3AIKYU5U.exe PID 2572 wrote to memory of 1880 2572 Expedita.exe AhR5fTcQ7d3AIKYU5U.exe PID 2572 wrote to memory of 1880 2572 Expedita.exe AhR5fTcQ7d3AIKYU5U.exe PID 2572 wrote to memory of 3332 2572 Expedita.exe lxju7i.exe PID 2572 wrote to memory of 3332 2572 Expedita.exe lxju7i.exe PID 2572 wrote to memory of 3332 2572 Expedita.exe lxju7i.exe PID 2572 wrote to memory of 1576 2572 Expedita.exe vpn.exe PID 2572 wrote to memory of 1576 2572 Expedita.exe vpn.exe PID 2572 wrote to memory of 1576 2572 Expedita.exe vpn.exe PID 1576 wrote to memory of 2020 1576 vpn.exe vpn.tmp PID 1576 wrote to memory of 2020 1576 vpn.exe vpn.tmp PID 1576 wrote to memory of 2020 1576 vpn.exe vpn.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\Anime-Fighters-Infin_734316524.exe"C:\Users\Admin\AppData\Local\Temp\Anime-Fighters-Infin_734316524.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-86JMP.tmp\Anime-Fighters-Infin_734316524.tmp"C:\Users\Admin\AppData\Local\Temp\is-86JMP.tmp\Anime-Fighters-Infin_734316524.tmp" /SL5="$2014A,3656070,140800,C:\Users\Admin\AppData\Local\Temp\Anime-Fighters-Infin_734316524.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Vel\magnam\Expedita.exe"C:\Program Files (x86)\Vel/\magnam\Expedita.exe" 32cb7aca069a0c8bb8d51fccce1d38263⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bl8HUuOb\AhR5fTcQ7d3AIKYU5U.exeC:\Users\Admin\AppData\Local\Temp\bl8HUuOb\AhR5fTcQ7d3AIKYU5U.exe /quiet SILENT=1 AF=606x32cb7aca069a0c8bb8d51fccce1d38264⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\xEfDbKkQ\lxju7i.exeC:\Users\Admin\AppData\Local\Temp\xEfDbKkQ\lxju7i.exe /usthree SUB=32cb7aca069a0c8bb8d51fccce1d38264⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3TRuEVUx\vpn.exeC:\Users\Admin\AppData\Local\Temp\3TRuEVUx\vpn.exe /silent /subid=510x32cb7aca069a0c8bb8d51fccce1d38264⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-F0OBH.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-F0OBH.tmp\vpn.tmp" /SL5="$302E0,15170975,270336,C:\Users\Admin\AppData\Local\Temp\3TRuEVUx\vpn.exe" /silent /subid=510x32cb7aca069a0c8bb8d51fccce1d38265⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Vel\magnam\Expedita.exeMD5
8c8b1e33a4bf38b9b76bc1cbb961ed96
SHA1cd033cf4183b91ab93ffb5ed49ce789b18009054
SHA2567c5882ad4c9b9b10bd55c37d3390a0f19bba8c198f9db8f4497fe605d725c8a7
SHA5124a27d39411d56281678b1b0847f2051b50d4d4730445cefe80324ae4c07f46123114b10a2c5f1857fecebf191c4116907a3bb873aba6b061fec401fcc8284e8a
-
C:\Users\Admin\AppData\Local\Temp\3TRuEVUx\vpn.exeMD5
6c703dae0a8631b944f93236d0b90331
SHA127d9dd4c4e8f9b1fd3c738e807909ff45c975063
SHA256a49e9d949e8c128e98b61f3bb6606a34889bc03d9437f666b733f701fc4d6468
SHA512b70b54f75234b72a4ff9c85d9cf209fe7ef39698b507aac07db7d94f89af1f287dfa9546ede0569879554a1385c901ab70b83b6570e0bd130e9b875c72d000ee
-
C:\Users\Admin\AppData\Local\Temp\3TRuEVUx\vpn.exeMD5
4d4e9a82b97f7ab77b003e7ea83f5392
SHA133cbed5cb49a8accb5300c8841682b93c5703ed2
SHA256a23cf8bec11a427ca1aa533eab8b251e0df800a0c88e685ea8c58455ce0c891c
SHA512d010d990f5245311293cc1f1cfcc068869450bdbb1fef0865ab68d4aa04f641e896a4f3e727cf8fec6194b3760e02d81a9b03b0f162934642c40e4448dd0d3ad
-
C:\Users\Admin\AppData\Local\Temp\bl8HUuOb\AhR5fTcQ7d3AIKYU5U.exeMD5
ba0d861ab2ce40a89cab369016f1b852
SHA112e3a03ba04f22395e07680a63eea0427a4ad90a
SHA2565cec97f7759557b1a52dad26f650ed756508b5f4ccce6169941dd558bfa00584
SHA5121445bc82928bebceef43aef66deae2484c4680b30937ff44b12ba330db179ecb361854d8da953f07f6fb5efd18fc1b3f25cfec53b3d85dc7bc4ac304efed92a0
-
C:\Users\Admin\AppData\Local\Temp\bl8HUuOb\AhR5fTcQ7d3AIKYU5U.exeMD5
ba0d861ab2ce40a89cab369016f1b852
SHA112e3a03ba04f22395e07680a63eea0427a4ad90a
SHA2565cec97f7759557b1a52dad26f650ed756508b5f4ccce6169941dd558bfa00584
SHA5121445bc82928bebceef43aef66deae2484c4680b30937ff44b12ba330db179ecb361854d8da953f07f6fb5efd18fc1b3f25cfec53b3d85dc7bc4ac304efed92a0
-
C:\Users\Admin\AppData\Local\Temp\is-86JMP.tmp\Anime-Fighters-Infin_734316524.tmpMD5
3e82d951014d6fa1f34b7ea9a6bab125
SHA18135d385bcb6cad13dc3f4524e6a3b4584939b22
SHA256ec822c16b67f304645977e8b20a81b06eb9d577e890aeec33155d3b19fe61854
SHA5124a8c24ddb0841c5e75bd6b9c1f3015c2be637827db914f4279c3445e9c82ab1eb7790b0611cafdaff99b5115ecd255d913b03e5d11c2a7d094e04a24bb1681bc
-
C:\Users\Admin\AppData\Local\Temp\is-86JMP.tmp\Anime-Fighters-Infin_734316524.tmpMD5
3e82d951014d6fa1f34b7ea9a6bab125
SHA18135d385bcb6cad13dc3f4524e6a3b4584939b22
SHA256ec822c16b67f304645977e8b20a81b06eb9d577e890aeec33155d3b19fe61854
SHA5124a8c24ddb0841c5e75bd6b9c1f3015c2be637827db914f4279c3445e9c82ab1eb7790b0611cafdaff99b5115ecd255d913b03e5d11c2a7d094e04a24bb1681bc
-
C:\Users\Admin\AppData\Local\Temp\is-F0OBH.tmp\vpn.tmpMD5
351d49a2fd0b4078708cfa04e31da0ae
SHA15536d164ef7b01fa5081d5b7da65d315d5ad236b
SHA256ff458f6208493d9b695fe7ba1bbc451ed5efc3ae2a8dea0bf64b39b15c646950
SHA5129bfff9b55a03efa7ec2c4ac1590305033396128e1be0c585b63beefefb7ee5bf94131b894272949ff74d40678d2bf1767565d9f6005f629a3c314b8af847035b
-
C:\Users\Admin\AppData\Local\Temp\xEfDbKkQ\lxju7i.exeMD5
510bdc47bcc20fb075a12a62b61fe1e8
SHA1cc74647eba86347185b7c776cd275a75183bd6a4
SHA25639d84e0c1fa355e2ec5f5d6080b189ca8682c831ab1ae25ebb30b24298295de6
SHA512a947609d7953f5a15334b7666da65aca327ff1124bfd6b7d2e6b715e7595fe0c6614782861c3e9d945a070b885ac53b48cffdcf12bcb630caa0036ebaa8225d9
-
C:\Users\Admin\AppData\Local\Temp\xEfDbKkQ\lxju7i.exeMD5
510bdc47bcc20fb075a12a62b61fe1e8
SHA1cc74647eba86347185b7c776cd275a75183bd6a4
SHA25639d84e0c1fa355e2ec5f5d6080b189ca8682c831ab1ae25ebb30b24298295de6
SHA512a947609d7953f5a15334b7666da65aca327ff1124bfd6b7d2e6b715e7595fe0c6614782861c3e9d945a070b885ac53b48cffdcf12bcb630caa0036ebaa8225d9
-
\Users\Admin\AppData\Local\Temp\is-J56FC.tmp\_isetup\_iscrypt.dllMD5
a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\decoder.dllMD5
15aa573cee52cc4c11527dee98bea20c
SHA132fe5da57bbe66425c3d3c89a28e7125fb0097b3
SHA2566889ea3a9d69f176351a389f92537d521abc851d1b71b47ab21c3b821cff8622
SHA5124b357dc6eb8bdc152b63bc0a5f5bce6196cf65e02a71d32ee6568d477b359c2a4ab04892249cfdb8712eb5c8ab1a78e675db47f8b3150cf2c107dc61032cd085
-
memory/416-118-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1576-132-0x0000000000000000-mapping.dmp
-
memory/1880-125-0x0000000000000000-mapping.dmp
-
memory/2020-136-0x0000000000000000-mapping.dmp
-
memory/2572-123-0x0000000000400000-0x00000000019C2000-memory.dmpFilesize
21.8MB
-
memory/2572-124-0x00000000048B0000-0x00000000048B1000-memory.dmpFilesize
4KB
-
memory/2572-121-0x0000000000000000-mapping.dmp
-
memory/3332-127-0x0000000000000000-mapping.dmp
-
memory/3988-115-0x0000000000000000-mapping.dmp
-
memory/3988-120-0x0000000000770000-0x0000000000771000-memory.dmpFilesize
4KB