Overview
overview
10Static
static
106523.exe
windows7-x64
106523.exe
windows10-2004-x64
10Amdau.exe
windows7-x64
10Amdau.exe
windows10-2004-x64
10CLEP.exe
windows7-x64
10CLEP.exe
windows10-2004-x64
10DCKA.exe
windows7-x64
10DCKA.exe
windows10-2004-x64
10DEV.exe
windows7-x64
10DEV.exe
windows10-2004-x64
10DEVMin.exe
windows7-x64
10DEVMin.exe
windows10-2004-x64
10DevSt.exe
windows7-x64
1DevSt.exe
windows10-2004-x64
1Documents-...uz.exe
windows7-x64
7Documents-...uz.exe
windows10-2004-x64
5IqXYLXKzl6.exe
windows7-x64
IqXYLXKzl6.exe
windows10-2004-x64
1LEMON.exe
windows7-x64
10LEMON.exe
windows10-2004-x64
10LIMMin.exe
windows7-x64
10LIMMin.exe
windows10-2004-x64
10LIMSt.exe
windows7-x64
1LIMSt.exe
windows10-2004-x64
1LK2.exe
windows7-x64
10LK2.exe
windows10-2004-x64
10NINJA.exe
windows7-x64
7NINJA.exe
windows10-2004-x64
7PolymodXT.exe
windows7-x64
10PolymodXT.exe
windows10-2004-x64
10UM.exe
windows7-x64
10UM.exe
windows10-2004-x64
10Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 02:17
Behavioral task
behavioral1
Sample
6523.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6523.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Amdau.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Amdau.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
CLEP.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
CLEP.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
DCKA.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
DCKA.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
DEV.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
DEV.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
DEVMin.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
DEVMin.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
DevSt.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
DevSt.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
Documents-EnemyFrauz.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
Documents-EnemyFrauz.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
IqXYLXKzl6.exe
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
IqXYLXKzl6.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
LEMON.exe
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
LEMON.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
LIMMin.exe
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
LIMMin.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
LIMSt.exe
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
LIMSt.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
LK2.exe
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
LK2.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
NINJA.exe
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
NINJA.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
PolymodXT.exe
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
PolymodXT.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
UM.exe
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
UM.exe
Resource
win10v2004-20230915-en
General
-
Target
Documents-EnemyFrauz.exe
-
Size
1.1MB
-
MD5
a490f1848b792df4dc37c9e1b200578d
-
SHA1
f862b1f3460aafd54b1159b2a180f70e6b3d8d21
-
SHA256
b61325a676000c0afb169f63048c583bc81cb52e1690a6ccf5642decb7831b5e
-
SHA512
1e9a492976d2c80acd7cebfa8ca8fba55c3a9cb71ecf12a5c29e648f6fcc0d9d41930a33964c6b85ecbc96150a25dcc08578da5d2e0dd509d370256d4d20f268
-
SSDEEP
24576:mDXdMCbh0lhSMXlPFN3RFEuHhra2oQfKhBdY7O8gz/7:mBMPt/G29fKhBdYy8ij
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\International\Geo\Nation Documents-EnemyFrauz.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2584 set thread context of 3048 2584 Documents-EnemyFrauz.exe 29 -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29 PID 2584 wrote to memory of 3048 2584 Documents-EnemyFrauz.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Documents-EnemyFrauz.exe"C:\Users\Admin\AppData\Local\Temp\Documents-EnemyFrauz.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Documents-EnemyFrauz.exe"C:\Users\Admin\AppData\Local\Temp\Documents-EnemyFrauz.exe"2⤵
- Checks computer location settings
PID:3048
-