Overview
overview
8Static
static
3severe_1/s...ns.txt
windows10-1703-x64
1severe_1/s...ns.txt
windows11-21h2-x64
3severe_1/s...ld.dll
windows10-1703-x64
1severe_1/s...ld.dll
windows11-21h2-x64
severe_1/s...ap.exe
windows10-1703-x64
8severe_1/s...ap.exe
windows11-21h2-x64
8severe_1/s...re.exe
windows10-1703-x64
1severe_1/s...re.exe
windows11-21h2-x64
6severe_1/s...s!.rtf
windows10-1703-x64
1severe_1/s...s!.rtf
windows11-21h2-x64
1severe_1/s...of.exe
windows10-1703-x64
1severe_1/s...of.exe
windows11-21h2-x64
1severe_1/s...s!.rtf
windows10-1703-x64
1severe_1/s...s!.rtf
windows11-21h2-x64
1severe_1/s...er.exe
windows10-1703-x64
1severe_1/s...er.exe
windows11-21h2-x64
1severe_1/s...er.exe
windows10-1703-x64
1severe_1/s...er.exe
windows11-21h2-x64
6Analysis
-
max time kernel
132s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
24/02/2024, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
severe_1/severe/Instructions.txt
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
severe_1/severe/Instructions.txt
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
severe_1/severe/dependencies/build.dll
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
severe_1/severe/dependencies/build.dll
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
severe_1/severe/md._syn/map.exe
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
severe_1/severe/md._syn/map.exe
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
severe_1/severe/software.exe
Resource
win10-20240221-en
Behavioral task
behavioral8
Sample
severe_1/severe/software.exe
Resource
win11-20240221-en
Behavioral task
behavioral9
Sample
severe_1/severe/spoof/roblox not opening, read this!.rtf
Resource
win10-20240221-en
Behavioral task
behavioral10
Sample
severe_1/severe/spoof/roblox not opening, read this!.rtf
Resource
win11-20240221-en
Behavioral task
behavioral11
Sample
severe_1/severe/spoof/spoof.exe
Resource
win10-20240221-en
Behavioral task
behavioral12
Sample
severe_1/severe/spoof/spoof.exe
Resource
win11-20240221-en
Behavioral task
behavioral13
Sample
severe_1/severe/spoof/~$blox not opening, read this!.rtf
Resource
win10-20240221-en
Behavioral task
behavioral14
Sample
severe_1/severe/spoof/~$blox not opening, read this!.rtf
Resource
win11-20240221-en
Behavioral task
behavioral15
Sample
severe_1/severe/updater.exe
Resource
win10-20240221-en
Behavioral task
behavioral16
Sample
severe_1/severe/updater.exe
Resource
win11-20240221-en
Behavioral task
behavioral17
Sample
severe_1/severe/updater.exe
Resource
win10-20240221-en
Behavioral task
behavioral18
Sample
severe_1/severe/updater.exe
Resource
win11-20240221-en
General
-
Target
severe_1/severe/md._syn/map.exe
-
Size
249KB
-
MD5
69cd3955c5a405d8c09a18e0bb270833
-
SHA1
99dde6575d012307b0e73af6333a89f3940a2a3f
-
SHA256
d0e7be944bebd1b5f7f99061083d6cf9e9feb688713184741b24a79af9dc260b
-
SHA512
b60e888cbb4134f57f7b15f455bb53b9d7f4fa4b9fa1c276a64f4cad5b88783d5fcd75a465109cf968418265b01fdca9a0f2d679405f2f92f08260cddab8bb9d
-
SSDEEP
6144:lrZ/eDy9gNzl9Xx4qbTsPsEJtOGTxnTR:lF/eDy9ol9XqqXsUEJ5
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" map.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4488 map.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 4488 map.exe