Overview
overview
10Static
static
10001.exe
windows7-x64
10001.exe
windows10-2004-x64
101488.exe
windows7-x64
101488.exe
windows10-2004-x64
101_cr.exe
windows7-x64
51_cr.exe
windows10-2004-x64
11cr.exe
windows7-x64
101cr.exe
windows10-2004-x64
101fc2d.exe
windows7-x64
101fc2d.exe
windows10-2004-x64
106e7_2021-0...04.exe
windows7-x64
106e7_2021-0...04.exe
windows10-2004-x64
10Abjects.exe
windows7-x64
1Abjects.exe
windows10-2004-x64
1BattleText.exe
windows7-x64
9BattleText.exe
windows10-2004-x64
10HANS.exe
windows7-x64
1HANS.exe
windows10-2004-x64
1Hulu.exe
windows7-x64
7Hulu.exe
windows10-2004-x64
7IntelFIVE.exe
windows7-x64
3IntelFIVE.exe
windows10-2004-x64
7IntelFOUR.exe
windows7-x64
3IntelFOUR.exe
windows10-2004-x64
7IntelONE.exe
windows7-x64
3IntelONE.exe
windows10-2004-x64
7IntelTHREE.exe
windows7-x64
3IntelTHREE.exe
windows10-2004-x64
7IntelTWO.exe
windows7-x64
3IntelTWO.exe
windows10-2004-x64
7Lucky_Fixed.exe
windows7-x64
1Lucky_Fixed.exe
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 04:03
Behavioral task
behavioral1
Sample
001.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
001.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
1488.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
1488.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
1_cr.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1_cr.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
1cr.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
1cr.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
1fc2d.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
1fc2d.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
6e7_2021-01-19_18-04.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
6e7_2021-01-19_18-04.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Abjects.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Abjects.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
BattleText.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
BattleText.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
HANS.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
HANS.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Hulu.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Hulu.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
IntelFIVE.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
IntelFIVE.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
IntelFOUR.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
IntelFOUR.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
IntelONE.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
IntelONE.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
IntelTHREE.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
IntelTHREE.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
IntelTWO.exe
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
IntelTWO.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Lucky_Fixed.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Lucky_Fixed.exe
Resource
win10v2004-20240226-en
General
-
Target
Hulu.exe
-
Size
1.4MB
-
MD5
64be5264f3a58325446865be38c05b34
-
SHA1
fdbad9468075747a4999b7b30fa7cb7b60fdcb4e
-
SHA256
561a8b830e902a0ba18457a0aa8db8a8c663de8ee33e6009f236cedff00f8cbb
-
SHA512
d48fac03082d1f12cf1d175978f64e9d2df467828601b34474c77bf139c6c0dae5002ad2f1e106c46e6fb6c4ef8083e011931a74dd0adcbb0a43cdeae16cd0d0
-
SSDEEP
24576:Z53uhF9SQLLqzkUQrRjlOYvsiEP+tsDirDlmLrgH4tN96yk8ISOm1w+p6njCph5r:Z5+hFsQLLqAllIqsDirDlAOUw+4852Y
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Hulu.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Hulu.exe -
Drops startup file 1 IoCs
Processes:
Custodiva.exe.comdescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GRyYpiVyQV.url Custodiva.exe.com -
Executes dropped EXE 3 IoCs
Processes:
Custodiva.exe.comCustodiva.exe.comRegAsm.exepid process 5088 Custodiva.exe.com 3736 Custodiva.exe.com 2964 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Custodiva.exe.comdescription pid process target process PID 3736 set thread context of 2964 3736 Custodiva.exe.com RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
Hulu.execmd.execmd.exeCustodiva.exe.comCustodiva.exe.comdescription pid process target process PID 5060 wrote to memory of 3576 5060 Hulu.exe cmd.exe PID 5060 wrote to memory of 3576 5060 Hulu.exe cmd.exe PID 5060 wrote to memory of 3576 5060 Hulu.exe cmd.exe PID 5060 wrote to memory of 5048 5060 Hulu.exe cmd.exe PID 5060 wrote to memory of 5048 5060 Hulu.exe cmd.exe PID 5060 wrote to memory of 5048 5060 Hulu.exe cmd.exe PID 5048 wrote to memory of 3288 5048 cmd.exe cmd.exe PID 5048 wrote to memory of 3288 5048 cmd.exe cmd.exe PID 5048 wrote to memory of 3288 5048 cmd.exe cmd.exe PID 3288 wrote to memory of 4112 3288 cmd.exe findstr.exe PID 3288 wrote to memory of 4112 3288 cmd.exe findstr.exe PID 3288 wrote to memory of 4112 3288 cmd.exe findstr.exe PID 3288 wrote to memory of 5088 3288 cmd.exe Custodiva.exe.com PID 3288 wrote to memory of 5088 3288 cmd.exe Custodiva.exe.com PID 3288 wrote to memory of 5088 3288 cmd.exe Custodiva.exe.com PID 3288 wrote to memory of 2852 3288 cmd.exe PING.EXE PID 3288 wrote to memory of 2852 3288 cmd.exe PING.EXE PID 3288 wrote to memory of 2852 3288 cmd.exe PING.EXE PID 5088 wrote to memory of 3736 5088 Custodiva.exe.com Custodiva.exe.com PID 5088 wrote to memory of 3736 5088 Custodiva.exe.com Custodiva.exe.com PID 5088 wrote to memory of 3736 5088 Custodiva.exe.com Custodiva.exe.com PID 3736 wrote to memory of 2964 3736 Custodiva.exe.com RegAsm.exe PID 3736 wrote to memory of 2964 3736 Custodiva.exe.com RegAsm.exe PID 3736 wrote to memory of 2964 3736 Custodiva.exe.com RegAsm.exe PID 3736 wrote to memory of 2964 3736 Custodiva.exe.com RegAsm.exe PID 3736 wrote to memory of 2964 3736 Custodiva.exe.com RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Hulu.exe"C:\Users\Admin\AppData\Local\Temp\Hulu.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo xlEPMOAZC2⤵PID:3576
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\cmd.exe < Strazii.xlsm2⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^unowfSGqElRNjSdIsHGXTopdtGkBtbAqMZrTUgLOVVaETGrALikdphrYfSXIHyWiJRqhPbOeWSeXPEbbDKPWjlRmWyDwsruPYkUwFPLgzoxdlypLcmyWfqVmqBsKTMLSLjYEJcRNZBDrPAgQW$" Nel.xlm4⤵PID:4112
-
-
C:\Users\Admin\AppData\Roaming\rzVBBfiLGjYqEZEI\Custodiva.exe.comCustodiva.exe.com x4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Roaming\rzVBBfiLGjYqEZEI\Custodiva.exe.comC:\Users\Admin\AppData\Roaming\rzVBBfiLGjYqEZEI\Custodiva.exe.com x5⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Roaming\rzVBBfiLGjYqEZEI\RegAsm.exeC:\Users\Admin\AppData\Roaming\rzVBBfiLGjYqEZEI\RegAsm.exe6⤵
- Executes dropped EXE
PID:2964
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:2852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD597b0b795b4381a5615d947d06a57863f
SHA16aba8233ad08025999eefeaf2b3ef1c2b87d5b43
SHA256388c88469163fa5c5203f2220eb2ab33657a70f6e54b31c892f08c41e6b655da
SHA512462e0f05192741a6f0a74fabd3e3980e05639131e7885f4e4ec07f35c23907ea5771f2148a5845adb46779b179cc095a00dc610f0c8fd297ecc0901c02bccef4
-
Filesize
921KB
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
Filesize
1.1MB
MD5c40aedf42a2a6ac7180faf758d9226d3
SHA1b2b08f15c7a44ced41c6bd5b4e6ad7633f52c232
SHA25616c8eba47d5fe03f6b585167bb6fca9c1a84a5d1d618856cf276928023db9c91
SHA512a461c75a6f66af825e90c0dd26a019ed2c52828365bed405cdb8c2c57a910b0d4213107793074539a9acc25369ab51091f55d75120b7416ae3eb72d454db2e36
-
Filesize
921KB
MD5b85b38b10451939fc1854101c956bdf2
SHA16dc475a8af192ce80c21375a5437ebf551e26302
SHA256b3ab31be73fa197a1f5b481642a8516d0a35dfff16b8fad828819af51a6263ff
SHA512127304b38576d66c8bfa111d9ec6edd5fe6c886132d772586d68745580072a0c39a23100652293bc181a10b04466af3651ec00c7b8f6dcf0a6495be441f7e0bc
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
293KB
MD5ceb6206dda91fc75b5b14fe0c9e250ce
SHA19580b353c97d26cbd9a457d86cdda0ff7c2bbd3e
SHA2569fe0fecab9769c4fa65ee5a7bf666e260e227cf66778bd70e16e7279d05af2c9
SHA512dc16452cbd96c2692e211587f097e0897a02cfd30a60b53f12038be609dc68aed12d56646f2aba147866a723ea3fb52871f0a5baa68b453487906bb910d7d53b
-
Filesize
115KB
MD53d8bd8c68f1a36d9a6b4d9763fb3fd6e
SHA1c16b2ee9471188ac135c7d4546fe4c47001e3e3c
SHA25623603f51bfe4e2dd093fffb07d07e7cddac50affdfc6359903b03d53e282f0f1
SHA512ab65dc9d786f0e9520ff500c3d00ca8f872b10bc777ea2d4dc9765dd63bf693f1ba16de2f7a186dd1ffb6e314ef23558040ae62d0956b4f80c8aa74ed2399579