Overview
overview
10Static
static
101acfdefd7d...c4.exe
windows7-x64
101acfdefd7d...c4.exe
windows10-2004-x64
1020de026bf4...60.exe
windows7-x64
1020de026bf4...60.exe
windows10-2004-x64
10353b1a5ced...52.exe
windows7-x64
10353b1a5ced...52.exe
windows10-2004-x64
1037a4514026...30.exe
windows7-x64
1037a4514026...30.exe
windows10-2004-x64
1060121ea2ab...3e.exe
windows7-x64
1060121ea2ab...3e.exe
windows10-2004-x64
96ac062d21f...22.exe
windows7-x64
106ac062d21f...22.exe
windows10-2004-x64
76db9f96b1c...da.exe
windows7-x64
106db9f96b1c...da.exe
windows10-2004-x64
1071f510c40f...cf.exe
windows7-x64
1071f510c40f...cf.exe
windows10-2004-x64
1074e40db78f...83.exe
windows7-x64
1074e40db78f...83.exe
windows10-2004-x64
108245c3b357...fe.exe
windows7-x64
108245c3b357...fe.exe
windows10-2004-x64
1099829d5483...fd.exe
windows7-x64
799829d5483...fd.exe
windows10-2004-x64
79d07b89cd6...7e.exe
windows7-x64
109d07b89cd6...7e.exe
windows10-2004-x64
10b8665cf00d...53.exe
windows7-x64
10b8665cf00d...53.exe
windows10-2004-x64
10ce7606cfdf...c3.exe
windows7-x64
10ce7606cfdf...c3.exe
windows10-2004-x64
10da4a56f9db...1a.exe
windows7-x64
10da4a56f9db...1a.exe
windows10-2004-x64
10f1ee32e471...c2.exe
windows7-x64
10f1ee32e471...c2.exe
windows10-2004-x64
10Analysis
-
max time kernel
140s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 23:05
Behavioral task
behavioral1
Sample
1acfdefd7d823688159e6369f5f32ec4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1acfdefd7d823688159e6369f5f32ec4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
20de026bf4998364c894a00f7a97df60.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
20de026bf4998364c894a00f7a97df60.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
353b1a5ced1e9c3341cf45160576b852.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
353b1a5ced1e9c3341cf45160576b852.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
37a4514026f67eeebd5a8f6786a92e30.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
37a4514026f67eeebd5a8f6786a92e30.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
60121ea2ab380455f7e143cd9438443e.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
60121ea2ab380455f7e143cd9438443e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
6ac062d21f08f139d9f3d1e335e72e22.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
6ac062d21f08f139d9f3d1e335e72e22.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
6db9f96b1c56bcb56bc88904683465da.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
6db9f96b1c56bcb56bc88904683465da.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
71f510c40fe511bbc6296101698124cf.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
71f510c40fe511bbc6296101698124cf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
74e40db78ff482c904336c92e5702683.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
74e40db78ff482c904336c92e5702683.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
8245c3b357c4dfcce7e058464c58c5fe.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
8245c3b357c4dfcce7e058464c58c5fe.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
99829d5483ef57c05af928322bd5d6fd.exe
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
99829d5483ef57c05af928322bd5d6fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
9d07b89cd606bf2379ecc25fd4a4667e.exe
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
9d07b89cd606bf2379ecc25fd4a4667e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
b8665cf00d32352ee83ceb189595a753.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
b8665cf00d32352ee83ceb189595a753.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
ce7606cfdfc05f9d4b336df2c78a46c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
ce7606cfdfc05f9d4b336df2c78a46c3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
da4a56f9db3ccef32e88ad2e5c616a1a.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
da4a56f9db3ccef32e88ad2e5c616a1a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
f1ee32e471a4581b7274c00459397cc2.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
f1ee32e471a4581b7274c00459397cc2.exe
Resource
win10v2004-20240508-en
General
-
Target
9d07b89cd606bf2379ecc25fd4a4667e.exe
-
Size
96KB
-
MD5
9d07b89cd606bf2379ecc25fd4a4667e
-
SHA1
24683738ef9c5d7cff30c17ec6df6575a62859d7
-
SHA256
7260452e6bd05725074ba92b9dc8734aec12bbf4bbaacd43eea9c8bbe591be27
-
SHA512
6cd84cfa1b43cf32035ea31cef4e42222f9c72fa9a0a3806f08beaa166cbd1cf7fa883cabc136d4831c7e57588a753570e1112d55888ff7fd05d1d852b0b82cd
-
SSDEEP
1536:5B6sO7n0oShAiUIauVEe/DbplvRB2GuxaOLcb1AWRxmY:55oB0LAuVzDbpnCcBA8o
Malware Config
Extracted
C:\Users\Admin\3D Objects\# How to Decrypt Files.html
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9d07b89cd606bf2379ecc25fd4a4667e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 9d07b89cd606bf2379ecc25fd4a4667e.exe -
Executes dropped EXE 3 IoCs
Processes:
sdelete.exesdelete.exesdelete.exepid process 4568 sdelete.exe 3748 sdelete.exe 4496 sdelete.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ipinfo.io 9 ipinfo.io -
Drops file in Program Files directory 2 IoCs
Processes:
9d07b89cd606bf2379ecc25fd4a4667e.exedescription ioc process File created C:\Program Files\Touch 9d07b89cd606bf2379ecc25fd4a4667e.exe File created C:\Program Files (x86)\Touch 9d07b89cd606bf2379ecc25fd4a4667e.exe -
Drops file in Windows directory 1 IoCs
Processes:
9d07b89cd606bf2379ecc25fd4a4667e.exedescription ioc process File created C:\Windows\Touch 9d07b89cd606bf2379ecc25fd4a4667e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
9d07b89cd606bf2379ecc25fd4a4667e.exetasklist.exepid process 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe 1436 tasklist.exe 1436 tasklist.exe 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
9d07b89cd606bf2379ecc25fd4a4667e.exetasklist.exedescription pid process Token: SeDebugPrivilege 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe Token: SeIncBasePriorityPrivilege 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe Token: SeDebugPrivilege 1436 tasklist.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
9d07b89cd606bf2379ecc25fd4a4667e.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1128 wrote to memory of 1436 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe tasklist.exe PID 1128 wrote to memory of 1436 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe tasklist.exe PID 1128 wrote to memory of 1436 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe tasklist.exe PID 1128 wrote to memory of 1780 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe cmd.exe PID 1128 wrote to memory of 1780 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe cmd.exe PID 1128 wrote to memory of 1780 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe cmd.exe PID 1128 wrote to memory of 1652 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe cmd.exe PID 1128 wrote to memory of 1652 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe cmd.exe PID 1128 wrote to memory of 1652 1128 9d07b89cd606bf2379ecc25fd4a4667e.exe cmd.exe PID 1652 wrote to memory of 1676 1652 cmd.exe PING.EXE PID 1652 wrote to memory of 1676 1652 cmd.exe PING.EXE PID 1652 wrote to memory of 1676 1652 cmd.exe PING.EXE PID 1780 wrote to memory of 2536 1780 cmd.exe reg.exe PID 1780 wrote to memory of 2536 1780 cmd.exe reg.exe PID 1780 wrote to memory of 2536 1780 cmd.exe reg.exe PID 1780 wrote to memory of 3284 1780 cmd.exe reg.exe PID 1780 wrote to memory of 3284 1780 cmd.exe reg.exe PID 1780 wrote to memory of 3284 1780 cmd.exe reg.exe PID 1780 wrote to memory of 1016 1780 cmd.exe cmd.exe PID 1780 wrote to memory of 1016 1780 cmd.exe cmd.exe PID 1780 wrote to memory of 1016 1780 cmd.exe cmd.exe PID 1016 wrote to memory of 4568 1016 cmd.exe sdelete.exe PID 1016 wrote to memory of 4568 1016 cmd.exe sdelete.exe PID 1780 wrote to memory of 2468 1780 cmd.exe cmd.exe PID 1780 wrote to memory of 2468 1780 cmd.exe cmd.exe PID 1780 wrote to memory of 2468 1780 cmd.exe cmd.exe PID 2468 wrote to memory of 3748 2468 cmd.exe sdelete.exe PID 2468 wrote to memory of 3748 2468 cmd.exe sdelete.exe PID 1780 wrote to memory of 116 1780 cmd.exe cmd.exe PID 1780 wrote to memory of 116 1780 cmd.exe cmd.exe PID 1780 wrote to memory of 116 1780 cmd.exe cmd.exe PID 116 wrote to memory of 4496 116 cmd.exe sdelete.exe PID 116 wrote to memory of 4496 116 cmd.exe sdelete.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d07b89cd606bf2379ecc25fd4a4667e.exe"C:\Users\Admin\AppData\Local\Temp\9d07b89cd606bf2379ecc25fd4a4667e.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\tasklist.exe"tasklist" /V /FO CSV2⤵
- Enumerates processes with tasklist
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C cd C:\ProgramData\ && release.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Sysinternals\SDelete"3⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Software\Sysinternals\SDelete" /v EulaAccepted /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\ProgramData\sdelete.exe -c -z C:3⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\sdelete.exeC:\ProgramData\sdelete.exe -c -z C:4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\ProgramData\sdelete.exe -z D:3⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\sdelete.exeC:\ProgramData\sdelete.exe -z D:4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\ProgramData\sdelete.exe -z F:3⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\sdelete.exeC:\ProgramData\sdelete.exe -z F:4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 127.0.0.1 -n 3 > NUL&&del /Q /F /S "C:\Users\Admin\AppData\Local\Temp\9d07b89cd606bf2379ecc25fd4a4667e.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\release.batFilesize
875B
MD5c01df9dddd89e6a3be6be7d83f73eb3f
SHA118f610d8b1653bfcb35ce34508529f0224bdccea
SHA256b237074769c6a797f39ba5c89c0364793a8111ac8e9bf5907e86765d1f0931f5
SHA512d35e461d1c77ab2fd2c3a7d4e726ea38941d339a9685d222e5161960b8277c068f986e9c001e3f86d473bd14638578bf7d22eb3f45670f20704ddc46c3488c8b
-
C:\ProgramData\sdelete.exeFilesize
218KB
MD56a4e049d8c497d350a7bd54dfff99808
SHA17f1d32424c961542ae172c5b8c1611291c30fc4f
SHA25659e5ae1e99c6a4ccc01e8abdc2534210ec5faa945754a89524b06381da8c20a1
SHA51241169089fa67e1a0ff1360dc5428b89dcee0d642204ddb7dac80d6cf859caae3c2b14fa89ce72072fb780c0a93f53eb0ff9414a8e88b1d783bfa75c9c4ea353d
-
C:\Users\Admin\3D Objects\# How to Decrypt Files.htmlFilesize
10KB
MD53aa77c7c83214fbae9eba1579c5d2fc8
SHA1d490718bcc7aeee9fc02e778c5b7d57c578682c6
SHA25675e70ac86b179024b376751c03495bf2f18ba79664ef5b2b7c6049bbc53c6808
SHA5129dc4f9d9eadacccd5d4ea1e61b0ce265fb567b406fc922292b004a24c2e395b1bdeed3572ee9b965d537fb47110fdad2b7fbcd677b4baedf848702e1c067cfe7
-
memory/1128-3-0x00000000748E0000-0x0000000074E91000-memory.dmpFilesize
5.7MB
-
memory/1128-4-0x00000000748E0000-0x0000000074E91000-memory.dmpFilesize
5.7MB
-
memory/1128-5-0x00000000748E0000-0x0000000074E91000-memory.dmpFilesize
5.7MB
-
memory/1128-6-0x00000000748E0000-0x0000000074E91000-memory.dmpFilesize
5.7MB
-
memory/1128-7-0x00000000748E0000-0x0000000074E91000-memory.dmpFilesize
5.7MB
-
memory/1128-8-0x00000000748E0000-0x0000000074E91000-memory.dmpFilesize
5.7MB
-
memory/1128-0-0x00000000748E2000-0x00000000748E3000-memory.dmpFilesize
4KB
-
memory/1128-346-0x00000000748E0000-0x0000000074E91000-memory.dmpFilesize
5.7MB
-
memory/1128-2-0x00000000748E0000-0x0000000074E91000-memory.dmpFilesize
5.7MB
-
memory/1128-1-0x00000000748E0000-0x0000000074E91000-memory.dmpFilesize
5.7MB