Overview
overview
10Static
static
80d406f17fa...7d.exe
windows7-x64
100d406f17fa...7d.exe
windows10-2004-x64
101396699458...83.elf
debian-9-armhf
118753a0cb6...76.exe
windows7-x64
1018753a0cb6...76.exe
windows10-2004-x64
1030a973e75f...89.xls
windows7-x64
130a973e75f...89.xls
windows10-2004-x64
13214e308dc...fb.exe
windows7-x64
103214e308dc...fb.exe
windows10-2004-x64
7361cd32a75...b5.elf
debian-12-armhf
960be4a7179...3e.elf
debian-12-armhf
16559c81490...6c.exe
windows7-x64
106559c81490...6c.exe
windows10-2004-x64
106845e34952...cc.elf
debian-9-armhf
96fdf5b4b08...0b.elf
debian-12-mipsel
744daca400...ee.exe
windows7-x64
10744daca400...ee.exe
windows10-2004-x64
107dc25c4e1e...91.exe
windows7-x64
107dc25c4e1e...91.exe
windows10-2004-x64
10819e3765d5...4d.elf
ubuntu-24.04-amd64
9835e27dcd5...73.exe
windows7-x64
7835e27dcd5...73.exe
windows10-2004-x64
78ed5281c02...d4.elf
ubuntu-22.04-amd64
8fd73ae7fb...da.exe
windows7-x64
108fd73ae7fb...da.exe
windows10-2004-x64
10add0cec032...26.exe
windows7-x64
10add0cec032...26.exe
windows10-2004-x64
10ae7dfe0fe3...a6.exe
windows7-x64
10ae7dfe0fe3...a6.exe
windows10-2004-x64
10b218376076...26.exe
windows7-x64
10b218376076...26.exe
windows10-2004-x64
10c7305e86e9...38.exe
windows7-x64
8Analysis
-
max time kernel
149s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 01:02
Behavioral task
behavioral1
Sample
0d406f17fa6d208a7c58e0907883c1a626ea38f4db206621fd241f8d62f8277d.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0d406f17fa6d208a7c58e0907883c1a626ea38f4db206621fd241f8d62f8277d.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
13966994581adf90c88d36fff75eb33c4a79557cf55fd616124a8c77f883e983.elf
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral4
Sample
18753a0cb65d2b75bd60b82de5ac799c5bc39eab29014c5a57fc04685da72076.exe
Resource
win7-20240611-en
Behavioral task
behavioral5
Sample
18753a0cb65d2b75bd60b82de5ac799c5bc39eab29014c5a57fc04685da72076.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
30a973e75f85a9ee9063fc4b17e5c6704f2e58ebfef7abe3e1d55c16f51b2e89.xls
Resource
win7-20240611-en
Behavioral task
behavioral7
Sample
30a973e75f85a9ee9063fc4b17e5c6704f2e58ebfef7abe3e1d55c16f51b2e89.xls
Resource
win10v2004-20240611-en
Behavioral task
behavioral8
Sample
3214e308dc291ff3e86eefd6f1e36883e9ebe60aa92e8b3f55a0f7ae730790fb.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
3214e308dc291ff3e86eefd6f1e36883e9ebe60aa92e8b3f55a0f7ae730790fb.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral10
Sample
361cd32a750b89857322f54b665f7f8849407ba09074e6303be0f26a351f39b5.elf
Resource
debian12-armhf-20240418-en
Behavioral task
behavioral11
Sample
60be4a7179ddc4d9f12fba876443b3d782508b26fd3a93f89c4d128396abcb3e.elf
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral12
Sample
6559c8149044fde6c8d7ba12ef151a181a3635d0e5ea673cdbb65aaea3d4156c.exe
Resource
win7-20240220-en
Behavioral task
behavioral13
Sample
6559c8149044fde6c8d7ba12ef151a181a3635d0e5ea673cdbb65aaea3d4156c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
6845e34952a416113dbc6fbffae8245d708c9bab6dc801c16f34a84744a3b7cc.elf
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral15
Sample
6fdf5b4b08a5894339c26249e190ce627b9585af846573098bed2c050d0ae80b.elf
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral16
Sample
744daca400af1f5721eaa529ec3fe427e4837e17ff4766f6bb39643aa488bfee.exe
Resource
win7-20240611-en
Behavioral task
behavioral17
Sample
744daca400af1f5721eaa529ec3fe427e4837e17ff4766f6bb39643aa488bfee.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
7dc25c4e1ebd89f13aa8ecc4fb141a9bf297851781c82d7cb630ce1802e52791.exe
Resource
win7-20240220-en
Behavioral task
behavioral19
Sample
7dc25c4e1ebd89f13aa8ecc4fb141a9bf297851781c82d7cb630ce1802e52791.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
819e3765d5c40a66951c194f67cdb783e1a711cc3499dd44a43d1cfdec06af4d.elf
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral21
Sample
835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
8ed5281c024dc7cf99273c32faa92e358392272a01898958399e324e666c4fd4.elf
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral24
Sample
8fd73ae7fb9da6bf5d793b56d1cd12a0f2cd342236cca599fb92ecdc1ea700da.exe
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
8fd73ae7fb9da6bf5d793b56d1cd12a0f2cd342236cca599fb92ecdc1ea700da.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
add0cec032cff1069925f00734c1296bd4e305c4e07006b3b0fa3b9497d8e626.exe
Resource
win7-20240611-en
Behavioral task
behavioral27
Sample
add0cec032cff1069925f00734c1296bd4e305c4e07006b3b0fa3b9497d8e626.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral28
Sample
ae7dfe0fe3ea9ba1dae5221072a51896c9b6c8384eb6514fb9dacbf9d6c7fca6.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
ae7dfe0fe3ea9ba1dae5221072a51896c9b6c8384eb6514fb9dacbf9d6c7fca6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral30
Sample
b2183760768b6dffb3c3f4c28510c6e32cae125d46f5d4e046bbdfd860d46b26.exe
Resource
win7-20240508-en
Behavioral task
behavioral31
Sample
b2183760768b6dffb3c3f4c28510c6e32cae125d46f5d4e046bbdfd860d46b26.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral32
Sample
c7305e86e90093f34bae25efd97eb5a8fed3a6b985b1633ee99ffff608211838.exe
Resource
win7-20240508-en
General
-
Target
835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exe
-
Size
855KB
-
MD5
93e1256e37cac4fa162ea90eeb7c72b1
-
SHA1
e0118027062bef44053998f74162d4e125cc2d61
-
SHA256
835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73
-
SHA512
a34143ad4aa2d09ee08d458c3a22cd9b005dcb20724ea34a00e7ac5ec46d3840cf191a5bb05fad52a50833029bb941c0852b7863475c1e9b92dcc605dccb75ce
-
SSDEEP
12288:755MHyv+3UDgck8JvirnUdnUwNwtK+CVINPX9yKBg7vjKP:15MHGhS8J3B/moit9yKe/K
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exe -
Drops startup file 3 IoCs
Processes:
cmd.exe835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nfjtur874uu\nc8f8ruu.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nfjtur874uu\nc8f8ruu.exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nc8f8ruu.lnk 835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exe -
Executes dropped EXE 1 IoCs
Processes:
nc8f8ruu.exepid process 1544 nc8f8ruu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exenheyryryy4u.exenc8f8ruu.exepid process 4468 835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 3916 nheyryryy4u.exe 1544 nc8f8ruu.exe 1544 nc8f8ruu.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exepid process 4468 835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exenheyryryy4u.exenc8f8ruu.exedescription pid process Token: SeDebugPrivilege 4468 835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exe Token: SeDebugPrivilege 3916 nheyryryy4u.exe Token: SeDebugPrivilege 1544 nc8f8ruu.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exenheyryryy4u.execmd.exenc8f8ruu.exedescription pid process target process PID 4468 wrote to memory of 3916 4468 835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exe nheyryryy4u.exe PID 4468 wrote to memory of 3916 4468 835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exe nheyryryy4u.exe PID 4468 wrote to memory of 3916 4468 835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exe nheyryryy4u.exe PID 3916 wrote to memory of 3760 3916 nheyryryy4u.exe cmd.exe PID 3916 wrote to memory of 3760 3916 nheyryryy4u.exe cmd.exe PID 3916 wrote to memory of 3760 3916 nheyryryy4u.exe cmd.exe PID 3760 wrote to memory of 2448 3760 cmd.exe PING.EXE PID 3760 wrote to memory of 2448 3760 cmd.exe PING.EXE PID 3760 wrote to memory of 2448 3760 cmd.exe PING.EXE PID 3760 wrote to memory of 1836 3760 cmd.exe PING.EXE PID 3760 wrote to memory of 1836 3760 cmd.exe PING.EXE PID 3760 wrote to memory of 1836 3760 cmd.exe PING.EXE PID 3760 wrote to memory of 1544 3760 cmd.exe nc8f8ruu.exe PID 3760 wrote to memory of 1544 3760 cmd.exe nc8f8ruu.exe PID 3760 wrote to memory of 1544 3760 cmd.exe nc8f8ruu.exe PID 1544 wrote to memory of 3156 1544 nc8f8ruu.exe AddInProcess32.exe PID 1544 wrote to memory of 3156 1544 nc8f8ruu.exe AddInProcess32.exe PID 1544 wrote to memory of 3156 1544 nc8f8ruu.exe AddInProcess32.exe PID 1544 wrote to memory of 3156 1544 nc8f8ruu.exe AddInProcess32.exe PID 1544 wrote to memory of 3156 1544 nc8f8ruu.exe AddInProcess32.exe PID 1544 wrote to memory of 3156 1544 nc8f8ruu.exe AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exe"C:\Users\Admin\AppData\Local\Temp\835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\nheyryryy4u.exe"C:\Users\Admin\AppData\Local\Temp\nheyryryy4u.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 39 > nul && copy "C:\Users\Admin\AppData\Local\Temp\nheyryryy4u.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nfjtur874uu\nc8f8ruu.exe" && ping 127.0.0.1 -n 39 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nfjtur874uu\nc8f8ruu.exe"3⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 394⤵
- Runs ping.exe
PID:2448 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 394⤵
- Runs ping.exe
PID:1836 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nfjtur874uu\nc8f8ruu.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nfjtur874uu\nc8f8ruu.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵PID:3156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nfjtur874uu\nc8f8ruu.exeFilesize
855KB
MD593e1256e37cac4fa162ea90eeb7c72b1
SHA1e0118027062bef44053998f74162d4e125cc2d61
SHA256835e27dcd567204d905fb88c8a7d9e086349f8fd626721e5364041c15a332f73
SHA512a34143ad4aa2d09ee08d458c3a22cd9b005dcb20724ea34a00e7ac5ec46d3840cf191a5bb05fad52a50833029bb941c0852b7863475c1e9b92dcc605dccb75ce
-
memory/1544-25-0x0000000007100000-0x0000000007106000-memory.dmpFilesize
24KB
-
memory/1544-24-0x0000000007090000-0x00000000070AA000-memory.dmpFilesize
104KB
-
memory/1544-23-0x0000000000430000-0x000000000050C000-memory.dmpFilesize
880KB
-
memory/3916-12-0x0000000074700000-0x0000000074EB0000-memory.dmpFilesize
7.7MB
-
memory/3916-17-0x0000000074700000-0x0000000074EB0000-memory.dmpFilesize
7.7MB
-
memory/3916-15-0x0000000074700000-0x0000000074EB0000-memory.dmpFilesize
7.7MB
-
memory/3916-14-0x0000000074700000-0x0000000074EB0000-memory.dmpFilesize
7.7MB
-
memory/3916-13-0x0000000074700000-0x0000000074EB0000-memory.dmpFilesize
7.7MB
-
memory/4468-4-0x0000000004D60000-0x0000000004DF2000-memory.dmpFilesize
584KB
-
memory/4468-11-0x0000000074700000-0x0000000074EB0000-memory.dmpFilesize
7.7MB
-
memory/4468-9-0x0000000007030000-0x000000000755C000-memory.dmpFilesize
5.2MB
-
memory/4468-7-0x0000000005900000-0x000000000590A000-memory.dmpFilesize
40KB
-
memory/4468-6-0x0000000005080000-0x00000000050C4000-memory.dmpFilesize
272KB
-
memory/4468-5-0x0000000074700000-0x0000000074EB0000-memory.dmpFilesize
7.7MB
-
memory/4468-0-0x000000007470E000-0x000000007470F000-memory.dmpFilesize
4KB
-
memory/4468-3-0x0000000005310000-0x00000000058B4000-memory.dmpFilesize
5.6MB
-
memory/4468-2-0x0000000004CC0000-0x0000000004D5C000-memory.dmpFilesize
624KB
-
memory/4468-1-0x0000000000A80000-0x0000000000B5C000-memory.dmpFilesize
880KB