Overview
overview
10Static
static
10096bb2bde6...8f.exe
windows10-2004-x64
102decc47201...a2.exe
windows10-2004-x64
1044f28cd6ea...7e.exe
windows10-2004-x64
182ad518318...3a.exe
windows10-2004-x64
992c50cd253...b9.exe
windows10-2004-x64
6a58b5f2e81...39.exe
windows10-2004-x64
10c531015ec0...86.exe
windows10-2004-x64
8ca8b0ebbb3...0e.exe
windows10-2004-x64
9d8fd9ad2f3...3b.exe
windows10-2004-x64
10f241f35bb0...e5.exe
windows10-2004-x64
7$APPDATA/c...56.dll
windows10-2004-x64
1$APPDATA/c...om.dll
windows10-2004-x64
1$APPDATA/c...er.dll
windows10-2004-x64
1$APPDATA/c...or.dll
windows10-2004-x64
1$APPDATA/c...es.dll
windows10-2004-x64
1$APPDATA/c...ib.dll
windows10-2004-x64
1$APPDATA/cl/_ssl.dll
windows10-2004-x64
1$APPDATA/cl/bz2.dll
windows10-2004-x64
1$APPDATA/cl/cl.exe
windows10-2004-x64
1$APPDATA/cl/mklnk.cmd
windows10-2004-x64
3$APPDATA/c...at.dll
windows10-2004-x64
1$APPDATA/c...27.dll
windows10-2004-x64
3$APPDATA/c...27.dll
windows10-2004-x64
3$APPDATA/c...ve.cmd
windows10-2004-x64
1$APPDATA/c...ct.dll
windows10-2004-x64
1$APPDATA/cl/ui.exe
windows10-2004-x64
3$APPDATA/c...ta.dll
windows10-2004-x64
1$APPDATA/c...pi.dll
windows10-2004-x64
1$APPDATA/c...dh.dll
windows10-2004-x64
1$APPDATA/c...pe.dll
windows10-2004-x64
1$APPDATA/c...et.dll
windows10-2004-x64
1$PLUGINSDIR/INetC.dll
windows10-2004-x64
3Analysis
-
max time kernel
16s -
max time network
425s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2024 15:28
Behavioral task
behavioral1
Sample
096bb2bde62238273995a3a4446818a4b6b7df00fadb7ea3d068d88ca8e2798f.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
2decc47201a1d43aeec5853c4c89b7273bfdd782fcc52106a3675944739998a2.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
82ad5183183a5fa7d9f2324c67b21bb7c97ed1dd46cfb7b63494a6b94f8b893a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
a58b5f2e8172be31e3d1fcc046d044bd862393f3d3e12922287bedf6f8c18e39.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
c531015ec09adf346131a375df9b9d04c90657fac9b80f2b1e269dae6186de86.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
ca8b0ebbb30f371219c2ae79cdc0bd1dd3114cdf27821e71cfbcc11f9daca30e.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
d8fd9ad2f30cade8bf0c36f5a3acc64ccc95f625b9f3e2c0654046a531b4e83b.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
f241f35bb0f53a1baf0e5da26ef7bb86f3de83e94f3ccab04086b26f2f95dde5.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$APPDATA/cl/Crypto.Hash._SHA256.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
$APPDATA/cl/Crypto.Random.OSRNG.winrandom.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$APPDATA/cl/Crypto.Util._counter.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
$APPDATA/cl/Crypto.Util.strxor.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
$APPDATA/cl/_ctypes.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
$APPDATA/cl/_hashlib.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$APPDATA/cl/_ssl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral18
Sample
$APPDATA/cl/bz2.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$APPDATA/cl/cl.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
$APPDATA/cl/mklnk.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$APPDATA/cl/pyexpat.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
$APPDATA/cl/python27.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$APPDATA/cl/pywintypes27.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
$APPDATA/cl/remove.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$APPDATA/cl/select.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
$APPDATA/cl/ui.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$APPDATA/cl/unicodedata.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral28
Sample
$APPDATA/cl/win32api.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$APPDATA/cl/win32pdh.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral30
Sample
$APPDATA/cl/win32pipe.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
$APPDATA/cl/win32wnet.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20240709-en
General
-
Target
92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe
-
Size
986KB
-
MD5
f69cb073623d1cd054c140fc231fbeea
-
SHA1
cdbdf379204d9ee332659eb2ba456fbc96a0af65
-
SHA256
92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9
-
SHA512
83c3213880eddea42ccdcca7aff2bd6dc693b91a723a121e573d87288bf81b53c61a1e52f5ac59f3f3e761c9b88ace8c9772294b30aa9cd4ef66358bb7c56b56
-
SSDEEP
24576:WCdxte/80jYLT3U1jfsWaqP0/NHxkzK2Q:fw80cTsjkWaqIHxaM
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\y: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\k: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\m: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\q: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\t: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\u: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\w: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\b: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\e: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\g: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\h: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\s: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\z: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\a: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\i: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\l: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\p: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\r: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\v: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\j: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\n: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\o: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe File opened (read-only) \??\x: 92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe"C:\Users\Admin\AppData\Local\Temp\92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe"1⤵
- Enumerates connected drives
PID:5028
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:3908
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2236
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1464
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:388
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:4480
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:2452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ID_1fCGJXEy08oL3pJO8NQ8FvbtQL8W91_[20_07_2024_17_19]_[19041-authorization].php
Filesize2KB
MD52e4b1518cc73a4e4e5fb38869be83cfe
SHA1aec06b79d00b44797d1bcfa763c12dea78e406a3
SHA25616206cb7283306ba6accc91401729c81444012755e60d6dcdb5958fd0f696f4f
SHA5124e0572c87e36e96a3fc8e4d90fc1d369b1d744ec98771241d88c3af3f193b33767f64def09d83ad0559a2e91b61efb51be0aeae576305dd9c98e368d476760fb
-
C:\Users\Admin\AppData\Local\Temp\ID_1fCGJXEy08oL3pJO8NQ8FvbtQL8W91_[20_07_2024_17_19]_[19041-authorization].php
Filesize2KB
MD53b5c95acc4403710d556b15592bf632a
SHA10f27d4d14da5c1b90be17db03104d9573aeb2e18
SHA256475b094472186b9fff65da16c2daf060cc85200544f779bb3a083f6aa2473ea5
SHA512028b22499432138af774e831c53ef99b43a20664320d414ec6ef1cfc4aa0e3dff5f334d14621d2fa372ada2aff7cfd7edc643cc5f9e022e109821f02a492bbf1
-
C:\Users\Admin\AppData\Local\Temp\ID_1fCGJXEy08oL3pJO8NQ8FvbtQL8W91_[20_07_2024_17_19]_[19041-cabinet].php
Filesize2KB
MD5f12e239bbbe532b0636cba236bbc235a
SHA1098c6fc86f3b64ddfb8a2b4abf88c5097873d158
SHA2563445cebb7e8e030a594b36f3cd44f39bc2d56661733aa48d8be4ffdddefb9a90
SHA512042b37cfcb67f57cef1a8e2dcb42a495e2f8a167a2860477bee1bd6084803465c35d70d791cca16e2acbb861ecaa6343793f01e96bc2f2ee3c83dd8b6696db09
-
Filesize
479B
MD5e95b90cbaa1fd0356674ba8b38c71ba0
SHA112b3ea9e8ed1e3f6739dd7e7e57af398f8a93a63
SHA2565c9569d6e022106c8759d07f605311fd565cf15719a0475f9ec4e3ee1cd463f1
SHA5122c9773735f440d5cc03fec27a1c33d6a31a2e379af78a41f2489f55888abebf7712285de2ebd99277860a8c28161475587b013ce18c2d2fa5d1f1483ce37dc42