Overview
overview
7Static
static
352c4541734...0N.exe
windows7-x64
752c4541734...0N.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3get.cmd
windows7-x64
1get.cmd
windows10-2004-x64
3ls.cmd
windows7-x64
1ls.cmd
windows10-2004-x64
1split.cmd
windows7-x64
1split.cmd
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7zAnsi.exe
windows7-x64
1zAnsi.exe
windows10-2004-x64
3zBck.exe
windows7-x64
3zBck.exe
windows10-2004-x64
3zBeg.exe
windows7-x64
1zBeg.exe
windows10-2004-x64
3zBoxbackup.exe
windows7-x64
3zBoxbackup.exe
windows10-2004-x64
3zByteSwap.exe
windows7-x64
1zByteSwap.exe
windows10-2004-x64
3zClock.exe
windows7-x64
3zClock.exe
windows10-2004-x64
3zComp.exe
windows7-x64
1zComp.exe
windows10-2004-x64
3zDelTree.exe
windows7-x64
1zDelTree.exe
windows10-2004-x64
3zDir.exe
windows7-x64
1zDir.exe
windows10-2004-x64
3zDirSync.exe
windows7-x64
3zDirSync.exe
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
52c45417346ec66003be870876e5aed0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
52c45417346ec66003be870876e5aed0N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
get.cmd
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
get.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ls.cmd
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
ls.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
split.cmd
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
split.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
uninst.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
zAnsi.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
zAnsi.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
zBck.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
zBck.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
zBeg.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
zBeg.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
zBoxbackup.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
zBoxbackup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
zByteSwap.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
zByteSwap.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
zClock.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
zClock.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
zComp.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
zComp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
zDelTree.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
zDelTree.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
zDir.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
zDir.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
zDirSync.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
zDirSync.exe
Resource
win10v2004-20240802-en
General
-
Target
get.cmd
-
Size
49B
-
MD5
a8f88d66815ba23a14e13f2c653d2dd1
-
SHA1
a98f019b5b974ab740f0d1e43d28d19e50f4a32a
-
SHA256
60e62f52391683a2df8d7077f849676af0eb9e43a1a03998da00f7a1892c7fad
-
SHA512
8ab12ba70a940e911d7b8387ed73f7543492ab193ad9f16306c57ea4eb97c49ae46f637cc5eb446ca2d0383f34ab7761f31c802d5614e137ee6fd2cacde430bc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zDownload.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3832 wrote to memory of 812 3832 cmd.exe 85 PID 3832 wrote to memory of 812 3832 cmd.exe 85 PID 3832 wrote to memory of 812 3832 cmd.exe 85