Overview
overview
7Static
static
3Loader/Mon...RU.exe
windows7-x64
3Loader/Mon...RU.exe
windows10-2004-x64
3Loader/Mon...ll.exe
windows7-x64
3Loader/Mon...ll.exe
windows10-2004-x64
3Loader/Mon...rt.exe
windows7-x64
4Loader/Mon...rt.exe
windows10-2004-x64
5Loader/Mon...64.exe
windows7-x64
4Loader/Mon...64.exe
windows10-2004-x64
5Loader/RUN...SO.exe
windows7-x64
7Loader/RUN...SO.exe
windows10-2004-x64
7Loader/RUN...ST.exe
windows7-x64
7Loader/RUN...ST.exe
windows10-2004-x64
7Loader/Sec...64.dll
windows7-x64
1Loader/Sec...64.dll
windows10-2004-x64
1Loader/libcurl.dll
windows7-x64
1Loader/libcurl.dll
windows10-2004-x64
1Loader/spoofer.exe
windows7-x64
1Loader/spoofer.exe
windows10-2004-x64
7Loader/zlib1.dll
windows7-x64
1Loader/zlib1.dll
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
Loader/Monitor Spoof/CRU.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Loader/Monitor Spoof/CRU.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Loader/Monitor Spoof/reset-all.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Loader/Monitor Spoof/reset-all.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Loader/Monitor Spoof/restart.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Loader/Monitor Spoof/restart.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Loader/Monitor Spoof/restart64.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Loader/Monitor Spoof/restart64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Loader/RUN ME ALSO.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Loader/RUN ME ALSO.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Loader/RUN ME FIRST.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Loader/RUN ME FIRST.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Loader/SecureEngineSDK64.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Loader/SecureEngineSDK64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Loader/libcurl.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Loader/libcurl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Loader/spoofer.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Loader/spoofer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Loader/zlib1.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Loader/zlib1.dll
Resource
win10v2004-20240802-en
General
-
Target
Loader/RUN ME FIRST.exe
-
Size
24.2MB
-
MD5
101b0b9f74cdc6cdbd2570bfe92e302c
-
SHA1
2e6bae42c2842b4f558bd68099479b929bb7d910
-
SHA256
4dfe83c91124cd542f4222fe2c396cabeac617bb6f59bdcbdf89fd6f0df0a32f
-
SHA512
ccf4fd7da2c3440f1bc7fcac67c8a12599eab8d5c015affdc2e439fa30f5c7868ef5f52ede058361faae37ccc4af2c17c0adf30b8e1f852bb7106d0ec7162506
-
SSDEEP
786432:urp+Ty2SfUfnbu+zMFy/7zYgWXRLTArzttOaaFC:Sp+Ty2SfWnPzMFO7zYgWBLbFC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2752 RUN ME FIRST.exe -
Loads dropped DLL 2 IoCs
pid Process 1280 RUN ME FIRST.exe 2752 RUN ME FIRST.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RUN ME FIRST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RUN ME FIRST.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2752 1280 RUN ME FIRST.exe 31 PID 1280 wrote to memory of 2752 1280 RUN ME FIRST.exe 31 PID 1280 wrote to memory of 2752 1280 RUN ME FIRST.exe 31 PID 1280 wrote to memory of 2752 1280 RUN ME FIRST.exe 31 PID 1280 wrote to memory of 2752 1280 RUN ME FIRST.exe 31 PID 1280 wrote to memory of 2752 1280 RUN ME FIRST.exe 31 PID 1280 wrote to memory of 2752 1280 RUN ME FIRST.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader\RUN ME FIRST.exe"C:\Users\Admin\AppData\Local\Temp\Loader\RUN ME FIRST.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\Temp\{41A25D85-DB53-432B-878A-EAEF57A6DA89}\.cr\RUN ME FIRST.exe"C:\Windows\Temp\{41A25D85-DB53-432B-878A-EAEF57A6DA89}\.cr\RUN ME FIRST.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\Loader\RUN ME FIRST.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1882⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
635KB
MD553e9222bc438cbd8b7320f800bef2e78
SHA1c4f295d8855b4b16c7450a4a9150eb95046f6390
SHA2560e49026767420229afd23b1352cf9f97f24e0768c3d527000d449ffdb4ca6888
SHA5127533f9791e1807072a4dbb6ca03c696b12dfa5337678fab53aceea0e4b7e5ffefb90c9b450ac80878e1e9a4bce549f619da4cd2d06eb2554c9add5b4ec838b4a
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2