Overview
overview
7Static
static
3Delta V3.61.zip
windows10-2004-x64
7Delta V3.61.zip
windows10-ltsc 2021-x64
1Delta V3.61/Delta.exe
windows10-2004-x64
6Delta V3.61/Delta.exe
windows10-ltsc 2021-x64
6Delta V3.6...it.dll
windows10-2004-x64
1Delta V3.6...it.dll
windows10-ltsc 2021-x64
1Delta V3.6...on.dll
windows10-2004-x64
1Delta V3.6...on.dll
windows10-ltsc 2021-x64
1Delta V3.6...90.dll
windows10-2004-x64
3Delta V3.6...90.dll
windows10-ltsc 2021-x64
3Delta V3.6...92.dll
windows10-2004-x64
3Delta V3.6...92.dll
windows10-ltsc 2021-x64
3Delta V3.6...PI.dll
windows10-2004-x64
3Delta V3.6...PI.dll
windows10-ltsc 2021-x64
3Delta V3.6...ua.xml
windows10-2004-x64
1Delta V3.6...ua.xml
windows10-ltsc 2021-x64
3Delta V3.6...s.json
windows10-2004-x64
3Delta V3.6...s.json
windows10-ltsc 2021-x64
3Delta V3.6...rs.txt
windows10-2004-x64
1Delta V3.6...rs.txt
windows10-ltsc 2021-x64
1Delta V3.6...re.txt
windows10-2004-x64
1Delta V3.6...re.txt
windows10-ltsc 2021-x64
1Resubmissions
07-11-2024 21:24
241107-z8z12ayfnb 807-11-2024 21:23
241107-z8jdaa1pdl 607-11-2024 21:21
241107-z7ptnsyjdx 7Analysis
-
max time kernel
1151s -
max time network
1146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 21:21
Static task
static1
Behavioral task
behavioral1
Sample
Delta V3.61.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Delta V3.61.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
Delta V3.61/Delta.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Delta V3.61/Delta.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
Delta V3.61/ICSharpCode.AvalonEdit.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Delta V3.61/ICSharpCode.AvalonEdit.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
Delta V3.61/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Delta V3.61/Newtonsoft.Json.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
Delta V3.61/bin/590.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
Delta V3.61/bin/590.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
Delta V3.61/bin/592.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
Delta V3.61/bin/592.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
Delta V3.61/bin/Fluxteam_net_API.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
Delta V3.61/bin/Fluxteam_net_API.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
Delta V3.61/bin/lua.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
Delta V3.61/bin/lua.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
Delta V3.61/bin/modules.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
Delta V3.61/bin/modules.json
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
Delta V3.61/bin/vers.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
Delta V3.61/bin/vers.txt
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
Delta V3.61/scripts/Put your own scripts in here.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
Delta V3.61/scripts/Put your own scripts in here.txt
Resource
win10ltsc2021-20241023-en
General
-
Target
Delta V3.61.zip
-
Size
22.2MB
-
MD5
2692ff99a5f94520b6caa33bbd0cf05e
-
SHA1
0bf675fad129bc61f7c2763177a4314288cce4cd
-
SHA256
507641e3047216809af93a127af70a266e273cd95c1cfaa06605a753b9166388
-
SHA512
65d9665d29684325ca27a33ec187be8ccb142f98f662f888b944750ffcfcea43c496403331ab00e5e408dc5b1c3d39d7fc2defdecb1133a41dcc5d00c7c0392c
-
SSDEEP
393216:p1DbvOskyq5reDYwFpIgDDLB3IwuZcnO7BjOOPhQEFu9QZay7qPF4zjop3Lr:zDbvOPADJpIelBnO7B6OPhjFu9eaDPFj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4044 Delta.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 556 4044 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Delta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5112 7zFM.exe 5112 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5112 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 5112 7zFM.exe Token: 35 5112 7zFM.exe Token: SeSecurityPrivilege 5112 7zFM.exe Token: SeSecurityPrivilege 5112 7zFM.exe Token: SeSecurityPrivilege 5112 7zFM.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 5112 7zFM.exe 5112 7zFM.exe 5112 7zFM.exe 5112 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5112 wrote to memory of 4044 5112 7zFM.exe 97 PID 5112 wrote to memory of 4044 5112 7zFM.exe 97 PID 5112 wrote to memory of 4044 5112 7zFM.exe 97
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Delta V3.61.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\7zO8F36C3E7\Delta.exe"C:\Users\Admin\AppData\Local\Temp\7zO8F36C3E7\Delta.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 13283⤵
- Program crash
PID:556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4044 -ip 40441⤵PID:4720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17.0MB
MD5774ffee84d8e760761b8819edd2bc252
SHA174ff2bcc3baf64790181b97dc09ab951d9440379
SHA2563c2cbcfb0dc0b92e1a0f15e725a1f8c4756a990e298098d94087cdd3fd491758
SHA512935624fdaa9ae57d4515a456a9383c20240988848046fcab69948450413e573167c0f17a456f0f5120ec13e3215759ad11c4857873900606116c3e495dd69650