Overview
overview
10Static
static
107zS850A099...ed.exe
windows7-x64
37zS850A099...ed.exe
windows10-2004-x64
77zS850A099...1a.exe
windows7-x64
77zS850A099...1a.exe
windows10-2004-x64
77zS850A099...b7.exe
windows7-x64
107zS850A099...b7.exe
windows10-2004-x64
107zS850A099...5e.exe
windows7-x64
67zS850A099...5e.exe
windows10-2004-x64
67zS850A099...a0.exe
windows7-x64
107zS850A099...a0.exe
windows10-2004-x64
107zS850A099...95.exe
windows7-x64
87zS850A099...95.exe
windows10-2004-x64
77zS850A099...cb.exe
windows7-x64
107zS850A099...cb.exe
windows10-2004-x64
107zS850A099...58.exe
windows7-x64
107zS850A099...58.exe
windows10-2004-x64
107zS850A099...7f.exe
windows7-x64
107zS850A099...7f.exe
windows10-2004-x64
107zS850A099...32.exe
windows7-x64
107zS850A099...32.exe
windows10-2004-x64
107zS850A099...c3.exe
windows7-x64
97zS850A099...c3.exe
windows10-2004-x64
97zS850A099...e9.exe
windows7-x64
107zS850A099...e9.exe
windows10-2004-x64
107zS850A099...8c.exe
windows7-x64
37zS850A099...8c.exe
windows10-2004-x64
37zS850A099...8c.exe
windows7-x64
67zS850A099...8c.exe
windows10-2004-x64
67zS850A099...rl.dll
windows7-x64
37zS850A099...rl.dll
windows10-2004-x64
37zS850A099...pp.dll
windows7-x64
37zS850A099...pp.dll
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 09:59
Behavioral task
behavioral1
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7zS850A099E/libcurl.dll
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
7zS850A099E/libcurl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
7zS850A099E/libcurlpp.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
7zS850A099E/libcurlpp.dll
Resource
win10v2004-20241007-en
General
-
Target
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
-
Size
381KB
-
MD5
996061fe21353bf63874579cc6c090cc
-
SHA1
eeaf5d66e0ff5e9ddad02653c5bf6af5275e47e9
-
SHA256
b9dad89b3de1d7f9a4b73a5d107c74f716a6e2e89d653c48ab47108b37ad699a
-
SHA512
042ea077acfc0dff8684a5eb304af15177c4e6f54c774471b8091669b1ab16833894ca7a52917f8a6bbeacbb6532db521cea61d70ac4c5c992cb4896083d6c93
-
SSDEEP
6144:6/QiQPZdDY39EiBeNyz9P8ISaLCW3MjukOQ/UBTlakaBdGOzGfnXpiQCsoazZPEj:CQiGZ+NEiBePIpLveu+MBTlPadSfXio0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
61e74fd3252fe_Tue23df2ad021a.tmp61e74fd3252fe_Tue23df2ad021a.tmppid process 2060 61e74fd3252fe_Tue23df2ad021a.tmp 2668 61e74fd3252fe_Tue23df2ad021a.tmp -
Loads dropped DLL 8 IoCs
Processes:
61e74fd3252fe_Tue23df2ad021a.exe61e74fd3252fe_Tue23df2ad021a.tmp61e74fd3252fe_Tue23df2ad021a.exe61e74fd3252fe_Tue23df2ad021a.tmppid process 2572 61e74fd3252fe_Tue23df2ad021a.exe 2060 61e74fd3252fe_Tue23df2ad021a.tmp 2060 61e74fd3252fe_Tue23df2ad021a.tmp 2060 61e74fd3252fe_Tue23df2ad021a.tmp 1688 61e74fd3252fe_Tue23df2ad021a.exe 2668 61e74fd3252fe_Tue23df2ad021a.tmp 2668 61e74fd3252fe_Tue23df2ad021a.tmp 2668 61e74fd3252fe_Tue23df2ad021a.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
61e74fd3252fe_Tue23df2ad021a.tmp61e74fd3252fe_Tue23df2ad021a.exe61e74fd3252fe_Tue23df2ad021a.tmp61e74fd3252fe_Tue23df2ad021a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61e74fd3252fe_Tue23df2ad021a.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61e74fd3252fe_Tue23df2ad021a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61e74fd3252fe_Tue23df2ad021a.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61e74fd3252fe_Tue23df2ad021a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
61e74fd3252fe_Tue23df2ad021a.tmppid process 2668 61e74fd3252fe_Tue23df2ad021a.tmp -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
61e74fd3252fe_Tue23df2ad021a.exe61e74fd3252fe_Tue23df2ad021a.tmp61e74fd3252fe_Tue23df2ad021a.exedescription pid process target process PID 2572 wrote to memory of 2060 2572 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 2572 wrote to memory of 2060 2572 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 2572 wrote to memory of 2060 2572 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 2572 wrote to memory of 2060 2572 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 2572 wrote to memory of 2060 2572 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 2572 wrote to memory of 2060 2572 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 2572 wrote to memory of 2060 2572 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 2060 wrote to memory of 1688 2060 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 2060 wrote to memory of 1688 2060 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 2060 wrote to memory of 1688 2060 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 2060 wrote to memory of 1688 2060 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 2060 wrote to memory of 1688 2060 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 2060 wrote to memory of 1688 2060 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 2060 wrote to memory of 1688 2060 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 1688 wrote to memory of 2668 1688 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 1688 wrote to memory of 2668 1688 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 1688 wrote to memory of 2668 1688 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 1688 wrote to memory of 2668 1688 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 1688 wrote to memory of 2668 1688 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 1688 wrote to memory of 2668 1688 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 1688 wrote to memory of 2668 1688 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\is-8GLKF.tmp\61e74fd3252fe_Tue23df2ad021a.tmp"C:\Users\Admin\AppData\Local\Temp\is-8GLKF.tmp\61e74fd3252fe_Tue23df2ad021a.tmp" /SL5="$5014E,140765,56832,C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe" /SILENT3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\is-5I6JP.tmp\61e74fd3252fe_Tue23df2ad021a.tmp"C:\Users\Admin\AppData\Local\Temp\is-5I6JP.tmp\61e74fd3252fe_Tue23df2ad021a.tmp" /SL5="$6014E,140765,56832,C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe" /SILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2668
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
691KB
MD59303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
216KB
MD5b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc