Overview
overview
10Static
static
517-10-2024...QW.exe
windows7-x64
17-10-2024...QW.exe
windows10-2004-x64
17-10-2024...er.exe
windows7-x64
717-10-2024...er.exe
windows10-2004-x64
717-10-2024...ys.exe
windows7-x64
917-10-2024...ys.exe
windows10-2004-x64
917-10-2024...er.exe
windows7-x64
317-10-2024...er.exe
windows10-2004-x64
317-10-2024...er.exe
windows7-x64
317-10-2024...er.exe
windows10-2004-x64
317-10-2024...re.exe
windows7-x64
1017-10-2024...re.exe
windows10-2004-x64
1017-10-2024...ix.exe
windows7-x64
117-10-2024...ix.exe
windows10-2004-x64
317-10-2024...nt.exe
windows7-x64
1017-10-2024...nt.exe
windows10-2004-x64
1017-10-2024...re.exe
windows7-x64
517-10-2024...re.exe
windows10-2004-x64
517-10-2024...NG.dll
windows7-x64
317-10-2024...NG.dll
windows10-2004-x64
317-10-2024...op.exe
windows7-x64
717-10-2024...op.exe
windows10-2004-x64
717-10-2024...er.exe
windows7-x64
717-10-2024...er.exe
windows10-2004-x64
717-10-2024...an.exe
windows7-x64
317-10-2024...an.exe
windows10-2004-x64
317-10-2024...ie.exe
windows7-x64
517-10-2024...ie.exe
windows10-2004-x64
517-10-2024...oe.exe
windows7-x64
717-10-2024...oe.exe
windows10-2004-x64
717-10-2024...ge.exe
windows7-x64
617-10-2024...ge.exe
windows10-2004-x64
6Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 22:34
Behavioral task
behavioral1
Sample
17-10-2024 #20/AQW.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17-10-2024 #20/AQW.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
17-10-2024 #20/Adobe Reader.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
17-10-2024 #20/Adobe Reader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
17-10-2024 #20/Barys.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
17-10-2024 #20/Barys.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
17-10-2024 #20/Butcher Crypter.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
17-10-2024 #20/Butcher Crypter.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
17-10-2024 #20/Dynamer.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
17-10-2024 #20/Dynamer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
17-10-2024 #20/Explore.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
17-10-2024 #20/Explore.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
17-10-2024 #20/FloodFix.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
17-10-2024 #20/FloodFix.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
17-10-2024 #20/Flyagent.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
17-10-2024 #20/Flyagent.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
17-10-2024 #20/InstallCore.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
17-10-2024 #20/InstallCore.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
17-10-2024 #20/MSRATING.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
17-10-2024 #20/MSRATING.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
17-10-2024 #20/MulDrop.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
17-10-2024 #20/MulDrop.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
17-10-2024 #20/TSULoader.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
17-10-2024 #20/TSULoader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
17-10-2024 #20/UtilMan.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
17-10-2024 #20/UtilMan.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
17-10-2024 #20/Zombie.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
17-10-2024 #20/Zombie.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
17-10-2024 #20/app stroe.exe
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
17-10-2024 #20/app stroe.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
17-10-2024 #20/assemblychange.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
17-10-2024 #20/assemblychange.exe
Resource
win10v2004-20241007-en
General
-
Target
17-10-2024 #20/Adobe Reader.exe
-
Size
40KB
-
MD5
417abe62696fb26013631a4ceccd4cf0
-
SHA1
2c2428dcf3b8a3385176322458914b466246a0ed
-
SHA256
abfe2cb54b9576e0ecf67ade15b1ced533e8abc1d930098e62c1e09dbe8f96f3
-
SHA512
d9e6b5b21273bd2fb206b8f23bb65c3cc529df91c1f7b40560e0afd685bfdef5f4d0af6c9765d2bb191a9b9d79391fe1592749e09896f901b83fd12ee2267007
-
SSDEEP
768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRiw:qTJu9cvMOtEvwDpjppVXzRx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Adobe Reader.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Adobe Reader.exe -
Executes dropped EXE 1 IoCs
Processes:
asih.exepid process 4208 asih.exe -
Processes:
resource yara_rule behavioral4/memory/3904-0-0x0000000000500000-0x000000000050F000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\asih.exe upx behavioral4/memory/3904-18-0x0000000000500000-0x000000000050F000-memory.dmp upx behavioral4/memory/4208-27-0x0000000000500000-0x000000000050F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Adobe Reader.exeasih.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobe Reader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Adobe Reader.exedescription pid process target process PID 3904 wrote to memory of 4208 3904 Adobe Reader.exe asih.exe PID 3904 wrote to memory of 4208 3904 Adobe Reader.exe asih.exe PID 3904 wrote to memory of 4208 3904 Adobe Reader.exe asih.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17-10-2024 #20\Adobe Reader.exe"C:\Users\Admin\AppData\Local\Temp\17-10-2024 #20\Adobe Reader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD570ad66092dc58c51a3594b425f6ede37
SHA1ccd729a8a6464fa4ba504798b6d82388f6d4db33
SHA256cc5a7a4be50871408a20e53b38462ecf7201fcd05c0d53a66570182fb0005f41
SHA512105ed1cbcbcb6f6ba765c3505acf86627260b99df5f984ea2a6104d6ba8e93f6d477b01b3fc04dc6a4cc4245ad69a0a925720486ed1b3d7a0c5279133f719a3e