Overview
overview
10Static
static
10FD4DC9B2BF...4B.exe
windows7-x64
1Flyper.exe
windows7-x64
1Flyper2.exe
windows7-x64
1Flyper3.exe
windows7-x64
1Free YouTu...er.exe
windows7-x64
3FreeYoutub...16.exe
windows7-x64
7file (1).exe
windows7-x64
10file (2).exe
windows7-x64
6file (3).exe
windows7-x64
10file (4).exe
windows7-x64
10file (6).exe
windows7-x64
10file (7).exe
windows7-x64
3file.exe
windows7-x64
5file_ (1).exe
windows7-x64
7file_ (2).exe
windows7-x64
7file_ (3).exe
windows7-x64
7file_ (4).exe
windows7-x64
7file_ (5).exe
windows7-x64
7file_ (6).exe
windows7-x64
7file_ (7).exe
windows7-x64
7file_.exe
windows7-x64
7file_9.exe
windows7-x64
7firefox32.exe
windows7-x64
7flash_play...al.exe
windows7-x64
10flash_play...ed.exe
windows7-x64
3freegaza_i...rs.exe
windows7-x64
7fresh_a22b...53.exe
windows7-x64
9helper[1].exe_.exe
windows7-x64
3holycrypt-v0.3.exe
windows7-x64
info[1].exe
windows7-x64
10informations.exe
windows7-x64
10installer.exe
windows7-x64
7Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:31
Behavioral task
behavioral1
Sample
FD4DC9B2BFF8D75A704E8FE33C63DA4B.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Flyper.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Flyper2.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Flyper3.exe
Resource
win7-20241023-en
Behavioral task
behavioral5
Sample
Free YouTube Downloader.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
FreeYoutubeDownloader11012016.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
file (1).exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
file (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
file (3).exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
file (4).exe
Resource
win7-20240729-en
Behavioral task
behavioral11
Sample
file (6).exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
file (7).exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
file_ (1).exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
file_ (2).exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
file_ (3).exe
Resource
win7-20241010-en
Behavioral task
behavioral17
Sample
file_ (4).exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
file_ (5).exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
file_ (6).exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
file_ (7).exe
Resource
win7-20241023-en
Behavioral task
behavioral21
Sample
file_.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
file_9.exe
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
firefox32.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
flash_player.original.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
flash_player.unpacked.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
freegaza_israeli_killers.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
fresh_a22bb95ee8cfccc94ba183c071bad3a951b353e98fcf0d6cfa9268aaf9c53d53.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
helper[1].exe_.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
holycrypt-v0.3.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
info[1].exe
Resource
win7-20241023-en
Behavioral task
behavioral31
Sample
informations.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
installer.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
256KB
-
MD5
56fe9f129308ccb3a1babe9169f2414c
-
SHA1
74809983aa3e0562d69ba5ea5da09b75cd5d1d1e
-
SHA256
6b9611c64a82acc1bcb4ee26b372e6b1717e4acb790139d5e296bfc3c440ec24
-
SHA512
ac0d0a3610a3bdeaeea0b087c9dc9b86a61971b98c91bca6efa22989debccbc4b8fce1b202a978e10d06d0c38fc93e97a8b68986416b8488bc70101eb01003eb
-
SSDEEP
3072:YetaGBy9OYojUkNHEk+qza+ik8X9ETCx5z00kEQMwti2rmSy0PMy50UCnLFUgKaX:l9GLkJEk+guZXD5mI2rm3U6FJKaIOJ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 2260 set thread context of 2196 2260 file.exe file.exe -
Processes:
resource yara_rule behavioral13/memory/2196-9-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral13/memory/2196-5-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral13/memory/2196-4-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral13/memory/2196-12-0x0000000000400000-0x0000000000487000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2968 2196 WerFault.exe file.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
file.exefile.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
file.exepid process 2260 file.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
file.exefile.exedescription pid process target process PID 2260 wrote to memory of 2196 2260 file.exe file.exe PID 2260 wrote to memory of 2196 2260 file.exe file.exe PID 2260 wrote to memory of 2196 2260 file.exe file.exe PID 2260 wrote to memory of 2196 2260 file.exe file.exe PID 2260 wrote to memory of 2196 2260 file.exe file.exe PID 2260 wrote to memory of 2196 2260 file.exe file.exe PID 2260 wrote to memory of 2196 2260 file.exe file.exe PID 2260 wrote to memory of 2196 2260 file.exe file.exe PID 2196 wrote to memory of 2968 2196 file.exe WerFault.exe PID 2196 wrote to memory of 2968 2196 file.exe WerFault.exe PID 2196 wrote to memory of 2968 2196 file.exe WerFault.exe PID 2196 wrote to memory of 2968 2196 file.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\file.exeC:\Users\Admin\AppData\Local\Temp\file.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 2043⤵
- Program crash
PID:2968
-
-