Overview
overview
10Static
static
10IQHGV07FDy...2).exe
windows7-x64
3IQHGV07FDy...vn.exe
windows7-x64
3Junk)2345.eml.ViR.eml
windows7-x64
5PC Cleaner.exe
windows7-x64
10PC_cleaner...ed.exe
windows7-x64
3PC_cleaner...ed.exe
windows7-x64
3Pizzacrypts.exe
windows7-x64
9Ponmsiyyks.exe
windows7-x64
3Rlesvxamve...on.exe
windows7-x64
SATURN_RANSOM.exe
windows7-x64
10ScreenCapt...er.exe
windows7-x64
1license key.exe
windows7-x64
malware.exe
windows7-x64
8mamba_141.exe_.exe
windows7-x64
1mamba_152.exe_.exe
windows7-x64
5microsoft-cleaned.exe
windows7-x64
3msiexec.exe
windows7-x64
10nc.exe
windows7-x64
1nd2vj1ux.exe
windows7-x64
notes.exe
windows7-x64
nzpuHohZGP...2).exe
windows7-x64
3nzpuHohZGP...sr.exe
windows7-x64
3old_14b68c...0d.exe
windows7-x64
7patched.exe
windows7-x64
9pclock.exe
windows7-x64
7pclock_unpack.exe
windows7-x64
7pitupi20.exe
windows7-x64
10pozhehgxml...co.exe
windows7-x64
7ransom_50....0b.scr
windows7-x64
9ransomware...20.exe
windows7-x64
9safeinf.exe
windows7-x64
7schet1074....16.rtf
windows7-x64
10Analysis
-
max time kernel
299s -
max time network
305s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:36
Behavioral task
behavioral1
Sample
IQHGV07FDyQ5u7bmNAvn (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
IQHGV07FDyQ5u7bmNAvn.exe
Resource
win7-20240729-en
Behavioral task
behavioral3
Sample
Junk)2345.eml.ViR.eml
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
PC Cleaner.exe
Resource
win7-20241010-en
Behavioral task
behavioral5
Sample
PC_cleaner-cleaned.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PC_cleaner_database-cleaned.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
Pizzacrypts.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Ponmsiyyks.exe
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
Rlesvxamvenagx @ZL@0ECpw@ZL@ .xml.zyklon.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
SATURN_RANSOM.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
ScreenCapture_Win8.MalwareScanner.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
license key.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
mamba_141.exe_.exe
Resource
win7-20241010-en
Behavioral task
behavioral15
Sample
mamba_152.exe_.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
microsoft-cleaned.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
msiexec.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
nc.exe
Resource
win7-20241023-en
Behavioral task
behavioral19
Sample
nd2vj1ux.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
notes.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
nzpuHohZGP2RNfMTp0sr (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
nzpuHohZGP2RNfMTp0sr.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
old_14b68cb9f911ce937f52ed8282ef4395f2291c0a23f14d33f731a15572834b0d.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
patched.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
pclock.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
pclock_unpack.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
pitupi20.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
pozhehgxmlhobpvwlqco.exe
Resource
win7-20240708-en
Behavioral task
behavioral29
Sample
ransom_50.00_dol_df410f19157f591860e1633b85dfb50b.scr
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ransomware1061911a3e0a74827a76bbd7bfe16d20.exe
Resource
win7-20240729-en
Behavioral task
behavioral31
Sample
safeinf.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
schet1074.15.03.16.rtf
Resource
win7-20240903-en
General
-
Target
safeinf.exe
-
Size
702KB
-
MD5
a0a45b5de3c04e4c659395857bee3ead
-
SHA1
bdf4e7315bddb3fa7ae86dda5049b30cdc648dea
-
SHA256
add92cb6047f2fb412dcbcb5a2d8ee7fad56091ccd6667105d977b010a33b561
-
SHA512
b8f3d847a19dc7615a9cbf30dfe6cbf344045e6f5510863ec9bbf1fdb171a146e1ffbc44cb7a5cb08862ed78b1bcee72f99d6e792b82f70f41494a0a0071d0da
-
SSDEEP
12288:dXmwRo+mv8QD4+0N46glpxInQMUmO+NWJUaS5plVvj9fOOIAxHfoeYJO/:dX48QE+UiK6P+YeXplpXIS/oXS
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
flashplayer.exeflashplayer.exeflashplayer.exeflashplayer.exepid process 2496 flashplayer.exe 2804 flashplayer.exe 2588 flashplayer.exe 2228 flashplayer.exe -
Loads dropped DLL 5 IoCs
Processes:
safeinf.exeflashplayer.exeflashplayer.exepid process 1632 safeinf.exe 1632 safeinf.exe 2804 flashplayer.exe 2804 flashplayer.exe 2588 flashplayer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
flashplayer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pr = "C:\\Program Files (x86)\\flashplayer.exe" flashplayer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
flashplayer.exeflashplayer.exedescription pid process target process PID 2496 set thread context of 2804 2496 flashplayer.exe flashplayer.exe PID 2588 set thread context of 2228 2588 flashplayer.exe flashplayer.exe -
Drops file in Program Files directory 5 IoCs
Processes:
flashplayer.exesafeinf.exedescription ioc process File opened for modification C:\Program Files (x86)\flashplayer.exe flashplayer.exe File created C:\Program Files (x86)\TSIFJYXOFP.KAK flashplayer.exe File opened for modification C:\Program Files (x86)\TSIFJYXOFP.KAK flashplayer.exe File opened for modification C:\Program Files (x86)\Èíôîðìàöèîííûå òåõíîëîãèè ÐÔ\Àðõèâíûé âèäåî äîêóìåíò\flashplayer.exe safeinf.exe File created C:\Program Files (x86)\flashplayer.exe flashplayer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
safeinf.exeflashplayer.exeflashplayer.exeflashplayer.exeflashplayer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language safeinf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flashplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flashplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flashplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flashplayer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
flashplayer.exepid process 2804 flashplayer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
flashplayer.exeflashplayer.exepid process 2496 flashplayer.exe 2588 flashplayer.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
safeinf.exeflashplayer.exeflashplayer.exeflashplayer.exedescription pid process target process PID 1632 wrote to memory of 2496 1632 safeinf.exe flashplayer.exe PID 1632 wrote to memory of 2496 1632 safeinf.exe flashplayer.exe PID 1632 wrote to memory of 2496 1632 safeinf.exe flashplayer.exe PID 1632 wrote to memory of 2496 1632 safeinf.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2496 wrote to memory of 2804 2496 flashplayer.exe flashplayer.exe PID 2804 wrote to memory of 2588 2804 flashplayer.exe flashplayer.exe PID 2804 wrote to memory of 2588 2804 flashplayer.exe flashplayer.exe PID 2804 wrote to memory of 2588 2804 flashplayer.exe flashplayer.exe PID 2804 wrote to memory of 2588 2804 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe PID 2588 wrote to memory of 2228 2588 flashplayer.exe flashplayer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\safeinf.exe"C:\Users\Admin\AppData\Local\Temp\safeinf.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Èíôîðìàöèîííûå òåõíîëîãèè ÐÔ\Àðõèâíûé âèäåî äîêóìåíò\flashplayer.exe"C:\Program Files (x86)\Èíôîðìàöèîííûå òåõíîëîãèè ÐÔ\Àðõèâíûé âèäåî äîêóìåíò\flashplayer.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Èíôîðìàöèîííûå òåõíîëîãèè ÐÔ\Àðõèâíûé âèäåî äîêóìåíò\flashplayer.exe"C:\Program Files (x86)\Èíôîðìàöèîííûå òåõíîëîãèè ÐÔ\Àðõèâíûé âèäåî äîêóìåíò\flashplayer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\flashplayer.exe"C:\Users\Admin\AppData\Local\Temp\flashplayer.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\flashplayer.exe"C:\Users\Admin\AppData\Local\Temp\flashplayer.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2228
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
702KB
MD57d94eab0bb8f903dece55008ae664d05
SHA145681acbc90420ac79e2c3c8583edc18d0184e09
SHA256bc50c7da476e517a6c5b0fbecf7d45a7da4b10f5692ae40fa3b5b35db6d36577
SHA512bc33221f6fef7cee39b12cf6ea399c68e441dfb7519a1069d0cf5de1bd20d687d8e653a56ba1b7a01df16ac0f6486c003dd884252534140dce8409d6754fa503