Overview
overview
10Static
static
10ScreenCapt...r1.exe
windows7-x64
1ScreenCapt...r2.exe
windows7-x64
1ScreenCapt...rt.exe
windows7-x64
1ScreenCapt...er.exe
windows7-x64
1ScreenCapt...ck.exe
windows7-x64
1ScreenCapt...k1.exe
windows7-x64
1ScreenCapt...k2.exe
windows7-x64
1Setup (5).exe
windows7-x64
7Setup (6).exe
windows7-x64
7Supplement...16.scr
windows7-x64
3T1.exe
windows7-x64
10T1_b7afca7...b5.exe
windows7-x64
10TeenTube_90767.exe
windows7-x64
10Trojan-Ran....a.exe
windows7-x64
3Tuyen bo c...ed.doc
windows7-x64
4Tuyen bo c...ed.doc
windows7-x64
4UNPACKED.exe
windows7-x64
9Uninstall (2).exe
windows7-x64
3Uninstall.exe
windows7-x64
3Upx.exe
windows7-x64
5screenshot2016.exe
windows7-x64
7sidacertification.exe
windows7-x64
3spora.exe
windows7-x64
10svhost.exe
windows7-x64
10sys100s.exe_.exe
windows7-x64
9tordll.dll
windows7-x64
3uacbypass.exe
windows7-x64
3unpack.exe
windows7-x64
10unpacked.ex_.exe
windows7-x64
9unpacked.mem.exe
windows7-x64
10upd.exe
windows7-x64
6verhdiehndi.bat
windows7-x64
8Analysis
-
max time kernel
301s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:39
Behavioral task
behavioral1
Sample
ScreenCapture_Win8.MalwareScanner1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ScreenCapture_Win8.MalwareScanner2.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
ScreenCapture_Win8.PopupAlert.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
ScreenCapture_Win8.TaskServer.exe
Resource
win7-20241023-en
Behavioral task
behavioral5
Sample
ScreenCapture_Win8.WindowsLock.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ScreenCapture_Win8.WindowsLock1.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
ScreenCapture_Win8.WindowsLock2.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Setup (5).exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
Setup (6).exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Supplementary Agreement 26_01_2016.scr
Resource
win7-20240708-en
Behavioral task
behavioral11
Sample
T1.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
T1_b7afca788487347804156f052c613db5.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
TeenTube_90767.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Trojan-Ransom.Win32.Telecrypt.a.exe
Resource
win7-20241010-en
Behavioral task
behavioral15
Sample
Tuyen bo chung Viet Nam - Hoa Ky - Infected and EnCrypted.doc
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Tuyen bo chung Viet Nam - Hoa Ky - Infected.doc
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
UNPACKED.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
Uninstall (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Upx.exe
Resource
win7-20241010-en
Behavioral task
behavioral21
Sample
screenshot2016.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
sidacertification.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
spora.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
svhost.exe
Resource
win7-20240708-en
Behavioral task
behavioral25
Sample
sys100s.exe_.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
tordll.dll
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
uacbypass.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
unpack.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
unpacked.ex_.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
unpacked.mem.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
upd.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
verhdiehndi.bat
Resource
win7-20240903-en
General
-
Target
upd.exe
-
Size
158KB
-
MD5
601c1dcbafd1df3cd8030c823a289f46
-
SHA1
cd8aa5088e563024bde4275cccb4e2b25c23dda9
-
SHA256
f760c187e989dab567b1696aeffdbfd558577e54fbd63039e3f925eb4f2cbdd1
-
SHA512
e0a92c3ef9d805e8f319ed0c8b8511e46b784018a6386949ee646ca926402bf4cef91fdb8c9d2faeef16c3a0e3a43e4b9ad7563c7b1a425794e707b9950fbd4b
-
SSDEEP
3072:uZtS9vOgslhX1BUKEAQvlLf+05ojihuwFWvo/z0:uZcJOvU8ribFWwb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
upd.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\vasja = "C:\\Users\\Admin\\AppData\\Local\\Temp\\upd.exe" upd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
upd.exedescription pid process target process PID 3056 set thread context of 2244 3056 upd.exe upd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
upd.exeupd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upd.exe -
Processes:
upd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main upd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
upd.exepid process 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe 2244 upd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
upd.exedescription pid process Token: SeDebugPrivilege 2244 upd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
upd.exepid process 2244 upd.exe 2244 upd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
upd.exedescription pid process target process PID 3056 wrote to memory of 2244 3056 upd.exe upd.exe PID 3056 wrote to memory of 2244 3056 upd.exe upd.exe PID 3056 wrote to memory of 2244 3056 upd.exe upd.exe PID 3056 wrote to memory of 2244 3056 upd.exe upd.exe PID 3056 wrote to memory of 2244 3056 upd.exe upd.exe PID 3056 wrote to memory of 2244 3056 upd.exe upd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\upd.exe"C:\Users\Admin\AppData\Local\Temp\upd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\upd.exe"C:\Users\Admin\AppData\Local\Temp\upd.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2244
-