Overview
overview
10Static
static
6D02D012970...94.exe
windows7-x64
1D02D012970...94.exe
windows10-2004-x64
1DBm0yQwt.exe.ViR.exe
windows7-x64
10DBm0yQwt.exe.ViR.exe
windows10-2004-x64
10ca6ec46ee9...52.apk
android-9-x86
8ca6ec46ee9...52.apk
android-10-x64
8ca6ec46ee9...52.apk
android-11-x64
8calc.exe
windows10-2004-x64
5ccc71c83c8...B3.exe
windows7-x64
7ccc71c83c8...B3.exe
windows10-2004-x64
10ccc71c83c8...68.exe
windows7-x64
7ccc71c83c8...68.exe
windows10-2004-x64
3cd2d085998...-0.dll
windows7-x64
8cd2d085998...-0.dll
windows10-2004-x64
8cdffb7e75b...ss.exe
windows7-x64
3cdffb7e75b...ss.exe
windows10-2004-x64
3cf7382c25a...c9.exe
windows7-x64
6cf7382c25a...c9.exe
windows10-2004-x64
3cgi19-alpt...e_.exe
windows7-x64
7cgi19-alpt...e_.exe
windows10-2004-x64
7chrst.exe
windows7-x64
3chrst.exe
windows10-2004-x64
3ci05l2a.exe
windows7-x64
ci05l2a.exe
windows10-2004-x64
cl.exe
windows7-x64
7cl.exe
windows10-2004-x64
7clean.exe
windows7-x64
3clean.exe
windows10-2004-x64
3coinvault.exe
windows7-x64
9coinvault.exe
windows10-2004-x64
6com_loader.exe
windows7-x64
3com_loader.exe
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:41
Behavioral task
behavioral1
Sample
D02D012970AA164CAD15C757D7E52994.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
D02D012970AA164CAD15C757D7E52994.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DBm0yQwt.exe.ViR.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
DBm0yQwt.exe.ViR.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral6
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral7
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral8
Sample
calc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_Dumped_TDS=4F9911B3.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_Dumped_TDS=4F9911B3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_TDS=4FAD9768.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_TDS=4FAD9768.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
cd2d085998a289134ffaf27fbdcbc8cb_api-ms-win-system-dispex-l1-1-0.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
cd2d085998a289134ffaf27fbdcbc8cb_api-ms-win-system-dispex-l1-1-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36_not_packed_maybe_useless.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36_not_packed_maybe_useless.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
cgi19-alptsevs-h555.exe_.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
cgi19-alptsevs-h555.exe_.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
chrst.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
chrst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
ci05l2a.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
ci05l2a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
cl.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
cl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
clean.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
clean.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
coinvault.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
coinvault.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
com_loader.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
com_loader.exe
Resource
win10v2004-20241007-en
General
-
Target
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
-
Size
501KB
-
MD5
8cef8cf2a22f58a16b12b5b0b05552ba
-
SHA1
cf7382c25a8bf0d904d51063ceb29fb70f630bc9
-
SHA256
c95fde4a188dbc361f9eff80e9ba9d082ef40f7a16809b5ef4886903f8fc8698
-
SHA512
86031b49267669987ee4cbe0e267d953c17032428c4ccaac318c3737c2b9a4c0203fa162f8c83a7f1616b73450118e6e5c0a474008130e1681443b3a51171591
-
SSDEEP
12288:clxTE2jm56ven1viU+NoAHKor2Bzqbb+0eT9aEZuo:cE2qvGHKorIaK0eMjo
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Systems = "C:\\Windows\\system32\\cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe" cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe -
Drops file in System32 directory 2 IoCs
Processes:
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exedescription ioc process File opened for modification C:\Windows\SysWOW64\cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe File created C:\Windows\SysWOW64\cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exedescription pid process target process PID 2416 set thread context of 1512 2416 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.execf7382c25a8bf0d904d51063ceb29fb70f630bc9.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exepid process 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe 1512 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exedescription pid process target process PID 2416 wrote to memory of 1512 2416 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe PID 2416 wrote to memory of 1512 2416 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe PID 2416 wrote to memory of 1512 2416 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe PID 2416 wrote to memory of 1512 2416 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe PID 2416 wrote to memory of 1512 2416 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe PID 2416 wrote to memory of 1512 2416 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe PID 2416 wrote to memory of 1512 2416 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe PID 2416 wrote to memory of 1512 2416 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe PID 2416 wrote to memory of 1512 2416 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe PID 2416 wrote to memory of 1512 2416 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe PID 2416 wrote to memory of 1512 2416 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe PID 2416 wrote to memory of 1512 2416 cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe"C:\Users\Admin\AppData\Local\Temp\cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
\??\c:\users\admin\appdata\local\temp\cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe"c:\users\admin\appdata\local\temp\cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1512
-