Overview
overview
10Static
static
10FD4DC9B2BF...4B.exe
windows7-x64
1FD4DC9B2BF...4B.exe
windows10-2004-x64
1Flyper.exe
windows7-x64
1Flyper.exe
windows10-2004-x64
1Flyper2.exe
windows7-x64
1Flyper2.exe
windows10-2004-x64
1Flyper3.exe
windows7-x64
1Flyper3.exe
windows10-2004-x64
1Free YouTu...er.exe
windows7-x64
3Free YouTu...er.exe
windows10-2004-x64
3FreeYoutub...16.exe
windows7-x64
7FreeYoutub...16.exe
windows10-2004-x64
7file (1).exe
windows7-x64
10file (1).exe
windows10-2004-x64
10file (2).exe
windows7-x64
6file (2).exe
windows10-2004-x64
10file (3).exe
windows7-x64
10file (3).exe
windows10-2004-x64
10file (4).exe
windows7-x64
10file (4).exe
windows10-2004-x64
10file (6).exe
windows7-x64
10file (6).exe
windows10-2004-x64
10file (7).exe
windows7-x64
1file (7).exe
windows10-2004-x64
3file.exe
windows7-x64
5file.exe
windows10-2004-x64
5file_ (1).exe
windows7-x64
7file_ (1).exe
windows10-2004-x64
7file_ (2).exe
windows7-x64
7file_ (2).exe
windows10-2004-x64
7file_ (3).exe
windows7-x64
7file_ (3).exe
windows10-2004-x64
7Analysis
-
max time kernel
86s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:43
Behavioral task
behavioral1
Sample
FD4DC9B2BFF8D75A704E8FE33C63DA4B.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FD4DC9B2BFF8D75A704E8FE33C63DA4B.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Flyper.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Flyper.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Flyper2.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Flyper2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Flyper3.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Flyper3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Free YouTube Downloader.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Free YouTube Downloader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
FreeYoutubeDownloader11012016.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
FreeYoutubeDownloader11012016.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
file (1).exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
file (1).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
file (2).exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
file (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
file (3).exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
file (3).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
file (4).exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
file (4).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
file (6).exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
file (6).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
file (7).exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
file (7).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
file.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
file.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
file_ (1).exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
file_ (1).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
file_ (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
file_ (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
file_ (3).exe
Resource
win7-20241023-en
General
-
Target
file (4).exe
-
Size
97KB
-
MD5
241421356dd99063199983faaaec1d8b
-
SHA1
2f65f6007347bdeb6bce09f7b727ed3db30c86a8
-
SHA256
ca1d9b37d93106cab5f20fde3e6943ac0ae4761589cf31e2554fbabfaf80bfd5
-
SHA512
59757412acc955bbf6a0695fac8b1b7ac231ae9bee71a42307cc4ec793c09f4d52a7358b0a8b40fa0658fbc688743034eedcf16da36f8bd2643cc48deb2c73ee
-
SSDEEP
1536:WUVdfhkoWcPdBW4TVu5nHhJKqMkwN7Y0S8iXU0CsNdyukfP+:WUVTVg5BWkfqUEsNYFfP+
Malware Config
Signatures
-
Processes:
kasper_zaebal.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" kasper_zaebal.exe -
Executes dropped EXE 1 IoCs
Processes:
kasper_zaebal.exepid process 2784 kasper_zaebal.exe -
Loads dropped DLL 1 IoCs
Processes:
file (4).exepid process 2680 file (4).exe -
Processes:
kasper_zaebal.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" kasper_zaebal.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kasper_zaebal.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
Processes:
cmd.exedescription ioc process File created C:\ProgramData\Media\kasper_zaebal.exe:Zone.Identifier cmd.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2216 2680 WerFault.exe file (4).exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
file (4).execmd.exekasper_zaebal.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kasper_zaebal.exe -
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\ProgramData\Media\kasper_zaebal.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file (4).exekasper_zaebal.exepid process 2680 file (4).exe 2680 file (4).exe 2680 file (4).exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
kasper_zaebal.exepid process 2784 kasper_zaebal.exe 2784 kasper_zaebal.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
file (4).exedescription pid process target process PID 2680 wrote to memory of 2480 2680 file (4).exe cmd.exe PID 2680 wrote to memory of 2480 2680 file (4).exe cmd.exe PID 2680 wrote to memory of 2480 2680 file (4).exe cmd.exe PID 2680 wrote to memory of 2480 2680 file (4).exe cmd.exe PID 2680 wrote to memory of 2784 2680 file (4).exe kasper_zaebal.exe PID 2680 wrote to memory of 2784 2680 file (4).exe kasper_zaebal.exe PID 2680 wrote to memory of 2784 2680 file (4).exe kasper_zaebal.exe PID 2680 wrote to memory of 2784 2680 file (4).exe kasper_zaebal.exe PID 2680 wrote to memory of 2216 2680 file (4).exe WerFault.exe PID 2680 wrote to memory of 2216 2680 file (4).exe WerFault.exe PID 2680 wrote to memory of 2216 2680 file (4).exe WerFault.exe PID 2680 wrote to memory of 2216 2680 file (4).exe WerFault.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
kasper_zaebal.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System kasper_zaebal.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" kasper_zaebal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file (4).exe"C:\Users\Admin\AppData\Local\Temp\file (4).exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c C:\ProgramData\Media\rdb.bat2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2480
-
-
C:\ProgramData\Media\kasper_zaebal.exe-wait2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 2282⤵
- Program crash
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
84B
MD5c6f7299be3ecbb88acfde79c4dc2b63c
SHA11ce9da1d060431581f08d3fa83240aab5b281d81
SHA256a22d2d0a98cec8c7efccea543dc7d770577b5a966735deffa2f1bce9ecfbad5d
SHA512b7ce561caff59f6a08702f21dfc953b028ac6b47289c61f85468586ff9f941490bade7f78b4eb198ae958dcb58204c85db3b6ec1d071d9b0af6babe9534baa27
-
Filesize
97KB
MD5241421356dd99063199983faaaec1d8b
SHA12f65f6007347bdeb6bce09f7b727ed3db30c86a8
SHA256ca1d9b37d93106cab5f20fde3e6943ac0ae4761589cf31e2554fbabfaf80bfd5
SHA51259757412acc955bbf6a0695fac8b1b7ac231ae9bee71a42307cc4ec793c09f4d52a7358b0a8b40fa0658fbc688743034eedcf16da36f8bd2643cc48deb2c73ee