Overview
overview
10Static
static
6DUMP_00A10...iR.exe
windows7-x64
7DgH5SjZFle...DI.exe
windows7-x64
10Dumped_.exe
windows7-x64
7EntrateSetup.exe
windows7-x64
9ErrorFileRemover.exe
windows7-x64
10ExtraTools.exe
windows7-x64
7F45F47EDCE...54.exe
windows7-x64
10decrypt_00...00.exe
windows7-x64
6dffde400ad...3d.exe
windows7-x64
10dircrypt.deobf.exe
windows7-x64
10dma locker 4.0.exe
windows7-x64
9downloader.js
windows7-x64
10dump.mem.exe
windows7-x64
6e0ff79cc94...ss.exe
windows7-x64
7e37dc428ec...ad.vbs
windows7-x64
1e5df2d114c...8a.exe
windows7-x64
10e6c4ae4709...ss.exe
windows7-x64
7e77df2ce34...2d.exe
windows7-x64
7e8e07496df...d2.exe
windows7-x64
ea8292721a...1e.exe
windows7-x64
5eaa857c95f...er.dll
windows7-x64
1ed3a685ca6...91.exe
windows7-x64
9edffa07d66...9d5.js
windows7-x64
10encrypter.exe
windows7-x64
10encryptor_...81.exe
windows7-x64
9f002618c01...35.apk
windows7-x64
3f213e54c85...ea.exe
windows7-x64
1f2c8eee2cd...3f.exe
windows7-x64
10f31bfe95e3...7_.exe
windows7-x64
9f6a8d7a429...da.exe
windows7-x64
10f915110765...da.exe
windows7-x64
7fb8823e949...-0.dll
windows7-x64
1Analysis
-
max time kernel
299s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:27
Behavioral task
behavioral1
Sample
DUMP_00A10000-00A1D000.exe.ViR.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DgH5SjZFleOYoBTyxcgMDlZF9brN1mDI.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
Dumped_.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
EntrateSetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
ErrorFileRemover.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ExtraTools.exe
Resource
win7-20241023-en
Behavioral task
behavioral7
Sample
F45F47EDCED7FAC5A99C45AB4B8C2D54.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
decrypt_0000000000000020-000A0000.exe
Resource
win7-20241010-en
Behavioral task
behavioral9
Sample
dffde400ad3d2af2bbd61c58bed9dcf7e3e37cec6210c9841d8ed5dc9117343d.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
dircrypt.deobf.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
dma locker 4.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
downloader.js
Resource
win7-20241023-en
Behavioral task
behavioral13
Sample
dump.mem.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
e0ff79cc943f489668067ec3be11398a084a76ecd0283c9e18b2d0bf6e464c32_not_packed_maybe_useless.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
e37dc428ec65a38707ad9e247950f3501a94e4abccb737a3562d69032c8505ad.vbs
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
e5df2d114c5f69c219923fed56c8aa7ee912020ba7589e88f2729285c1f5788a.exe
Resource
win7-20240729-en
Behavioral task
behavioral17
Sample
e6c4ae470977aa78d1005746ae05deea0bf3b4260f88865662a35f99b2559dbc_not_packed_maybe_useless.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
e77df2ce34949eb11290445a411a47fb927e8871e2580897581981d17730032d.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
e8e07496df5370d2e49ecce5a47c1fd2.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ea8292721a34ca2f1831447868bbe91e.exe
Resource
win7-20241010-en
Behavioral task
behavioral21
Sample
eaa857c95fca38ca08411b757f4ad2a841cfb9782deca8abf64aada445923c0d_Stealer.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ed3a685ca65de70b79faf95bbd94c343e73a150e83184f67e0bdb35b11d05791.exe
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
edffa07d667dbd224682639f56eb1b913e4ffeac874999e02c23e86eeb6489d5.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
encrypter.exe
Resource
win7-20240729-en
Behavioral task
behavioral25
Sample
encryptor_raas_9cffd965b4a0e662f6b98fd47d3b6ec9bc1b8581.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
f002618c01fe652f7f00eabd0e890e4992ccce818dfb2863e82c43f793685635.apk
Resource
win7-20240708-en
Behavioral task
behavioral27
Sample
f213e54c8520e7458751020edf15a5ea.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
f2c8eee2cd88b834e9d4c0eb4930f03f.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
f6a8d7a4291c55020101d046371a8bda.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
f9151107655aaa6db995888a7cb69ada.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
fb8823e9494016f59ab25ec6cc0961da_api-ms-win-system-softpub-l1-1-0.dll
Resource
win7-20241010-en
General
-
Target
f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe
-
Size
689KB
-
MD5
0aa0397edc45cc08dd005a73f707fec5
-
SHA1
7c1319364fe39580d9f0a928a6f6dc593f425528
-
SHA256
f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7
-
SHA512
5766cd40e76bb48233649ecdebf31449020b65146a6e90cc9fa97651f73a3bbd13be2791fcf47c9bba8e158f21d304fa087c8d6dc5c1d53be96c107fa84e6e32
-
SSDEEP
12288:yHesdPT6mID+Nscf3SDEmaBY2sWevYKrQaUeSSU8g+HnCPMmq8:o4DbcvqEmay2sIaUJig/T
Malware Config
Signatures
-
Renames multiple (51) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
Processes:
pacman.exepid process 2564 pacman.exe -
Loads dropped DLL 1 IoCs
Processes:
f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exepid process 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Security = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\delta.exe" f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exepacman.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pacman.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2824 taskkill.exe -
Processes:
f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
pacman.exef31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exepid process 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe 2564 pacman.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pacman.exetaskkill.exef31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exedescription pid process Token: SeDebugPrivilege 2564 pacman.exe Token: SeDebugPrivilege 2824 taskkill.exe Token: SeDebugPrivilege 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
Processes:
f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exepid process 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exedescription pid process target process PID 3068 wrote to memory of 2564 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe pacman.exe PID 3068 wrote to memory of 2564 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe pacman.exe PID 3068 wrote to memory of 2564 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe pacman.exe PID 3068 wrote to memory of 2564 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe pacman.exe PID 3068 wrote to memory of 2824 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe taskkill.exe PID 3068 wrote to memory of 2824 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe taskkill.exe PID 3068 wrote to memory of 2824 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe taskkill.exe PID 3068 wrote to memory of 2824 3068 f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe"C:\Users\Admin\AppData\Local\Temp\f31bfe95e31d761459b885052d35ba5e25ab19333378fb72b12efd675f6018d7_.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Microsoft\pacman.exeC:\Users\Admin\AppData\Local\Microsoft\\pacman.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /IM explorer.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD56464e51a6ee9d8ee9fad33430c24ecab
SHA1fdca62379b1d54d85746cbb228a0d981376ec2f5
SHA25668931ef9cf810d5a69d8ebf33155db7845fffcc685b1ae9f0670803bb97228cc
SHA512313dc913dd5b769954d8df68290a8b6b44a8a3f271aec9cb00b44fdcf78e6f1c50542fb755cec61ef5965406acea9cdfe5856fd5f64af6f0f05ff2cc84be0790