Overview
overview
10Static
static
7c22b74bb5b...0b.exe
windows7-x64
10c22b74bb5b...0b.exe
windows10-2004-x64
10$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$_13_/PowerRun64.exe
windows7-x64
4$_13_/PowerRun64.exe
windows10-2004-x64
3$_13_/SetACL64.exe
windows7-x64
1$_13_/SetACL64.exe
windows10-2004-x64
1$_13_/bn.bat
windows7-x64
1$_13_/bn.bat
windows10-2004-x64
1$_13_/bn1.bat
windows7-x64
10$_13_/bn1.bat
windows10-2004-x64
10$_13_/bnn.bat
windows7-x64
1$_13_/bnn.bat
windows10-2004-x64
1$_13_/bnz.bat
windows7-x64
1$_13_/bnz.bat
windows10-2004-x64
1$_13_/dotN...up.exe
windows7-x64
7$_13_/dotN...up.exe
windows10-2004-x64
7$_13_/dotN...up.exe
windows7-x64
7$_13_/dotN...up.exe
windows10-2004-x64
7$_13_/mbby...iy.exe
windows7-x64
3$_13_/mbby...iy.exe
windows10-2004-x64
3$_13_/win_...rp.exe
windows7-x64
3$_13_/win_...rp.exe
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 16:08
Behavioral task
behavioral1
Sample
c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c22b74bb5b950a631aab0b48d9480861b6bcd02de2be9cbc9294c760344b430b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$_13_/PowerRun64.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$_13_/PowerRun64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$_13_/SetACL64.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$_13_/SetACL64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$_13_/bn.bat
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$_13_/bn.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$_13_/bn1.bat
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$_13_/bn1.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$_13_/bnn.bat
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$_13_/bnn.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$_13_/bnz.bat
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$_13_/bnz.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$_13_/dotNetFx40_Full_setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$_13_/dotNetFx40_Full_setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$_13_/dotNetFx45_Full_setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$_13_/dotNetFx45_Full_setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$_13_/mbbyfatkrvotaiy.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$_13_/mbbyfatkrvotaiy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$_13_/win_version_csharp.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
$_13_/win_version_csharp.exe
Resource
win10v2004-20241007-en
General
-
Target
$_13_/mbbyfatkrvotaiy.exe
-
Size
6KB
-
MD5
e20d4921a4e68cc82bf7263539595bb0
-
SHA1
37ada032a527303c2b16f5529d2430f3b576ca03
-
SHA256
38dd040c23ebaee60f80f2b1753be1509e5260328b67b144ac70887276b8742f
-
SHA512
d54b1ad476d9bdbe87aa88cb5d1238003a1cb6923a88602ec02db579510742bc020deb4199c3d37db69f6f8f93dd32aa6bf9d13143117b02701a20c5694a490b
-
SSDEEP
48:607m4bdFYKbXU57maZkkgmq8aNMfCIpKkQIKZbGqeYlK/XQtPT8W54tagjlm6ouQ:7HY+LaZfXKBlKXQt78PjI6o2zNt
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2456 1172 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbbyfatkrvotaiy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1172 wrote to memory of 2456 1172 mbbyfatkrvotaiy.exe 31 PID 1172 wrote to memory of 2456 1172 mbbyfatkrvotaiy.exe 31 PID 1172 wrote to memory of 2456 1172 mbbyfatkrvotaiy.exe 31 PID 1172 wrote to memory of 2456 1172 mbbyfatkrvotaiy.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_13_\mbbyfatkrvotaiy.exe"C:\Users\Admin\AppData\Local\Temp\$_13_\mbbyfatkrvotaiy.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 5322⤵
- Program crash
PID:2456
-