Overview
overview
10Static
static
7tmpfile-ma...r3.exe
windows10-ltsc 2021-x64
8tmpfile-ma...ly.dll
windows10-ltsc 2021-x64
3tmpfile-ma...on.dll
windows10-ltsc 2021-x64
3tmpfile-ma...fe.exe
windows10-ltsc 2021-x64
7tmpfile-ma...rm.exe
windows10-ltsc 2021-x64
10tmpfile-ma...ir.exe
windows10-ltsc 2021-x64
10tmpfile-ma...sk.dll
windows10-ltsc 2021-x64
3tmpfile-ma...fe.exe
windows10-ltsc 2021-x64
7tmpfile-ma...fe.exe
windows10-ltsc 2021-x64
7tmpfile-ma...fe.exe
windows10-ltsc 2021-x64
7tmpfile-ma...fe.exe
windows10-ltsc 2021-x64
7tmpfile-ma...fe.exe
windows10-ltsc 2021-x64
7tmpfile-ma...OR.exe
windows10-ltsc 2021-x64
3tmpfile-ma...r_.exe
windows10-ltsc 2021-x64
8tmpfile-ma...32.exe
windows10-ltsc 2021-x64
10tmpfile-ma...63.exe
windows10-ltsc 2021-x64
3tmpfile-ma...64.exe
windows10-ltsc 2021-x64
10tmpfile-ma...up.exe
windows10-ltsc 2021-x64
10tmpfile-ma...ox.exe
windows10-ltsc 2021-x64
8tmpfile-ma...it.exe
windows10-ltsc 2021-x64
7tmpfile-ma...ox.exe
windows10-ltsc 2021-x64
7tmpfile-ma...er.exe
windows10-ltsc 2021-x64
7tmpfile-ma...te.exe
windows10-ltsc 2021-x64
7tmpfile-ma...ck.dll
windows10-ltsc 2021-x64
3tmpfile-ma...e2.dll
windows10-ltsc 2021-x64
3tmpfile-ma...us.dll
windows10-ltsc 2021-x64
7tmpfile-ma...7I.exe
windows10-ltsc 2021-x64
1tmpfile-ma...8I.exe
windows10-ltsc 2021-x64
7Analysis
-
max time kernel
95s -
max time network
142s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02/12/2024, 16:10
Behavioral task
behavioral1
Sample
tmpfile-main/0000000r00d000r3.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
tmpfile-main/Deadly.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
tmpfile-main/Dragon.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
tmpfile-main/ExecuteSafe.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
tmpfile-main/Exterm.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
tmpfile-main/Gaming Chair.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
tmpfile-main/GasMask.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
tmpfile-main/Hybris_DeadlySafe.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
tmpfile-main/Hybris_DragonSafe.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
tmpfile-main/Hybris_ZeroHackSafe.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
tmpfile-main/Hybris_gamesnusSafe.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
tmpfile-main/Hybris_vbrSafe.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
tmpfile-main/KOSTYAMANIPULATOR.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
tmpfile-main/Launcher_.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
tmpfile-main/Node32.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
tmpfile-main/Node63.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
tmpfile-main/Node64.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
tmpfile-main/Porofessor_Setup.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
tmpfile-main/Roblox.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
tmpfile-main/RobloxExploit.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
tmpfile-main/Sobfox.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
tmpfile-main/Spoofer.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
tmpfile-main/Update.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
tmpfile-main/ZeroHack.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
tmpfile-main/dutchlove2.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
tmpfile-main/gamesnus.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
tmpfile-main/stTfuo7I.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral28
Sample
tmpfile-main/stTfuo8I.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
tmpfile-main/stTfuo8I.exe
-
Size
4.8MB
-
MD5
e9f9aaf1b165f0e1a0310cfe04b7deaf
-
SHA1
512b5d16ccc0a16619e69dda46382f346c1b1d51
-
SHA256
9ab3067a40f40f1e171a5ae3cd036ae9ef32d8cabb0e06502e56fe6df67d6feb
-
SHA512
d2940b5f86e731dae7df1d5f69cc138e03b50a19ff77843fdf61d92035f64449ba3e8948585cfeca709d871ccfd51aca8f734adc09dfde14c8e27d4c972f4d0c
-
SSDEEP
98304:5F+ssBEhz9Nq5s7ydXteaDJ/23nPl2ptbzfoHvoimaTFAeXzl:5Xs2Ju9eaD0tGHfoTmE/D
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-87863914-780023816-688321450-1000\Control Panel\International\Geo\Nation stTfuo8I.exe -
Executes dropped EXE 1 IoCs
pid Process 1312 RDR4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5060 wrote to memory of 1312 5060 stTfuo8I.exe 80 PID 5060 wrote to memory of 1312 5060 stTfuo8I.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmpfile-main\stTfuo8I.exe"C:\Users\Admin\AppData\Local\Temp\tmpfile-main\stTfuo8I.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\RDR4.exe"C:\Users\Admin\AppData\Local\Temp\RDR4.exe"2⤵
- Executes dropped EXE
PID:1312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5e685b0c231a5f25f451e3b1628c3a55d
SHA16546666fb75e56302f140db8c8e9299e2ae1175b
SHA25665d2f65bcb32cba0a2d920bec6b139bf5de4de8ad2d44db7ad7bb36035665797
SHA512f991446d9b556bf00c25f348000a75bda67571f0de53a9947c679f483bdae8e7d28728270de530d833321a484a7050c96b57a3c10273bba87e04dd8f07cc03a4