Overview
overview
10Static
static
107zS8A52FD1...f3.exe
windows7-x64
67zS8A52FD1...f3.exe
windows10-2004-x64
67zS8A52FD1...62.exe
windows7-x64
107zS8A52FD1...62.exe
windows10-2004-x64
107zS8A52FD1...9a.exe
windows7-x64
37zS8A52FD1...9a.exe
windows10-2004-x64
77zS8A52FD1...8a.exe
windows7-x64
107zS8A52FD1...8a.exe
windows10-2004-x64
107zS8A52FD1...f5.exe
windows7-x64
107zS8A52FD1...f5.exe
windows10-2004-x64
107zS8A52FD1...68.exe
windows7-x64
77zS8A52FD1...68.exe
windows10-2004-x64
77zS8A52FD1...41.exe
windows7-x64
107zS8A52FD1...41.exe
windows10-2004-x64
107zS8A52FD1...cd.exe
windows7-x64
107zS8A52FD1...cd.exe
windows10-2004-x64
107zS8A52FD1...71.exe
windows7-x64
107zS8A52FD1...71.exe
windows10-2004-x64
107zS8A52FD1...9c.exe
windows7-x64
77zS8A52FD1...9c.exe
windows10-2004-x64
77zS8A52FD1...0d.exe
windows7-x64
107zS8A52FD1...0d.exe
windows10-2004-x64
107zS8A52FD1...ff.exe
windows7-x64
107zS8A52FD1...ff.exe
windows10-2004-x64
107zS8A52FD1...68.exe
windows7-x64
37zS8A52FD1...68.exe
windows10-2004-x64
37zS8A52FD1...-1.dll
windows7-x64
37zS8A52FD1...-1.dll
windows10-2004-x64
37zS8A52FD1...-6.dll
windows7-x64
37zS8A52FD1...-6.dll
windows10-2004-x64
37zS8A52FD1...-1.dll
windows7-x64
37zS8A52FD1...-1.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2024, 01:41
Behavioral task
behavioral1
Sample
7zS8A52FD1B/62a1ea227dc1c_17ee33ef3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7zS8A52FD1B/62a1ea227dc1c_17ee33ef3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
7zS8A52FD1B/62a1ea23342ae_c77562.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
7zS8A52FD1B/62a1ea23342ae_c77562.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
7zS8A52FD1B/62a1ea23da745_6e68c9a.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
7zS8A52FD1B/62a1ea23da745_6e68c9a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
7zS8A52FD1B/62a1ea243386e_a4f8a5d8a.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
7zS8A52FD1B/62a1ea243386e_a4f8a5d8a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7zS8A52FD1B/62a1ea2501f48_0371f5.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
7zS8A52FD1B/62a1ea2501f48_0371f5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
7zS8A52FD1B/62a1ea2a20759_b7a66dc968.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
7zS8A52FD1B/62a1ea2a20759_b7a66dc968.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
7zS8A52FD1B/62a1ea2b65292_c4804f5141.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
7zS8A52FD1B/62a1ea2b65292_c4804f5141.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
7zS8A52FD1B/62a1ea2d09364_3056ccd.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
7zS8A52FD1B/62a1ea2d09364_3056ccd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
7zS8A52FD1B/62a1ea2df066e_add786971.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
7zS8A52FD1B/62a1ea2df066e_add786971.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
7zS8A52FD1B/62a1ea2f0beee_36a9ec29c.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
7zS8A52FD1B/62a1ea2f0beee_36a9ec29c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
7zS8A52FD1B/62a1ea2fb0309_1d35870d.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
7zS8A52FD1B/62a1ea2fb0309_1d35870d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
7zS8A52FD1B/62a1ea319013f_e64e1ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
7zS8A52FD1B/62a1ea319013f_e64e1ff.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
7zS8A52FD1B/62a1ea3215fd5_67a668.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
7zS8A52FD1B/62a1ea3215fd5_67a668.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
7zS8A52FD1B/libgcc_s_dw2-1.dll
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
7zS8A52FD1B/libgcc_s_dw2-1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7zS8A52FD1B/libstdc++-6.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
7zS8A52FD1B/libstdc++-6.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
7zS8A52FD1B/libwinpthread-1.dll
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
7zS8A52FD1B/libwinpthread-1.dll
Resource
win10v2004-20241007-en
General
-
Target
7zS8A52FD1B/62a1ea2a20759_b7a66dc968.exe
-
Size
1.6MB
-
MD5
c4bc22a23300c3e7db1fae03e00610a5
-
SHA1
0f8d2471d510434d0338fa204c7863a5a6e17190
-
SHA256
d866f133333b259ea1aaaa838bd6f26a28798d440ce4531cd90b0497ea92d869
-
SHA512
fa629c9f18ff2cfd07c4da7065a544d84b4dc823c8b542863525eafcf9ad62a74f5f1fdbd6e1f0609135f258b0ffe01b136b614e8bd0d669d0a5ea4052bd3fc6
-
SSDEEP
24576:IAOcZwXYCK7Y8YO8BTZqQtraKaNiFIGoLsItGxeTqHvveUBym:m7MT89Zr2zuNoLtQxeTqvv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 62a1ea2a20759_b7a66dc968.exe -
Loads dropped DLL 4 IoCs
pid Process 3060 rundll32.exe 3060 rundll32.exe 1344 rundll32.exe 1344 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62a1ea2a20759_b7a66dc968.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4736 wrote to memory of 2072 4736 62a1ea2a20759_b7a66dc968.exe 83 PID 4736 wrote to memory of 2072 4736 62a1ea2a20759_b7a66dc968.exe 83 PID 4736 wrote to memory of 2072 4736 62a1ea2a20759_b7a66dc968.exe 83 PID 2072 wrote to memory of 3060 2072 control.exe 84 PID 2072 wrote to memory of 3060 2072 control.exe 84 PID 2072 wrote to memory of 3060 2072 control.exe 84 PID 3060 wrote to memory of 1840 3060 rundll32.exe 99 PID 3060 wrote to memory of 1840 3060 rundll32.exe 99 PID 1840 wrote to memory of 1344 1840 RunDll32.exe 100 PID 1840 wrote to memory of 1344 1840 RunDll32.exe 100 PID 1840 wrote to memory of 1344 1840 RunDll32.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea2a20759_b7a66dc968.exe"C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea2a20759_b7a66dc968.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\PHF_.hT2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\PHF_.hT3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\PHF_.hT4⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\PHF_.hT5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1344
-
-
-
-