Overview
overview
10Static
static
107zSCD97F9B...72.exe
windows7-x64
7zSCD97F9B...72.exe
windows10-2004-x64
7zSCD97F9B...28.exe
windows7-x64
7zSCD97F9B...28.exe
windows10-2004-x64
7zSCD97F9B...82.exe
windows7-x64
7zSCD97F9B...82.exe
windows10-2004-x64
7zSCD97F9B...7c.exe
windows7-x64
37zSCD97F9B...7c.exe
windows10-2004-x64
77zSCD97F9B...08.exe
windows7-x64
77zSCD97F9B...08.exe
windows10-2004-x64
77zSCD97F9B...5c.exe
windows7-x64
67zSCD97F9B...5c.exe
windows10-2004-x64
37zSCD97F9B...51.exe
windows7-x64
107zSCD97F9B...51.exe
windows10-2004-x64
107zSCD97F9B...09.exe
windows7-x64
17zSCD97F9B...09.exe
windows10-2004-x64
17zSCD97F9B...cd.exe
windows7-x64
67zSCD97F9B...cd.exe
windows10-2004-x64
67zSCD97F9B...9d.exe
windows7-x64
37zSCD97F9B...9d.exe
windows10-2004-x64
37zSCD97F9B...69.exe
windows7-x64
87zSCD97F9B...69.exe
windows10-2004-x64
87zSCD97F9B...5c.exe
windows7-x64
67zSCD97F9B...5c.exe
windows10-2004-x64
67zSCD97F9B...57.exe
windows7-x64
107zSCD97F9B...57.exe
windows10-2004-x64
107zSCD97F9B...00.exe
windows7-x64
37zSCD97F9B...00.exe
windows10-2004-x64
37zSCD97F9B...61.exe
windows7-x64
97zSCD97F9B...61.exe
windows10-2004-x64
97zSCD97F9B...rl.dll
windows7-x64
37zSCD97F9B...rl.dll
windows10-2004-x64
3Analysis
-
max time kernel
135s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 13:36
Behavioral task
behavioral1
Sample
7zSCD97F9B7/16409730233472.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7zSCD97F9B7/16409730233472.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
7zSCD97F9B7/16409730238228.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
7zSCD97F9B7/16409730238228.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
7zSCD97F9B7/1640973023982.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
7zSCD97F9B7/1640973023982.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
7zSCD97F9B7/61cf42cab6116_Fri1740da7b7c.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7zSCD97F9B7/61cf42cab6116_Fri1740da7b7c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7zSCD97F9B7/61cf42cc94cfd_Fri174cd2108.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
7zSCD97F9B7/61cf42cc94cfd_Fri174cd2108.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
7zSCD97F9B7/61cf42cd9d3e3_Fri172b3fcd2f5c.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
7zSCD97F9B7/61cf42cd9d3e3_Fri172b3fcd2f5c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
7zSCD97F9B7/61cf42cf81412_Fri1748d73b51.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
7zSCD97F9B7/61cf42cf81412_Fri1748d73b51.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
7zSCD97F9B7/61cf42d8cfbf4_Fri175590209.exe
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
7zSCD97F9B7/61cf42d8cfbf4_Fri175590209.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
7zSCD97F9B7/61cf42d96bbd5_Fri1768e6cd.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
7zSCD97F9B7/61cf42d96bbd5_Fri1768e6cd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
7zSCD97F9B7/61cf42da3aadc_Fri1749497d9d.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
7zSCD97F9B7/61cf42da3aadc_Fri1749497d9d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
7zSCD97F9B7/61cf42db8e020_Fri179863c92d69.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
7zSCD97F9B7/61cf42db8e020_Fri179863c92d69.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
7zSCD97F9B7/61cf42dc105f3_Fri17e8bf67cf5c.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
7zSCD97F9B7/61cf42dc105f3_Fri17e8bf67cf5c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
7zSCD97F9B7/61cf42ddca121_Fri1754a29da57.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
7zSCD97F9B7/61cf42ddca121_Fri1754a29da57.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
7zSCD97F9B7/61cf42de1af96_Fri179a299200.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
7zSCD97F9B7/61cf42de1af96_Fri179a299200.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7zSCD97F9B7/61cf42df34a5e_Fri1721957b061.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
7zSCD97F9B7/61cf42df34a5e_Fri1721957b061.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
7zSCD97F9B7/libcurl.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
7zSCD97F9B7/libcurl.dll
Resource
win10v2004-20241007-en
General
-
Target
7zSCD97F9B7/61cf42db8e020_Fri179863c92d69.exe
-
Size
1.9MB
-
MD5
1a834bf6d259babbfb8f84a40c30cee2
-
SHA1
bac32a006f8451b5e5063e12dfc3a27c44dd79db
-
SHA256
1604a4cccddecd3d488d6ede5f4040b3cb95e5d76385cb0be30cb7f8e1a380b5
-
SHA512
9e4e5feafeaff5695486a226fe4b302a5b4ab484e4fb96de2bb2ffeebba8f65f782283994a6409a4d36005edbf810c94f6258c4118d7facda0273a85dc2afba1
-
SSDEEP
24576:YLeTtjJFtHrKCeZEnvjEgbnqpZamVkfj6eR0DNk4pbAZXY1pokix+8bdmS5:YLYkCcEbEMIZa5fMJkCQYwkirbMS5
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 2716 rundll32.exe 5 2716 rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 f78584d.exe -
Loads dropped DLL 17 IoCs
pid Process 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2164 2564 WerFault.exe 36 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f78584d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61cf42db8e020_Fri179863c92d69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1788 2368 61cf42db8e020_Fri179863c92d69.exe 30 PID 2368 wrote to memory of 1788 2368 61cf42db8e020_Fri179863c92d69.exe 30 PID 2368 wrote to memory of 1788 2368 61cf42db8e020_Fri179863c92d69.exe 30 PID 2368 wrote to memory of 1788 2368 61cf42db8e020_Fri179863c92d69.exe 30 PID 1788 wrote to memory of 3044 1788 control.exe 31 PID 1788 wrote to memory of 3044 1788 control.exe 31 PID 1788 wrote to memory of 3044 1788 control.exe 31 PID 1788 wrote to memory of 3044 1788 control.exe 31 PID 1788 wrote to memory of 3044 1788 control.exe 31 PID 1788 wrote to memory of 3044 1788 control.exe 31 PID 1788 wrote to memory of 3044 1788 control.exe 31 PID 3044 wrote to memory of 1988 3044 rundll32.exe 33 PID 3044 wrote to memory of 1988 3044 rundll32.exe 33 PID 3044 wrote to memory of 1988 3044 rundll32.exe 33 PID 3044 wrote to memory of 1988 3044 rundll32.exe 33 PID 1988 wrote to memory of 2716 1988 RunDll32.exe 34 PID 1988 wrote to memory of 2716 1988 RunDll32.exe 34 PID 1988 wrote to memory of 2716 1988 RunDll32.exe 34 PID 1988 wrote to memory of 2716 1988 RunDll32.exe 34 PID 1988 wrote to memory of 2716 1988 RunDll32.exe 34 PID 1988 wrote to memory of 2716 1988 RunDll32.exe 34 PID 1988 wrote to memory of 2716 1988 RunDll32.exe 34 PID 2716 wrote to memory of 2564 2716 rundll32.exe 36 PID 2716 wrote to memory of 2564 2716 rundll32.exe 36 PID 2716 wrote to memory of 2564 2716 rundll32.exe 36 PID 2716 wrote to memory of 2564 2716 rundll32.exe 36 PID 2564 wrote to memory of 2164 2564 f78584d.exe 37 PID 2564 wrote to memory of 2164 2564 f78584d.exe 37 PID 2564 wrote to memory of 2164 2564 f78584d.exe 37 PID 2564 wrote to memory of 2164 2564 f78584d.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zSCD97F9B7\61cf42db8e020_Fri179863c92d69.exe"C:\Users\Admin\AppData\Local\Temp\7zSCD97F9B7\61cf42db8e020_Fri179863c92d69.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\mPPZNWRH.cPL",2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\mPPZNWRH.cPL",3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\mPPZNWRH.cPL",4⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\mPPZNWRH.cPL",5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\f78584d.exe"C:\Users\Admin\AppData\Local\Temp\f78584d.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 5327⤵
- Loads dropped DLL
- Program crash
PID:2164
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5620bda3df817bff8deb38758d1dc668c
SHA19933523941851b42047f2b7a1324eb8daa8fb1ff
SHA256b74d7ff45768a1ee6f267e895de3e46cca505edf205563ef3f7db827f38363b3
SHA512bc9e932860f63090bab251057bc1fd6875c410c2358321eaa74fccc117561b91e4ce6b24d5e7bb13dc44732ae151b7c33fe201acbb5af689d7f2d248dfb8c568