Overview
overview
10Static
static
107zS8B74BEB...17.exe
windows7-x64
67zS8B74BEB...17.exe
windows10-2004-x64
67zS8B74BEB...fb.exe
windows7-x64
37zS8B74BEB...fb.exe
windows10-2004-x64
37zS8B74BEB...51.exe
windows7-x64
37zS8B74BEB...51.exe
windows10-2004-x64
77zS8B74BEB...6c.exe
windows7-x64
77zS8B74BEB...6c.exe
windows10-2004-x64
77zS8B74BEB...79.exe
windows7-x64
107zS8B74BEB...79.exe
windows10-2004-x64
107zS8B74BEB...f2.exe
windows7-x64
77zS8B74BEB...f2.exe
windows10-2004-x64
77zS8B74BEB...21.exe
windows7-x64
107zS8B74BEB...21.exe
windows10-2004-x64
107zS8B74BEB...ed.exe
windows7-x64
107zS8B74BEB...ed.exe
windows10-2004-x64
107zS8B74BEB...2a.exe
windows7-x64
107zS8B74BEB...2a.exe
windows10-2004-x64
107zS8B74BEB...6f.exe
windows7-x64
77zS8B74BEB...6f.exe
windows10-2004-x64
77zS8B74BEB...bd.exe
windows7-x64
77zS8B74BEB...bd.exe
windows10-2004-x64
77zS8B74BEB...93.exe
windows7-x64
107zS8B74BEB...93.exe
windows10-2004-x64
107zS8B74BEB...rl.dll
windows7-x64
37zS8B74BEB...rl.dll
windows10-2004-x64
37zS8B74BEB...pp.dll
windows7-x64
37zS8B74BEB...pp.dll
windows10-2004-x64
37zS8B74BEB...-1.dll
windows7-x64
37zS8B74BEB...-1.dll
windows10-2004-x64
37zS8B74BEB...-6.dll
windows7-x64
37zS8B74BEB...-6.dll
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 22:06
Behavioral task
behavioral1
Sample
7zS8B74BEBB/623f4ec66a5ad_Sat1734f544217.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7zS8B74BEBB/623f4ec66a5ad_Sat1734f544217.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
7zS8B74BEBB/623f4ec77fd3f_Sat1772aefb.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
7zS8B74BEBB/623f4ec77fd3f_Sat1772aefb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
7zS8B74BEBB/623f4ec86395b_Sat173c84b551.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
7zS8B74BEBB/623f4ec86395b_Sat173c84b551.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
7zS8B74BEBB/623f4eca3de95_Sat17334d36c.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7zS8B74BEBB/623f4eca3de95_Sat17334d36c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7zS8B74BEBB/623f4ecc3aad7_Sat17f86f68979.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7zS8B74BEBB/623f4ecc3aad7_Sat17f86f68979.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
7zS8B74BEBB/623f4ecdc319c_Sat17f45527bef2.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
7zS8B74BEBB/623f4ecdc319c_Sat17f45527bef2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
7zS8B74BEBB/623f4ee48c005_Sat17a6fc071121.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
7zS8B74BEBB/623f4ee48c005_Sat17a6fc071121.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
7zS8B74BEBB/623f4ee614d64_Sat17bf153ed.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
7zS8B74BEBB/623f4ee614d64_Sat17bf153ed.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
7zS8B74BEBB/623f4ee7540ef_Sat1772b105d2a.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
7zS8B74BEBB/623f4ee7540ef_Sat1772b105d2a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
7zS8B74BEBB/623f4ee864d35_Sat17400b6f.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
7zS8B74BEBB/623f4ee864d35_Sat17400b6f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
7zS8B74BEBB/623f4ee97f2a0_Sat170aca8c6fbd.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
7zS8B74BEBB/623f4ee97f2a0_Sat170aca8c6fbd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
7zS8B74BEBB/623f4eeb25e05_Sat1728a2b93.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
7zS8B74BEBB/623f4eeb25e05_Sat1728a2b93.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
7zS8B74BEBB/libcurl.dll
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
7zS8B74BEBB/libcurl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
7zS8B74BEBB/libcurlpp.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
7zS8B74BEBB/libcurlpp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7zS8B74BEBB/libgcc_s_dw2-1.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
7zS8B74BEBB/libgcc_s_dw2-1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
7zS8B74BEBB/libstdc++-6.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
7zS8B74BEBB/libstdc++-6.dll
Resource
win10v2004-20241007-en
General
-
Target
7zS8B74BEBB/623f4eca3de95_Sat17334d36c.exe
-
Size
1.5MB
-
MD5
fc85547093253980b33b54219d28d736
-
SHA1
da6868bf22cf6d90ed4eac4f999784853a6a6120
-
SHA256
baaff6a861982a9eafdc8a4f59f2404e55e589ac509813b3782315aad744baec
-
SHA512
370c7276703706b969c5c5061a8ab18dd07a257882a09d674223513875924455466067000e994f326198ae783440967acda9d4c51a105b1991134e3088cd8003
-
SSDEEP
24576:84nXu/QSDTV+Bnvu8t+wqKcGKK0YF1I8Po3kJy5pIz0frpuIBpG2OBtSWd6+u:8qeNVCiGJ0YF1I8P7Jop40jpv6gWq
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2392 623f4eca3de95_Sat17334d36c.tmp 2688 623f4eca3de95_Sat17334d36c.tmp -
Loads dropped DLL 4 IoCs
pid Process 1560 623f4eca3de95_Sat17334d36c.exe 2392 623f4eca3de95_Sat17334d36c.tmp 2760 623f4eca3de95_Sat17334d36c.exe 2688 623f4eca3de95_Sat17334d36c.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 623f4eca3de95_Sat17334d36c.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 623f4eca3de95_Sat17334d36c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 623f4eca3de95_Sat17334d36c.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 623f4eca3de95_Sat17334d36c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 623f4eca3de95_Sat17334d36c.tmp -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2392 1560 623f4eca3de95_Sat17334d36c.exe 31 PID 1560 wrote to memory of 2392 1560 623f4eca3de95_Sat17334d36c.exe 31 PID 1560 wrote to memory of 2392 1560 623f4eca3de95_Sat17334d36c.exe 31 PID 1560 wrote to memory of 2392 1560 623f4eca3de95_Sat17334d36c.exe 31 PID 1560 wrote to memory of 2392 1560 623f4eca3de95_Sat17334d36c.exe 31 PID 1560 wrote to memory of 2392 1560 623f4eca3de95_Sat17334d36c.exe 31 PID 1560 wrote to memory of 2392 1560 623f4eca3de95_Sat17334d36c.exe 31 PID 2392 wrote to memory of 2760 2392 623f4eca3de95_Sat17334d36c.tmp 32 PID 2392 wrote to memory of 2760 2392 623f4eca3de95_Sat17334d36c.tmp 32 PID 2392 wrote to memory of 2760 2392 623f4eca3de95_Sat17334d36c.tmp 32 PID 2392 wrote to memory of 2760 2392 623f4eca3de95_Sat17334d36c.tmp 32 PID 2392 wrote to memory of 2760 2392 623f4eca3de95_Sat17334d36c.tmp 32 PID 2392 wrote to memory of 2760 2392 623f4eca3de95_Sat17334d36c.tmp 32 PID 2392 wrote to memory of 2760 2392 623f4eca3de95_Sat17334d36c.tmp 32 PID 2760 wrote to memory of 2688 2760 623f4eca3de95_Sat17334d36c.exe 33 PID 2760 wrote to memory of 2688 2760 623f4eca3de95_Sat17334d36c.exe 33 PID 2760 wrote to memory of 2688 2760 623f4eca3de95_Sat17334d36c.exe 33 PID 2760 wrote to memory of 2688 2760 623f4eca3de95_Sat17334d36c.exe 33 PID 2760 wrote to memory of 2688 2760 623f4eca3de95_Sat17334d36c.exe 33 PID 2760 wrote to memory of 2688 2760 623f4eca3de95_Sat17334d36c.exe 33 PID 2760 wrote to memory of 2688 2760 623f4eca3de95_Sat17334d36c.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS8B74BEBB\623f4eca3de95_Sat17334d36c.exe"C:\Users\Admin\AppData\Local\Temp\7zS8B74BEBB\623f4eca3de95_Sat17334d36c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\is-OIU1K.tmp\623f4eca3de95_Sat17334d36c.tmp"C:\Users\Admin\AppData\Local\Temp\is-OIU1K.tmp\623f4eca3de95_Sat17334d36c.tmp" /SL5="$400EE,870458,780800,C:\Users\Admin\AppData\Local\Temp\7zS8B74BEBB\623f4eca3de95_Sat17334d36c.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\7zS8B74BEBB\623f4eca3de95_Sat17334d36c.exe"C:\Users\Admin\AppData\Local\Temp\7zS8B74BEBB\623f4eca3de95_Sat17334d36c.exe" /SILENT3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\is-G6MJL.tmp\623f4eca3de95_Sat17334d36c.tmp"C:\Users\Admin\AppData\Local\Temp\is-G6MJL.tmp\623f4eca3de95_Sat17334d36c.tmp" /SL5="$500EE,870458,780800,C:\Users\Admin\AppData\Local\Temp\7zS8B74BEBB\623f4eca3de95_Sat17334d36c.exe" /SILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2688
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
Filesize
2.5MB
MD5c2df22740f9c189cc1bca0f7a7da293a
SHA167a318397df6454749de34485e093bf726c15ac7
SHA2566719f7cd93f52d4a68f18b5257779dfca14ffbccec81d57df93fc7ab6d35e219
SHA51214ffc3f3b07230e7aa2b9768d9e54e97690670afe9ec8815aa1314d32260759f4430ddd5b0b821a107ef137e6c957b1f7e57f11095a5d1e9b13f4ebb3f431b17