Overview
overview
10Static
static
53666991ba9...23.exe
windows7-x64
73666991ba9...23.exe
windows10-2004-x64
7375aead107...8a.exe
windows7-x64
7375aead107...8a.exe
windows10-2004-x64
73a55a5e059...66.exe
windows7-x64
53a55a5e059...66.exe
windows10-2004-x64
53a5c360865...0a.exe
windows7-x64
53a5c360865...0a.exe
windows10-2004-x64
53a8196dc93...03.exe
windows7-x64
53a8196dc93...03.exe
windows10-2004-x64
53b2e4fc5bb...0c.exe
windows7-x64
53b2e4fc5bb...0c.exe
windows10-2004-x64
53c81cd2032...fe.exe
windows7-x64
103c81cd2032...fe.exe
windows10-2004-x64
103d134d4900...24.exe
windows7-x64
103d134d4900...24.exe
windows10-2004-x64
103fe4c784df...64.exe
windows7-x64
53fe4c784df...64.exe
windows10-2004-x64
540f9a44672...69.exe
windows7-x64
1040f9a44672...69.exe
windows10-2004-x64
10417d576bf1...b0.exe
windows7-x64
5417d576bf1...b0.exe
windows10-2004-x64
541ac704c7b...ad.exe
windows7-x64
741ac704c7b...ad.exe
windows10-2004-x64
742a09e7356...2c.exe
windows7-x64
1042a09e7356...2c.exe
windows10-2004-x64
1044b1b50b00...7f.exe
windows7-x64
544b1b50b00...7f.exe
windows10-2004-x64
5450fcf9d11...04.exe
windows7-x64
5450fcf9d11...04.exe
windows10-2004-x64
546836f3afb...d5.exe
windows7-x64
646836f3afb...d5.exe
windows10-2004-x64
6Analysis
-
max time kernel
44s -
max time network
27s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 07:24
Behavioral task
behavioral1
Sample
3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
375aead10728ec8de6d9f6e13a1bdb21563385fca54f367370057144f219488a.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
375aead10728ec8de6d9f6e13a1bdb21563385fca54f367370057144f219488a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
3a55a5e05993d9369c5c407f00e05e235b39c45aba71fa25c6618827e767fa66.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
3a55a5e05993d9369c5c407f00e05e235b39c45aba71fa25c6618827e767fa66.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
3a5c36086501b5a824f31f57103d9b137636f8e0b4f2d60291359b18d574060a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
3a5c36086501b5a824f31f57103d9b137636f8e0b4f2d60291359b18d574060a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
3a8196dc93da2c2e2a9515cbc5ff7e47d679e04ce51957551ebabc6496cc3103.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
3a8196dc93da2c2e2a9515cbc5ff7e47d679e04ce51957551ebabc6496cc3103.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
3b2e4fc5bb057a461d0688b737c7e6f69d41563f732fec265564331036efdf0c.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
3b2e4fc5bb057a461d0688b737c7e6f69d41563f732fec265564331036efdf0c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
3c81cd20323c282181d40fa0e8ab7b66dfd46edd7bafc3d6abeb072420b314fe.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
3c81cd20323c282181d40fa0e8ab7b66dfd46edd7bafc3d6abeb072420b314fe.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
3d134d49001a39cd3a83cc3983943d567b1393415ddfaf88c2accac2f3756124.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
3d134d49001a39cd3a83cc3983943d567b1393415ddfaf88c2accac2f3756124.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
3fe4c784dfb841053360622561788dacfc8e4b81567bc461e4cd33e61d2d1e64.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
3fe4c784dfb841053360622561788dacfc8e4b81567bc461e4cd33e61d2d1e64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
40f9a446728e079ce7f1b7b8cd6a6f2ff82e4fb22d209ae9576f178612d35369.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
40f9a446728e079ce7f1b7b8cd6a6f2ff82e4fb22d209ae9576f178612d35369.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
42a09e735691f947b7cc6d8f9a9cebbf9e87ac1fc2cbd0a4f0aa2b1b9eb4262c.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
42a09e735691f947b7cc6d8f9a9cebbf9e87ac1fc2cbd0a4f0aa2b1b9eb4262c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
450fcf9d115867ad23b3436808e43bcf3a3f77325124ca1835851644fd486a04.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
450fcf9d115867ad23b3436808e43bcf3a3f77325124ca1835851644fd486a04.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
46836f3afb222bd150f0fe58f9d0019fd341544b2101a2e44c52bbd02a2dacd5.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
46836f3afb222bd150f0fe58f9d0019fd341544b2101a2e44c52bbd02a2dacd5.exe
Resource
win10v2004-20241007-en
General
-
Target
3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe
-
Size
740KB
-
MD5
8379ff838164b21dbd287611dae13ecb
-
SHA1
d19e11692605f70504de8ab04a992627985facea
-
SHA256
3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23
-
SHA512
a4a2db5afd04a7f657520d2b84f19627a3381db5996803283868020dab1f89b56b3367585b10b2762ef57d8581fff0c36b989d5e00a63e7282813ee04d0e2b77
-
SSDEEP
12288:osHzOUNUSB/o5LsI1uwajJ5yvv1l2/BXyZPlcd2zhRKzdWTWTKgYzajbRtML7RQH:7iUmSB/o5d1ubcvKC5lcd2WUg3RquUjs
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 2924 name.exe -
Loads dropped DLL 1 IoCs
pid Process 2720 3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2720-19-0x0000000000A30000-0x0000000000BCE000-memory.dmp autoit_exe behavioral1/memory/2924-40-0x0000000000F80000-0x000000000111E000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2924 set thread context of 2896 2924 name.exe 30 -
resource yara_rule behavioral1/memory/2720-0-0x0000000000A30000-0x0000000000BCE000-memory.dmp upx behavioral1/files/0x0009000000016ccc-15.dat upx behavioral1/memory/2720-19-0x0000000000A30000-0x0000000000BCE000-memory.dmp upx behavioral1/memory/2924-21-0x0000000000F80000-0x000000000111E000-memory.dmp upx behavioral1/memory/2924-40-0x0000000000F80000-0x000000000111E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2896 svchost.exe 2896 svchost.exe 2896 svchost.exe 2896 svchost.exe 2896 svchost.exe 2896 svchost.exe 2896 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2924 name.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2720 3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe 2720 3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe 2924 name.exe 2924 name.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2720 3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe 2720 3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe 2924 name.exe 2924 name.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2924 2720 3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe 29 PID 2720 wrote to memory of 2924 2720 3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe 29 PID 2720 wrote to memory of 2924 2720 3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe 29 PID 2720 wrote to memory of 2924 2720 3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe 29 PID 2924 wrote to memory of 2896 2924 name.exe 30 PID 2924 wrote to memory of 2896 2924 name.exe 30 PID 2924 wrote to memory of 2896 2924 name.exe 30 PID 2924 wrote to memory of 2896 2924 name.exe 30 PID 2924 wrote to memory of 2896 2924 name.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe"C:\Users\Admin\AppData\Local\Temp\3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5ab0b5c5c53a78a53d619bf819f588896
SHA1ed96f282dcdb095784b217afd7b49b2e303f4da4
SHA256d90e08bd265d05a3bcd32a193b19e854a453f252a3fafdf6022b5d13b3b8d53f
SHA5124b915e21a008d4de536d398bb72548cd2c60c9fc3aa5042fc2b142a3f011683b842b0b11b7b3f3061b647257141ce02652b61385e14e33ea9f815b8ea734cf8a
-
Filesize
84KB
MD506df9dae77983b023eb0a3c4408a467f
SHA1938de7ac57312441bf4ab3fd789bc07f0fca1509
SHA256d9216e673ac432ca2af347678c87949cbdf4cf15378a82858f81c2609603073f
SHA512b6fe5fa9a863ebe3795575ccdedea760bd3d9065c1bc08d25e8e97a1f5651f4d54127eee72ff7c1deae7ec9801f01f1a9bdbd408be0aedf4080822e14dbef6e4
-
Filesize
740KB
MD58379ff838164b21dbd287611dae13ecb
SHA1d19e11692605f70504de8ab04a992627985facea
SHA2563666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23
SHA512a4a2db5afd04a7f657520d2b84f19627a3381db5996803283868020dab1f89b56b3367585b10b2762ef57d8581fff0c36b989d5e00a63e7282813ee04d0e2b77