Overview
overview
10Static
static
53666991ba9...23.exe
windows7-x64
73666991ba9...23.exe
windows10-2004-x64
7375aead107...8a.exe
windows7-x64
7375aead107...8a.exe
windows10-2004-x64
73a55a5e059...66.exe
windows7-x64
53a55a5e059...66.exe
windows10-2004-x64
53a5c360865...0a.exe
windows7-x64
53a5c360865...0a.exe
windows10-2004-x64
53a8196dc93...03.exe
windows7-x64
53a8196dc93...03.exe
windows10-2004-x64
53b2e4fc5bb...0c.exe
windows7-x64
53b2e4fc5bb...0c.exe
windows10-2004-x64
53c81cd2032...fe.exe
windows7-x64
103c81cd2032...fe.exe
windows10-2004-x64
103d134d4900...24.exe
windows7-x64
103d134d4900...24.exe
windows10-2004-x64
103fe4c784df...64.exe
windows7-x64
53fe4c784df...64.exe
windows10-2004-x64
540f9a44672...69.exe
windows7-x64
1040f9a44672...69.exe
windows10-2004-x64
10417d576bf1...b0.exe
windows7-x64
5417d576bf1...b0.exe
windows10-2004-x64
541ac704c7b...ad.exe
windows7-x64
741ac704c7b...ad.exe
windows10-2004-x64
742a09e7356...2c.exe
windows7-x64
1042a09e7356...2c.exe
windows10-2004-x64
1044b1b50b00...7f.exe
windows7-x64
544b1b50b00...7f.exe
windows10-2004-x64
5450fcf9d11...04.exe
windows7-x64
5450fcf9d11...04.exe
windows10-2004-x64
546836f3afb...d5.exe
windows7-x64
646836f3afb...d5.exe
windows10-2004-x64
6Analysis
-
max time kernel
146s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 07:24
Behavioral task
behavioral1
Sample
3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3666991ba9b1b0ab338f41c37c0bfe3a8ae0fbfbde9820679a76362a610a0b23.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
375aead10728ec8de6d9f6e13a1bdb21563385fca54f367370057144f219488a.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
375aead10728ec8de6d9f6e13a1bdb21563385fca54f367370057144f219488a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
3a55a5e05993d9369c5c407f00e05e235b39c45aba71fa25c6618827e767fa66.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
3a55a5e05993d9369c5c407f00e05e235b39c45aba71fa25c6618827e767fa66.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
3a5c36086501b5a824f31f57103d9b137636f8e0b4f2d60291359b18d574060a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
3a5c36086501b5a824f31f57103d9b137636f8e0b4f2d60291359b18d574060a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
3a8196dc93da2c2e2a9515cbc5ff7e47d679e04ce51957551ebabc6496cc3103.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
3a8196dc93da2c2e2a9515cbc5ff7e47d679e04ce51957551ebabc6496cc3103.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
3b2e4fc5bb057a461d0688b737c7e6f69d41563f732fec265564331036efdf0c.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
3b2e4fc5bb057a461d0688b737c7e6f69d41563f732fec265564331036efdf0c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
3c81cd20323c282181d40fa0e8ab7b66dfd46edd7bafc3d6abeb072420b314fe.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
3c81cd20323c282181d40fa0e8ab7b66dfd46edd7bafc3d6abeb072420b314fe.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
3d134d49001a39cd3a83cc3983943d567b1393415ddfaf88c2accac2f3756124.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
3d134d49001a39cd3a83cc3983943d567b1393415ddfaf88c2accac2f3756124.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
3fe4c784dfb841053360622561788dacfc8e4b81567bc461e4cd33e61d2d1e64.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
3fe4c784dfb841053360622561788dacfc8e4b81567bc461e4cd33e61d2d1e64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
40f9a446728e079ce7f1b7b8cd6a6f2ff82e4fb22d209ae9576f178612d35369.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
40f9a446728e079ce7f1b7b8cd6a6f2ff82e4fb22d209ae9576f178612d35369.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
41ac704c7b71aa0419cb1344ba49806667f9f72ce0e4750f8353279a3f2e33ad.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
42a09e735691f947b7cc6d8f9a9cebbf9e87ac1fc2cbd0a4f0aa2b1b9eb4262c.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
42a09e735691f947b7cc6d8f9a9cebbf9e87ac1fc2cbd0a4f0aa2b1b9eb4262c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
44b1b50b000cd1ae114f7dfbded83d88962b647c0b2c71a6be0222a9bea51a7f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
450fcf9d115867ad23b3436808e43bcf3a3f77325124ca1835851644fd486a04.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
450fcf9d115867ad23b3436808e43bcf3a3f77325124ca1835851644fd486a04.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
46836f3afb222bd150f0fe58f9d0019fd341544b2101a2e44c52bbd02a2dacd5.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
46836f3afb222bd150f0fe58f9d0019fd341544b2101a2e44c52bbd02a2dacd5.exe
Resource
win10v2004-20241007-en
General
-
Target
417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe
-
Size
1.1MB
-
MD5
6064af0fb1184367e836c63d1c3c5a42
-
SHA1
dc0b48090c7847c9a4ad622df20f0bfa8b3f951e
-
SHA256
417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0
-
SHA512
9989e6862e570e3ea7bc541c925fbf96282fb0eb94a25995ffc44c82b21ffcd0bd822f6f79593f57b890c7c75a7c52bbd13c6d484b33dec5b4a182db7d695511
-
SSDEEP
24576:oAHnh+eWsN3skA4RV1Hom2KXMmHapV5f8YRmYcsXu8dLn5:vh+ZkldoPK8YapV5ySXnL
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2732 set thread context of 2260 2732 417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe 28 PID 2260 set thread context of 1100 2260 svchost.exe 20 PID 2260 set thread context of 2224 2260 svchost.exe 31 PID 2224 set thread context of 1100 2224 logman.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language logman.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2260 svchost.exe 2260 svchost.exe 2260 svchost.exe 2260 svchost.exe 2260 svchost.exe 2260 svchost.exe 2260 svchost.exe 2260 svchost.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe 2224 logman.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2732 417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe 2260 svchost.exe 1100 Explorer.EXE 1100 Explorer.EXE 2224 logman.exe 2224 logman.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2732 417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe 2732 417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe 1100 Explorer.EXE 1100 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2732 417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe 2732 417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2260 2732 417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe 28 PID 2732 wrote to memory of 2260 2732 417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe 28 PID 2732 wrote to memory of 2260 2732 417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe 28 PID 2732 wrote to memory of 2260 2732 417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe 28 PID 2732 wrote to memory of 2260 2732 417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe 28 PID 1100 wrote to memory of 2224 1100 Explorer.EXE 31 PID 1100 wrote to memory of 2224 1100 Explorer.EXE 31 PID 1100 wrote to memory of 2224 1100 Explorer.EXE 31 PID 1100 wrote to memory of 2224 1100 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe"C:\Users\Admin\AppData\Local\Temp\417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\417d576bf16dfd44e888bfd508cd4fc7c4a985ef9916b221b06dbb3bff3186b0.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2260
-
-
-
C:\Windows\SysWOW64\logman.exe"C:\Windows\SysWOW64\logman.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD57c7a0bb936e75812c9e3fa39d0b4eb1f
SHA1ea0aa5c35dacba68263843968cbcebda9e0d7c75
SHA256114febbd2fb9760a8c30e5224aa3a0ed7e4b8c083da07701bc4cb346b12c0812
SHA51269a729a12d112584dc069bf6978a24cb18e9383069840f5a756d110c1ea1a468893e8b70c4b8b633240ae85e0459751abde5235aa613e377c89b7288161d6a2b