Resubmissions

08-01-2025 01:31

250108-bxptxsxrev 10

08-01-2025 01:14

250108-blvk2azjem 10

Analysis

  • max time kernel
    5s
  • max time network
    6s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 01:31

General

  • Target

    41fcac4067db860114a270ffadb6083647ed54bc95e43faf1fffbb23f0cf2a2b.exe

  • Size

    1.1MB

  • MD5

    586c45b07a69a89813272e425388029f

  • SHA1

    979e0ccab38b87ac3d3d4c79a6a3d9351179df26

  • SHA256

    41fcac4067db860114a270ffadb6083647ed54bc95e43faf1fffbb23f0cf2a2b

  • SHA512

    b83a662985d4a1165e19bbbb52e10cbaefab972f8a8a5dd65a657b32c29a5d1b69f3c588c41469340538600ecc237a369b7dfca35cca18572511f2b997d1085e

  • SSDEEP

    24576:SGjZb7WC6n1V1ZkIppYCHKW0pPM5nhO9LI5mnx1+lEU/6Wx:3VK11Vr/ppdqWy05nkLI5mn7DUCWx

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41fcac4067db860114a270ffadb6083647ed54bc95e43faf1fffbb23f0cf2a2b.exe
    "C:\Users\Admin\AppData\Local\Temp\41fcac4067db860114a270ffadb6083647ed54bc95e43faf1fffbb23f0cf2a2b.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3248
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Symphony Symphony.cmd & Symphony.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4364
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4044
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4072
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3916
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 180180
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4056
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Gilbert
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4740
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "uploaded" Smell
        3⤵
        • System Location Discovery: System Language Discovery
        PID:376
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 180180\Likewise.com + Moderators + Ship + Develops + Briefs + Cache + Web + Dependent + Crimes + Responsibility + Brandon + Separated 180180\Likewise.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3400
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Senegal + ..\Contract + ..\Chrome + ..\Renewable + ..\Vancouver + ..\Saving + ..\Topless + ..\Coordinate d
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1920
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\180180\Likewise.com
        Likewise.com d
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2276
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\180180\Likewise.com

    Filesize

    2KB

    MD5

    5beef8cd5b811a67e64e5cda7ad15ed7

    SHA1

    ebb8c73d0725205e63e7ba227522439219eacd86

    SHA256

    9b04ead4e91bb178ea6d5f5e9e0ef22cc0499c95aac4e4014e7abbab977f0b08

    SHA512

    fd529876e232b7be6bd1da66ec611c73d1eee03ceba9edf1b2339c69306abf2d23b71857b051d418d635b85bb813002a998b6fff9228286a3673ed0e7825ea16

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\180180\Likewise.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\180180\d

    Filesize

    476KB

    MD5

    bf39db999fd293ba2a22f8d2edf3ae83

    SHA1

    c3a36d2d03c21435c9afa6a76c2144f6692e1529

    SHA256

    0adf165d94e85f56eadaef133828f60b8f8c642b590a03f394aa9e0817bdbc0b

    SHA512

    6c93b729d2b64354f34bfbfb91dac07f6b3a381e32af4ab7863a5c92d0780ccb32ad1f5ad4623f335cff8ffc243dc88b141e9409de3cceee17e1c76fdccac06a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Brandon

    Filesize

    71KB

    MD5

    6ed308f7d869ec3e4db1fe15f830524b

    SHA1

    e4d07a8e12c64e6faedcf539cd08e64c4040f96d

    SHA256

    62341bc1b0dcc86f45c396fe54b7b7645d1007ab784e8d4326cceb7d87a2e502

    SHA512

    2df2cf7dddbdf3347e521fb3507bed0b70eea8c6c70a41da90d566bb191c6086f709fd505571fa3f62b8764f2e634c1ca42513365737ae831cdeb44c2c077364

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Briefs

    Filesize

    80KB

    MD5

    4153e21eda04746677f819feb4122ac3

    SHA1

    66a3c082b1b72b807bd23c903c5d2abb6499e2d9

    SHA256

    e826f8b8c4096060e2c3a874e4a2ac226ac9d3e554eb0793cfb2e8e6a31aa6e4

    SHA512

    8b9cbc042a5783accfc8696590e0a0041892d13aac4394b51c48b73dbcd8780bd12262d844427285ede2cc9689c48dc1d5ef6944d55ba2088a1b04c246dc5d5c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Cache

    Filesize

    81KB

    MD5

    ed7f9415d7b54f8ede0a3a8dd375477b

    SHA1

    5325b94beb75c860df240b43b69bb53ebcd083eb

    SHA256

    55f7d8c972f72e7b171ad344f157125f2ef23db756f8b1e42cf6c961eb207196

    SHA512

    0acc7abf9835c1609fb4802e8331aad73f27287fcbb0d2cdc649affda52410ee607269fd10f7f31852acd773d5d1cc0e739050c08247277411be6652795514ec

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Chrome

    Filesize

    87KB

    MD5

    f8b845b5b26b29eaa1c06aa06bc0fb92

    SHA1

    97272fb14ca992a2e12c8d19a2e91b3a68a11a9d

    SHA256

    85c9572494b9699eff20d796e97ff4a047fd6fc097f7a2cb047096333f44e56c

    SHA512

    24e49f8386f395bd1f190f57860d601af60795d19988f7206af4d2c829e1c1a93f6f43caaf54e2d325f5cb648848d0d65069ffa372b9a29c9412695529b2eaa0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Contract

    Filesize

    53KB

    MD5

    e24356ea28495b0e1b69b9a8603d53b3

    SHA1

    f1fc13753890eb26f2ed6d6f59d63e2082689fa6

    SHA256

    6207a5d1d56a6bf346c01899b305489086f70803c168920e9be8cc6fa5b5616b

    SHA512

    8417f60f5c361e8fa5c88e55e93fc3347e66c4e72c558281b9cbec9bcb6e5accef14efd7b6edb2a8ba6b21d58202139eb12d9612f50fc7987304946411a5b11a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Coordinate

    Filesize

    17KB

    MD5

    bba020b48ce0fd7c008a9669e553c753

    SHA1

    2620b9802be9df3b4d845b86303eb4a62dd6e536

    SHA256

    5708f8cf507ca99f746f7adb73438f778689b2fa1ab42c465d47e9b47694f876

    SHA512

    3bbc10788364dd2fdd837485b3dfabed6ffd1f7802fd284e4c631f87717c4c1477e0ce477f6d45aa9fbf200b3ad199f4d7954a065a31a588991ad75600576c9e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Crimes

    Filesize

    58KB

    MD5

    b1be6a708824ea3c5cf8f36419459271

    SHA1

    515363b573142ff8f8f8820d54009bf339ceba4e

    SHA256

    b3dc6542764513d7bd09d6fd8111aa5e0adb0bfa8c401e573d2beafa37a51842

    SHA512

    2568235fceef6641bab9bf5357454179ef981b18e71ba42b5e59ddd03bcad8b876dd0d1f1337c26102570b769d1457ef1610b45ac6662d4b2684059e6c0ab9a2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Dependent

    Filesize

    134KB

    MD5

    d29780a278bb821507d430c26d3d9824

    SHA1

    9f4d871d425c67a9803f35ba5a00af00c98ca355

    SHA256

    a92a07097801202ba0374231c460ec66d54ed9e49a1a26c592c776e8af8f42d8

    SHA512

    6a2e9b9049c1ebe9cd91f119deb1a2681ac9ac33ecbe5ddf0d54a0f0bf54b8f6c051a48f9d4fa1730f4d3984fa2eb871ea8f4ce5a91df99d78bbc48098a3864d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Develops

    Filesize

    82KB

    MD5

    29b3c1f2b5e93576f17c06c7aea114e2

    SHA1

    208c72a09d416443351cd95629839e9f254da1e3

    SHA256

    727b6c1aab46553efac919f188d688a09e78823afb9476bf20923732b42edb23

    SHA512

    cdeae4d2887aabff2bf1c05b88741cbe2020fec4fc17872d10e804af1116b8084fd8e6725fe1222b0a9152cd70af2c5337c6aa7215b9ceb6d20712012f05f253

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Gilbert

    Filesize

    478KB

    MD5

    6363bc32cc64e15e84000602f2cdb5c8

    SHA1

    4e3d079796910b6fac6052be14c0a32bd6f2bddc

    SHA256

    439e14ff8553551ee16715eaa745d1b3ba184d082728f9a7aa33aa162f38d1bb

    SHA512

    effe8d1394125d5e635d864aaf52ebb46f60355611154c2112ed1cc626d6daeaf375317609c128473193b2d19bfef9f182d3a9d322b73e23851f49cf3a07e962

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Moderators

    Filesize

    55KB

    MD5

    b69d2f43603e84922ffd11423ebed1d1

    SHA1

    176da2a6c3cd00301fff2b056ca694525a40d812

    SHA256

    928430c45b49db5dbac2819a68a3ccc49e143632f28255653ec34c0d279f694a

    SHA512

    6231fc45b23153510dc9f9c8016eeb08c91c8d4ebebdafce0ccc1badf9281e13a425a3ca0f9a45092166f985f173a207b680b8410f796006ecffe9d16e74b0f1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Renewable

    Filesize

    71KB

    MD5

    8d50e522d1fadb839f28eb4978c04f5b

    SHA1

    ee6f6ebf0f06a05c2e5f558af2f8a2408f3a0959

    SHA256

    a1a2b4af6f5b11c2a10573c00d0bb1260cbe4ec9974adcf7920e857674d47af8

    SHA512

    3b1d8e688bebd0435ee20d8c2a8df8fb28f02b5fdf690b38b8216868ef6a0b2c83bc18111dfc27185124ee546b3ddaaa20c1ea969829093296270e91880af472

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Responsibility

    Filesize

    119KB

    MD5

    59e67fbea3f5e29bdb3dea031f008aac

    SHA1

    d4ce2707414808ca2cb311dc3c128686e87b338f

    SHA256

    e5b1b696d769798b291c9c9ae93e199409ee61775bca91d7c427a87bf9ad157b

    SHA512

    b3fe27fdaf4c6e6623fd14b3b8355bcbbebf92ad337cf2b6c71d439dad89ab1e1a87c39372088fd524055a3f0dc268e24454e42d812a63136e6fc93725500d6e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Saving

    Filesize

    91KB

    MD5

    271dbfa98e084e00839eb988c19cf5ff

    SHA1

    a62fb270d478eff87b60983e105ba3e49c9b3afa

    SHA256

    2b4303754a2bcdb3a4738db15b2ca242f4419a4d89fae7559767128e328917a5

    SHA512

    837d051958f1ff33bc2d75309b359d99ecd408ccbe8efbd79cf16c792d9c081abad64d544980813c227fa5fd30a27e9724b3a5187719ad43535c98838cdbf098

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Senegal

    Filesize

    50KB

    MD5

    16596d3e3f55b1b96cd01c2357d5ca35

    SHA1

    a9cf8de1fe4fd3dc671c3aaa880c215cd1597a50

    SHA256

    16fd4e245be6449485bbfa10d0ea76fa741901cb865eabf8ead440b7cbc50bdc

    SHA512

    61ef64facceb2a8cbec9f5a930bb027c5760520e4bf6ecb5a2f823c0396737de4a977fb929bc551b426c7d90fdd7facb6809635313cd75105245a662743f60d4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Separated

    Filesize

    76KB

    MD5

    bffa3dd025640bdec6090d5dd3d38113

    SHA1

    7d337740f2770ed993defe04306f4a7a539ba5f1

    SHA256

    9a010cff7fd75dde636a7f57caa6a5dba39f4d70a47b001649108b64db468fd7

    SHA512

    f66365c07e4615fe0120c30963b79564b6f4910b6d6c87b521a017ea516a267e1b69214a338890da60e2db3fcca9a870da5d54e6f8a54d5d427c5a182fb620ca

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Ship

    Filesize

    77KB

    MD5

    8dece92d979e5bbc9dd451697e48f590

    SHA1

    9e754fea613333dba614e7c1520b86549ab11b2e

    SHA256

    df5ab9e37061fd2c62bb8fdf438312ddda9d0fe6e8f6fba0c537afd8c4580a37

    SHA512

    03f3f9ae3dbb4b49b4dbb1aa2a1340a274bec9e9a1025c67003102093cb9e4a140be090a11a8c8ac51d4bc9a7209d5e436b853b489d4e3c7aac5145e9b4e0b7e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Smell

    Filesize

    2KB

    MD5

    28169287a48d94fc24e839388f769275

    SHA1

    32be0226b49ce503033f0f3194b16204eaf61fc6

    SHA256

    cef1855cf99e444f5570534a0d7bc3388f0a898b61d58b480690cc341b217032

    SHA512

    f01dbe60c74f16e31ed9420afc5f0644ee51fc05c11a04a31cc7980e20b782729766fb160e2f095b26642d5df99f657d66e5d13b08e72182a2c67139c48f6683

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Symphony

    Filesize

    18KB

    MD5

    216c911a9e37e1e31e5660bc6c064bf7

    SHA1

    6e5b3bfd5f4f14fa68694703e0f62bb2185b9a60

    SHA256

    705626e965a28111cbf72346e4390f4e1f5ff9b79f0ec21e66d629b67ea89f5c

    SHA512

    90e28f5d2545d66e7461e9a6ff7e47c17611365dd970170a1c56aa17b75a84df9e750c20e4ac2eff49e7afdeea989218659a83d985fda6f905e4f195614a113d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Topless

    Filesize

    56KB

    MD5

    8c314f238d6a342215dac20a1d9b079b

    SHA1

    c7caf344fa1ce67a3c329731de7887746ad93ac9

    SHA256

    849f35166b415f3d49680392ecf1284010a64448687cddd0870772ea94ea8c39

    SHA512

    039d5eb052f8bb81fa9a3f92d13820b7d52998de651ee45b6b7db3ac762c299cd475486e0b440a96cbdf6ff7a0068779578bfc3265c24b98e03552665c691854

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Vancouver

    Filesize

    51KB

    MD5

    4bbb05b6dc059ff0ddf3d4e98be07974

    SHA1

    1b5af37c41f73e5fa75bd946dd123f0a072a4236

    SHA256

    37f0cf1104ab49803068d87cf532c5e3603d8715a6ea09217aa60e66132fa4c0

    SHA512

    b248ce37d7673bf1bb114fdff0eb5888192a7f3ad6007b6fada51fcbc1508b7855c18a9949cb995f41fbd3a790a2af2afe91370320f59d91595895bb20f791db

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Web

    Filesize

    90KB

    MD5

    beed2c760174e58d26028502f94b8c44

    SHA1

    76d01c3c12cda73a098e55ac3cce48c2156ac445

    SHA256

    f77376bf49e5b71759cda1127b2db5bd4638138461faf675ac757793a2e0cb69

    SHA512

    022d3adb491dc5ca27f61aebf33602183a67897190ebb25cd85e41abdc24f089651756773405422a26b19eb6b518124d4866fdd93731d39146f5c16aebfa35c3