Overview
overview
10Static
static
32887140.exe
windows7-x64
102887140.exe
windows10-2004-x64
32887140.exe
android-9-x86
2887140.exe
android-10-x64
2887140.exe
android-11-x64
2887140.exe
macos-10.15-amd64
2887140.exe
ubuntu-18.04-amd64
2887140.exe
debian-9-armhf
2887140.exe
debian-9-mips
2887140.exe
debian-9-mipsel
Analysis
-
max time kernel
890s -
max time network
905s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 13:21
Static task
static1
Behavioral task
behavioral1
Sample
2887140.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2887140.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
2887140.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
2887140.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
2887140.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
2887140.exe
Resource
macos-20241101-en
Behavioral task
behavioral7
Sample
2887140.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
2887140.exe
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral9
Sample
2887140.exe
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral10
Sample
2887140.exe
Resource
debian9-mipsel-20240226-en
General
-
Target
2887140.exe
-
Size
144KB
-
MD5
fead887648bddd70a05cf7a7090411dd
-
SHA1
250c0de3dc100d265ae495f045a2c47dad3520e9
-
SHA256
dfaf75da62d0561d171217fe893bd818a72ebfccd9d7e7f4c046f5b3ca44794e
-
SHA512
e1f15de084a78bf27a1c62b5d0d31fabd10be13983dca05962c40ea1e8b3f7bb617e92f44a78048d3484d16f5d4b9e42bc8c5a4b02fda0e0f5eb69368149920a
-
SSDEEP
3072:buY0LMcTrgw6mo4bnGkbUyh/h39iN/Ko8LdKpZbZo:SY0IkImZUyh/h3MOc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language engncontrol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2887140.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2887140.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language engncontrol.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3500 2887140.exe 3500 2887140.exe 4496 2887140.exe 4496 2887140.exe 3168 engncontrol.exe 3168 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe 2036 engncontrol.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4496 2887140.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3500 wrote to memory of 4496 3500 2887140.exe 83 PID 3500 wrote to memory of 4496 3500 2887140.exe 83 PID 3500 wrote to memory of 4496 3500 2887140.exe 83 PID 3168 wrote to memory of 2036 3168 engncontrol.exe 88 PID 3168 wrote to memory of 2036 3168 engncontrol.exe 88 PID 3168 wrote to memory of 2036 3168 engncontrol.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2887140.exeC:\Users\Admin\AppData\Local\Temp\2887140.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\2887140.exe"C:\Users\Admin\AppData\Local\Temp\2887140.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4496
-
-
C:\Windows\SysWOW64\engncontrol.exe"C:\Windows\SysWOW64\engncontrol.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\engncontrol.exe"C:\Windows\SysWOW64\engncontrol.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2036
-