Overview
overview
10Static
static
10Malware-1-master.zip
windows10-2004-x64
1Malware-1-...30.exe
windows10-2004-x64
10Malware-1-...40.exe
windows10-2004-x64
10Malware-1-...32.exe
windows10-2004-x64
10Malware-1-.../5.exe
windows10-2004-x64
10Malware-1-...91.exe
windows10-2004-x64
10Malware-1-...ey.exe
windows10-2004-x64
7Malware-1-....0.zip
windows10-2004-x64
1Malware-1-...ad.exe
windows10-2004-x64
3Malware-1-...ti.exe
windows10-2004-x64
5Malware-1-...an.bat
windows10-2004-x64
7Malware-1-...an.exe
windows10-2004-x64
3Malware-1-...ve.bat
windows10-2004-x64
7Malware-1-...ve.exe
windows10-2004-x64
7Malware-1-...ya.exe
windows10-2004-x64
Malware-1-...re.exe
windows10-2004-x64
10Malware-1-...ry.exe
windows10-2004-x64
10Malware-1-...ck.exe
windows10-2004-x64
3Malware-1-...he.exe
windows10-2004-x64
10Malware-1-...op.exe
windows10-2004-x64
7Malware-1-...rb.exe
windows10-2004-x64
10Malware-1-...ue.exe
windows10-2004-x64
1Malware-1-...ng.exe
windows10-2004-x64
6Malware-1-...kt.bat
windows10-2004-x64
7Malware-1-...o3.exe
windows10-2004-x64
10Malware-1-...ey.exe
windows10-2004-x64
10Malware-1-.../m.exe
windows10-2004-x64
Malware-1-...o3.exe
windows10-2004-x64
9Malware-1-...dme.md
windows10-2004-x64
3Malware-1-...er.zip
windows10-2004-x64
1Malware-1-...ic.exe
windows10-2004-x64
3Malware-1-...in.exe
windows10-2004-x64
10Resubmissions
13-01-2025 04:35
250113-e7x5tswlfz 1013-01-2025 03:52
250113-ee43nsvjby 1012-01-2025 15:57
250112-tealdsymgt 1012-01-2025 15:53
250112-tbnc3s1mhn 10Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 15:57
Behavioral task
behavioral1
Sample
Malware-1-master.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Malware-1-master/2530.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Malware-1-master/2887140.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Malware-1-master/32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Malware-1-master/5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Malware-1-master/96591.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Malware-1-master/Amadey.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Malware-1-master/Blocked-v1.0.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Malware-1-master/Download.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
Malware-1-master/Illuminati.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Malware-1-master/MEMZ-Clean.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
Malware-1-master/MEMZ-Clean.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Malware-1-master/Petya.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
Malware-1-master/Software.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Malware-1-master/WannaCry.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
Malware-1-master/Win32.EvilClusterFuck.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Malware-1-master/apache.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
Malware-1-master/butterflyondesktop.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Malware-1-master/crb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
Malware-1-master/eternalblue.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Malware-1-master/fear.png.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
Malware-1-master/getr3kt.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Malware-1-master/iimo3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
Malware-1-master/jey.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Malware-1-master/m.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
Malware-1-master/mo3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Malware-1-master/readme.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
Malware-1-master/wannakey-master.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Malware-1-master/wintonic.exe
Resource
win10v2004-20241007-en
General
-
Target
Malware-1-master/mo3.exe
-
Size
1.9MB
-
MD5
9d7166176660b51398b82a2793d9e9ab
-
SHA1
b8511b36463a9b64b1a383805f16c99d4cf9ab30
-
SHA256
ff4e859d5fa6d8dea84aba8c9c0ccbc58f86be198e4a569f19f60c7844dd4edd
-
SHA512
938b5c274cb2d3218465f6f9eac21fb37de419e7f5e1a1383a5620d2a5b4cf50f4e730d4de45a67dca9b00373e8fd7c096d1cece1ffdb8a16be85e92f394b587
-
SSDEEP
49152:h6EMvW2D6H+CFkDSMMRTw+0PRzgUfyMzKmWSfg:h6EChD6HPeDFpHGUfy4rlY
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mo3.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mo3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mo3.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation mo3.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine mo3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4552 mo3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mo3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4552 mo3.exe 4552 mo3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4552 wrote to memory of 1392 4552 mo3.exe 82 PID 4552 wrote to memory of 1392 4552 mo3.exe 82 PID 4552 wrote to memory of 1392 4552 mo3.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mo3.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mo3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Malware-1-master\mkill.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228B
MD508fa0637c988a3fd5a678cb1724c24c2
SHA1a8adad5d57ab4dd0b33e9b3be2ca771c9964965b
SHA256f4f747205bb51dc20ad941db3a37367e937290a802f278d027a66fc0b0d6abdf
SHA5128bda9663dbd5ac0247c7bac29507d8a08689c264ec38bf7539d249deed9886533dcd1e234146d7fc4205567f39a4d029c49e0351b73c5cc4d2e61d06c46a332b