Overview
overview
10Static
static
1036.exe
windows7-x64
336.exe
windows10-2004-x64
3Enalib.exe
windows7-x64
10Enalib.exe
windows10-2004-x64
10RDriver.exe
windows7-x64
8RDriver.exe
windows10-2004-x64
8SDriver.exe
windows7-x64
3SDriver.exe
windows10-2004-x64
3T.exe
windows7-x64
10T.exe
windows10-2004-x64
10autoruns.exe
windows7-x64
3autoruns.exe
windows10-2004-x64
3e.exe
windows7-x64
10e.exe
windows10-2004-x64
10fake jpg shit.lnk
windows7-x64
10fake jpg shit.lnk
windows10-2004-x64
10fake photo.lnk
windows7-x64
3fake photo.lnk
windows10-2004-x64
7noyjhoadw.exe
windows7-x64
10noyjhoadw.exe
windows10-2004-x64
10unins000.exe
windows7-x64
3unins000.exe
windows10-2004-x64
3use for by...ck.exe
windows7-x64
8use for by...ck.exe
windows10-2004-x64
8Analysis
-
max time kernel
19s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/01/2025, 13:13
Behavioral task
behavioral1
Sample
36.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
36.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Enalib.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Enalib.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
RDriver.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
RDriver.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
SDriver.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SDriver.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
T.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
T.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
autoruns.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
autoruns.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
e.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
fake jpg shit.lnk
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
fake jpg shit.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
fake photo.lnk
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
fake photo.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
noyjhoadw.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
noyjhoadw.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
unins000.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
unins000.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
use for bypassing taskmgr block.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
use for bypassing taskmgr block.exe
Resource
win10v2004-20241007-en
General
-
Target
unins000.exe
-
Size
5.3MB
-
MD5
e94affb98148fc4e0cfb9a486bb37160
-
SHA1
3cf9cbca48ed9e36a0ccd17cf97f6e4b96c14a24
-
SHA256
bcbdb74f97092dfd68e7ec1d6770b6d1e1aae091f43bcebb0b7bce6c8188e310
-
SHA512
82d01ed6fb9d0fcd88193ac01e262b2ac12b31a0826efb3b5cc0a7d3b710a502ea0d4b5b13b7a3701b27c29f181e066e71a7542b060c41fa93a1f33f701d4713
-
SSDEEP
49152:siE8NvQCX7lF4RQSxPodbxsl7IwDksRinJwj9LaDpppz0ooEp333nX18954M/+df:siE8OQMlIwDkZqBLe333niUxt5fb9T/
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4880 1728 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unins000.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1728 unins000.exe 1728 unins000.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1728 unins000.exe Token: SeDebugPrivilege 1728 unins000.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 4880 1728 unins000.exe 30 PID 1728 wrote to memory of 4880 1728 unins000.exe 30 PID 1728 wrote to memory of 4880 1728 unins000.exe 30 PID 1728 wrote to memory of 4880 1728 unins000.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\unins000.exe"C:\Users\Admin\AppData\Local\Temp\unins000.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 6602⤵
- Program crash
PID:4880
-