Overview
overview
10Static
static
3TradingVie...op.exe
windows11-21h2-x64
10apt/24.10....te.exe
windows11-21h2-x64
1apt/php/Pu...nt.exe
windows11-21h2-x64
3apt/php/Pu...en.exe
windows11-21h2-x64
3apt/php/WinSCP.exe
windows11-21h2-x64
6apt/php/WinSCP.exe
windows11-21h2-x64
6apt/php/unins000.exe
windows11-21h2-x64
5ispell/Acc...ad.exe
windows11-21h2-x64
3ispell/Ima...es.exe
windows11-21h2-x64
4ispell/Sou...SC.exe
windows11-21h2-x64
3ispell/pro...st.exe
windows11-21h2-x64
1ispell/pro...pp.exe
windows11-21h2-x64
3ispell/pro...32.exe
windows11-21h2-x64
4ispell/pro...ce.exe
windows11-21h2-x64
3ispell/pro...ce.exe
windows11-21h2-x64
1ispell/pro...ls.exe
windows11-21h2-x64
4ispell/pro...ce.exe
windows11-21h2-x64
4ispell/ru-...xe.dll
windows11-21h2-x64
1ispell/wab.exe
windows11-21h2-x64
3ispell/wabmig.exe
windows11-21h2-x64
3Analysis
-
max time kernel
87s -
max time network
96s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-01-2025 15:17
Static task
static1
Behavioral task
behavioral1
Sample
TradingView Premium Desktop.exe
Resource
win11-20241023-en
Behavioral task
behavioral2
Sample
apt/24.10.4.756/service_update.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
apt/php/PuTTY/pageant.exe
Resource
win11-20241023-en
Behavioral task
behavioral4
Sample
apt/php/PuTTY/puttygen.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
apt/php/WinSCP.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
apt/php/WinSCP.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
apt/php/unins000.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
ispell/Accessories/wordpad.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
ispell/ImagingDevices.exe
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
ispell/Sounds/DG/PAV3WSC.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
ispell/profiles/Drivers/prl_net_inst.exe
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
ispell/profiles/SIA/SharedIntApp.exe
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
ispell/profiles/SIA/mapi32.exe
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
ispell/profiles/Services/WoW/coherence.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
ispell/profiles/Services/coherence.exe
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
ispell/profiles/Services/prl_tools.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
ispell/profiles/Services/prl_tools_service.exe
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
ispell/ru-RU/ImagingDevices.exe.dll
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
ispell/wab.exe
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
ispell/wabmig.exe
Resource
win11-20241007-en
General
-
Target
apt/php/unins000.exe
-
Size
3.1MB
-
MD5
11878001a28ce434f6eb02aa85c3199b
-
SHA1
47dd4e5fb52236913b63d4b520775ba0685a8334
-
SHA256
b3a2140b8ca0babc75daea00d59a3804b616b10bacf2559a3b3f510298882065
-
SHA512
9afa2daffea483a57f0d85bce9e598792714433bcda3f100562f60066e84d5b506c79b638c20c859c80f039e4b784ad0adce6d10cf059503e624b0fb05ce5be0
-
SSDEEP
49152:cWGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIHTbF333K/ogj7m50yIUO9:4tLutqgwh4NYxtJpkxhGK333k
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3068 _unins.tmp -
Executes dropped EXE 1 IoCs
pid Process 3068 _unins.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unins000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _unins.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 _unins.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3552 wrote to memory of 3068 3552 unins000.exe 77 PID 3552 wrote to memory of 3068 3552 unins000.exe 77 PID 3552 wrote to memory of 3068 3552 unins000.exe 77 PID 3068 wrote to memory of 4360 3068 _unins.tmp 78 PID 3068 wrote to memory of 4360 3068 _unins.tmp 78 PID 3068 wrote to memory of 4360 3068 _unins.tmp 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\apt\php\unins000.exe"C:\Users\Admin\AppData\Local\Temp\apt\php\unins000.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\iu-14D2N.tmp\_unins.tmp"C:\Users\Admin\AppData\Local\Temp\iu-14D2N.tmp\_unins.tmp" /SECONDPHASE="C:\Users\Admin\AppData\Local\Temp\apt\php\unins000.exe" /FIRSTPHASEWND=$801C02⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /u /s "C:\Program Files (x86)\WinSCP\DragExt64.dll"3⤵
- System Location Discovery: System Language Discovery
PID:4360
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD511878001a28ce434f6eb02aa85c3199b
SHA147dd4e5fb52236913b63d4b520775ba0685a8334
SHA256b3a2140b8ca0babc75daea00d59a3804b616b10bacf2559a3b3f510298882065
SHA5129afa2daffea483a57f0d85bce9e598792714433bcda3f100562f60066e84d5b506c79b638c20c859c80f039e4b784ad0adce6d10cf059503e624b0fb05ce5be0