Resubmissions

03-02-2025 21:24

250203-z826dstngy 10

03-02-2025 21:22

250203-z788bavrhl 10

Analysis

  • max time kernel
    12s
  • max time network
    6s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2025 21:22

General

  • Target

    [ex]acid1.exe

  • Size

    1.2MB

  • MD5

    a408f39cef6236f43de3038325c1797b

  • SHA1

    856066d03ad7faae5dd60d8e9f641fa4fe623b63

  • SHA256

    978de0f64b32068bd7891c870ca55615a9937b3b29b49a5d64dc54382919aca8

  • SHA512

    7ed362d9ddfc10593fc64da4f6392cd7b21155da53ea147c22b6bb913bfc321280228e02b3fc8dc5c7f0c54b878d62acec2d92a4b8a07c1c137ecac938cef6bc

  • SSDEEP

    24576:XBbHHLIXfiCWjNESzV01yB3nDk/5LPIV9hN+EeRmGBlCdXgr:xbVCAHJI/5LwrWvvCdXgr

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[ex]acid1.exe
    "C:\Users\Admin\AppData\Local\Temp\[ex]acid1.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:724
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Radio Radio.cmd & Radio.cmd
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3408
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:776
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1252
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1988
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 750915
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1912
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Image
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3024
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Allan" Bangladesh
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3976
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 750915\Louise.com + Cohen + Rca + Claimed + Seattle + Espn + Tanzania + Astrology + Fitted + Invest 750915\Louise.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2844
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Committed + ..\Joke + ..\Proudly + ..\Ur + ..\Rescue + ..\Unavailable + ..\Knight + ..\Transparent + ..\Bye F
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1668
      • C:\Users\Admin\AppData\Local\Temp\750915\Louise.com
        Louise.com F
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3400
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\750915\F

    Filesize

    631KB

    MD5

    fe3ffbb685510abb7208608ed51bba84

    SHA1

    ca50015108cefdddb82d732fdfadd0290e94c4ad

    SHA256

    978e554b9993c387406ddf98f207fc028176c2b49c371bbaa75b8a8a575230c5

    SHA512

    59c696f6457d58b0fa3a37ebb6a88f79416128dbd94a1e77bf7453f58effe19df9f76640b00a9fd43773e05b18dff7c59d1f22d8f3fbbeb7f41dee8d52948f58

  • C:\Users\Admin\AppData\Local\Temp\750915\Louise.com

    Filesize

    90KB

    MD5

    c2eab4118d510411b49a97d2e97eee74

    SHA1

    77338901787b9370649ae470c57a16147640498f

    SHA256

    0f8e427849bff424f3c2c286905314cc317f3b5630d1bf60f5ea144b17534876

    SHA512

    4da298d2178b21b02c20805913a70378e54c3eb0d384469305f5a90c77de66c2343ed6294803b71e1e7124ecb7a62582f602d8708b0e6c2b4698eed36fdb7268

  • C:\Users\Admin\AppData\Local\Temp\750915\Louise.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Temp\Astrology

    Filesize

    147KB

    MD5

    e0e59d896743ed99efe27ce8ef577871

    SHA1

    3501259a297dc208ee83eb686e73f19355c2fda9

    SHA256

    938cd8a6ef53760b0cf10e38cf433cde74f803c62e17be4745819f0a0dbe1c54

    SHA512

    daf4451e9b6d3dae625113138366b1a76a542df7417ecd0644dc59e2284116f144907391e4d65b010e5ec224ff4d7046eba7d65411328e5e32584a960a21bc16

  • C:\Users\Admin\AppData\Local\Temp\Bangladesh

    Filesize

    964B

    MD5

    af5a9db699fb4e1c2c5125ca06c46df3

    SHA1

    800ca8a768ac484882b5a82ff53357adc2e155a8

    SHA256

    4053bb989625ddc9c7c00a2005159c5b08288a3b2d1ff8958c91a6f7b1b4ceb8

    SHA512

    1141e8d9f0bf8932a5493a01e212d829de07cf6a5dc2cf5ebd7226406c1f3c03150c9335fbf70c9fba2c8a9cea92da11fcf8c4301a4741f467455979f08eacb7

  • C:\Users\Admin\AppData\Local\Temp\Bye

    Filesize

    91KB

    MD5

    1be298591623ad6c0f50014a8903712f

    SHA1

    391d84b0a12cde6a2b87fd91e5474116288290ee

    SHA256

    4ba4d7636b0cad20db4dde3781d1645cfeba927f25f6cf18b05c19634d10b3c5

    SHA512

    3f6c5b626c19682ef7f3e3832ffeb8e6b37e1aecfbf3883ac27ece9ac3f7b212d4f023600b9d7165ed3f1329ba72d41d248db379d51927719b54f648d06e581c

  • C:\Users\Admin\AppData\Local\Temp\Claimed

    Filesize

    129KB

    MD5

    4b6d18552484cdd8a6deb3077cf32fdd

    SHA1

    c893203b03fbaaab7aa55269dc3ecf02becd8a16

    SHA256

    c8a8d3b83353f99d0d0c64c9e2a00f6a69fe93b7424b2be1562426127c0787d6

    SHA512

    79d79122f9d223cdd1ac6b5c4e20251558ca6274dfa4251332d958e2383809bf257558deb7d660c50b26d9950a638dd23d4b3fbb53571d5cb2f1c4d2c6403fed

  • C:\Users\Admin\AppData\Local\Temp\Cohen

    Filesize

    90KB

    MD5

    605ff257d35d3c9a097b0e97a51627ec

    SHA1

    c4746bed66d3a8ab6a3c856ca3d2e4ffdb3f9033

    SHA256

    7a58897cf6648120946afbf9dcb80393179bb6196afea4e7fb1a0eb636e066a1

    SHA512

    bd499cf0f158dadf2135bacb09eb5a8c338d0d37aab71709ce8fca86050f1c4287f0413c9825c4681e143b3641ef103c93dc05d1281cacec1c864048c4873bd0

  • C:\Users\Admin\AppData\Local\Temp\Committed

    Filesize

    54KB

    MD5

    d821e2b63580f332cb6d40df591b9a88

    SHA1

    58e2aee88db82f7ca51de0f694e8ca554c33a8fd

    SHA256

    3d8d15cf8f108b86a0e3e5be964b7a6c349f6d3d85ba75c411fbcda264260ff6

    SHA512

    b5688915b250bd6e66c676d7accd18d73848ba9b13c8cfbae0c7a6314f58d4150bf9f6c9623a3f4923c3194228a11c2e76fafbf1fc835426ba74ab9f7ffb6763

  • C:\Users\Admin\AppData\Local\Temp\Espn

    Filesize

    60KB

    MD5

    7e2c12b240f8bfecd37ead542879efa1

    SHA1

    5a6b37b3653430e7d4a9d11e8b9a5b9d943c254b

    SHA256

    490a5ca5c9fdeae90cbc4b9fdb24d876238423b73d705aeee3c65fb62d99b700

    SHA512

    fe913dce7bfff9fa79a3f56fd25a97c7a246acda42641c6d428ca5580161f429b427bce330e29ac42991948abaa2d24c0d2fa81d15bfa85939ba812ebd638ab9

  • C:\Users\Admin\AppData\Local\Temp\Fitted

    Filesize

    108KB

    MD5

    41a1bb5d64a34dae1cc56a8a7d07f195

    SHA1

    b7d33997622f8e784c34097ef079c22aacbabc8e

    SHA256

    686bf8d3988f9f8f77aa8fbdc20ed453f81446de1267fb939a5343bb1190332c

    SHA512

    bd2c0834adbbb1dc7957da470be37c8adb833d568a04932afb8f29818ddf3513a1f61ede67fff85f9e098134a1cd32cc24caac5f333f8cf61e084f55dc3a26a6

  • C:\Users\Admin\AppData\Local\Temp\Image

    Filesize

    476KB

    MD5

    a3fabda4922043f202636f030d91415e

    SHA1

    f52eef855c6315ee32b8fb5cbfd736cb6e30722a

    SHA256

    31f176dcafe6f44db0abb607d973ec122252ee106d3a8464ebf009ca320b9aa2

    SHA512

    4c9060901fa5da5b5e0ae07ee6b64be01e82024c11c34fad4dede9d42d06ef589a09cb7326b7ba1795367b52c8fd36a342195b95d4077205898b3379fddcaa92

  • C:\Users\Admin\AppData\Local\Temp\Invest

    Filesize

    95KB

    MD5

    840cb10d8da8f9a5d2e6ce5589ddecf6

    SHA1

    0dc7875ba564d8fe91b13a34eba531920cac0575

    SHA256

    21347f46a097e78abf289b9d626b4b1b571fc16bcbf280937ee3e70ed08a4700

    SHA512

    3b8cb66538254ae248bc334406e1d8288cfd21785300803e5ddf7797dd4d59ccc2bb460a767fcde2125f2831cce89766cfec562aa0a2185321189ad5616d8826

  • C:\Users\Admin\AppData\Local\Temp\Joke

    Filesize

    50KB

    MD5

    b23484479d2135b6faf5a8d5014a5e52

    SHA1

    6adadf32e1467bc3fc2ea0be6e08c1a0130d47f8

    SHA256

    b005d3f9a19520e67c403459540f7ec8a5769a1524418e5489197ffce71d58dd

    SHA512

    d618607b1bfeded9985b8a0d178be75f0cece042aee10eb830edc1d9e7c1fc721bd0268cb4d11840d2f374f97e4eed2161f91ecf46811fc1ccabf1c652d066db

  • C:\Users\Admin\AppData\Local\Temp\Knight

    Filesize

    86KB

    MD5

    70ca3f70c2cc90f14e411ba404b6b7d8

    SHA1

    b1f002106af154839697124d34aa48a010daddd8

    SHA256

    742a79c9c0e28592fb844f6d136b00b84c450fbd9668450bc13b78f5e6a0817f

    SHA512

    bb4a8f58d3405531a64f4c1bdd88040329206d27f308adafd7071a7ee222f8ada619da9e260195e0ee3a3e5ce368f0274bdebe7c3c6580ebd2e8d74018245219

  • C:\Users\Admin\AppData\Local\Temp\Proudly

    Filesize

    54KB

    MD5

    a34ae33a22b4911fa7d843998e50611a

    SHA1

    1d1361171769c4f0c9542d86af294fb61cd26d4c

    SHA256

    4a0b98dca7e234c9bd35e719936ad8661c0ed5487bf7b8279a4087eac70059d1

    SHA512

    d22b2b331400091a61d6a87aac0d34816f3f0f8ed80643d9a9232551300169e7a0bac1054d719008a39d06729237bdc9a7ece7d2d59468418489f2508cf12dea

  • C:\Users\Admin\AppData\Local\Temp\Radio

    Filesize

    15KB

    MD5

    8c23cb4110dbd72072c4e0d8fafc8500

    SHA1

    f2f01a449593ef9f301cb176cfa215a4bcd6ac6b

    SHA256

    c37e9a72ac2565d50eaa0eff1340ca1668c063645f95fbbd7aef29c97a593b84

    SHA512

    6c7008b2ab188442027712ab4835afff79eb12282bcfbb1ea74834fa5118b0855726f5a0446ce2ba2a55bdbd02258611c28b0c2933290ef022f3e143c504f66f

  • C:\Users\Admin\AppData\Local\Temp\Rca

    Filesize

    53KB

    MD5

    96f5abc8b52defb180e9063d9a9a125d

    SHA1

    dd9f5898c22d3a153aa490bdd8f7dbf54986135c

    SHA256

    145029900af465bb72e5240268fbca67c325843d81c3ca42cb6f9e75572f720d

    SHA512

    f930c230ebf2d5521a565f0c8e986e076598a550803d4cdaadf14307caeb894e1de16c26b64e8d0282a41ac1e6e48578d5b02faf662d04b29f0769d5097f293b

  • C:\Users\Admin\AppData\Local\Temp\Rescue

    Filesize

    64KB

    MD5

    91a684cd9bc55e4d9dc0ef1eff72484e

    SHA1

    803952d4dac1aae17b284e8209f54d6478d6d094

    SHA256

    7f477975a1ee1b44ec1741cf677e65bb96cc7ad09dcf84a3e47a8fa5ec564512

    SHA512

    b12112a3cb30894cb75cd3368f8f72a42f5cbc414405526dbc06108f88690315e3dbadf16baa792f30baa18e19cc593f957617441e2550e53479c8f9f964f329

  • C:\Users\Admin\AppData\Local\Temp\Seattle

    Filesize

    99KB

    MD5

    1ac5eff9d2ef01220dd8d9d092074d7b

    SHA1

    00f4312b3c96cedc4f6e310dbe41fb61eccc785c

    SHA256

    6cb96756a45d4ef04838031c7e14e3dade9bbbd88575924ade9fc56e24ee9b4d

    SHA512

    29afbdd8bb5b1267d8fd57ba97b8929dcf0574c1a5959c4105639a30dc647fb2a9c6d05b29ed96aec398f84ffd3b1b365d880997046b497e9c12d10636ed5ed9

  • C:\Users\Admin\AppData\Local\Temp\Tanzania

    Filesize

    143KB

    MD5

    9e1d7827359c799133318765cf9dbace

    SHA1

    a789c11e8dfcf82c7811e3c3790343543325cd88

    SHA256

    54e5755c2268a0bc265425abed2e3ac700f6f816a316f0bf4eae4d2f83c92e9b

    SHA512

    aad52de6354ff54659eea8675d31df57d414e0ec2b629dcb216c8fa8db99b6d8cba7660a9565669d6e0d94aae65659303c41abbe34265a497409125e367ed8c8

  • C:\Users\Admin\AppData\Local\Temp\Transparent

    Filesize

    71KB

    MD5

    c6ee038292a86450536fb49a68261c0a

    SHA1

    6895b53cd7c504c018df7ce24a301663ab1508c8

    SHA256

    e2baaf1ddb47dc2f98276e1ee5028155907371b270a4c8baaec7be6b7a92350e

    SHA512

    2342d02e281861a00ef68e2b319470c7840e733287b253abf109e7144a2bc5dd3ef8f98023a8bd10516d22c53933e7b08a6f948f8d676b4af055c4267ac6be53

  • C:\Users\Admin\AppData\Local\Temp\Unavailable

    Filesize

    93KB

    MD5

    f6ddccbdb7aaca275748eadf80b2fe66

    SHA1

    6356ce4f6335842828054ce36c8394bc63ebfed9

    SHA256

    fcf9b09e22833b1169b273a448214f810a74a167e688dcfde69d7f9e11880f9c

    SHA512

    d7696e0f20c35716695ff6831d355eb7092315a6d48dd333ba29378021adbfcfa5b91185c0722d0fa6c046e028f6de20860b37e20bb90d86b9e7b97f8b2291d6

  • C:\Users\Admin\AppData\Local\Temp\Ur

    Filesize

    68KB

    MD5

    073dec9c18e04d43d37f4dde54056b2b

    SHA1

    77210dff5576bc81dc40d11d1fd255816c971525

    SHA256

    bfee0639fa4503a3fef6c894ab98ca194a26d79063468e36a47ac2f09ce615aa

    SHA512

    f04fd58cdd4779e5f435257273716d6c6ae82b839d13bf75e8a814647d72ffd57c64897b72aad93ff8aa7b84431446cb70a71c6483cc1f43d05109127384efaa