Overview
overview
10Static
static
10002.7z
windows7-x64
002.7z
windows10-2004-x64
002.7z
android-9-x86
002.7z
android-13-x64
002.7z
macos-10.15-amd64
002.7z
ubuntu-18.04-amd64
002.7z
debian-9-armhf
002.7z
debian-9-mips
002.7z
debian-9-mipsel
01aabfaa41...50.exe
windows7-x64
301aabfaa41...50.exe
windows10-2004-x64
301aabfaa41...50.exe
android-13-x64
01aabfaa41...50.exe
android-13-x64
01aabfaa41...50.exe
macos-10.15-amd64
01aabfaa41...50.exe
ubuntu-18.04-amd64
01aabfaa41...50.exe
debian-9-armhf
01aabfaa41...50.exe
debian-9-mips
01aabfaa41...50.exe
debian-9-mipsel
01c647838c...7f.exe
windows7-x64
301c647838c...7f.exe
windows10-2004-x64
1001c647838c...7f.exe
android-9-x86
01c647838c...7f.exe
android-13-x64
01c647838c...7f.exe
macos-10.15-amd64
01c647838c...7f.exe
ubuntu-18.04-amd64
01c647838c...7f.exe
debian-9-armhf
01c647838c...7f.exe
debian-9-mips
01c647838c...7f.exe
debian-9-mipsel
02f5c32fa2...d6.exe
windows7-x64
602f5c32fa2...d6.exe
windows10-2004-x64
602f5c32fa2...d6.exe
android-9-x86
02f5c32fa2...d6.exe
android-13-x64
02f5c32fa2...d6.exe
macos-10.15-amd64
Analysis
-
max time kernel
97s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 08:57
Static task
static1
Behavioral task
behavioral1
Sample
002.7z
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
002.7z
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
002.7z
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
002.7z
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
002.7z
Resource
macos-20241106-en
Behavioral task
behavioral6
Sample
002.7z
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral7
Sample
002.7z
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral8
Sample
002.7z
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
002.7z
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral10
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral12
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral13
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral14
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
macos-20241101-en
Behavioral task
behavioral15
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral16
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral17
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral18
Sample
01aabfaa4177d8d4953a65e8c0d92df98d5eb9a3b8d557a369301660a252f550.exe
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral19
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral22
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral23
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
macos-20241101-en
Behavioral task
behavioral24
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral25
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral26
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral27
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral28
Sample
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral30
Sample
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral31
Sample
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral32
Sample
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
Resource
macos-20241106-en
General
-
Target
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
-
Size
70KB
-
MD5
58d6eab3aafd9139a2f1c7606ecd4cef
-
SHA1
4152a7431b3d5dd8b0f6ad08148cb166315f41e9
-
SHA256
02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6
-
SHA512
ae92012d8401c886cb898ac0134db1567aaefb467d04d7afdb4e3e6b390b929dc353467d55b8cce5f3c74c942ac79ce565c172e296468ac44b3d8bd730a52c49
-
SSDEEP
1536:ZZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:wd5BJHMqqDL2/Ovvdr
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fbidrckzfvu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe" 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\K: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\L: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\O: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\W: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\X: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\Z: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\G: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\H: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\N: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\P: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\U: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\V: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\Y: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\A: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\E: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\I: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\J: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\M: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\Q: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\R: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\S: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe File opened (read-only) \??\T: 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5088 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe 5088 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe 5088 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe 5088 02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exeC:\Users\Admin\AppData\Local\Temp\02f5c32fa22fdc43924718b66ff5aec3115f5d0e1d7bb873b1cd2440eee016d6.exe dsrm -subtree -noprompt -c user"http://+:443"1⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5088