Overview
overview
10Static
static
10533.7z
windows7-x64
533.7z
windows10-2004-x64
533.7z
android-10-x64
533.7z
android-13-x64
533.7z
macos-10.15-amd64
533.7z
ubuntu-18.04-amd64
533.7z
debian-9-armhf
533.7z
debian-9-mips
533.7z
debian-9-mipsel
084c57449c...0e.exe
windows7-x64
10084c57449c...0e.exe
windows10-2004-x64
10084c57449c...0e.exe
android-13-x64
084c57449c...0e.exe
android-13-x64
084c57449c...0e.exe
macos-10.15-amd64
084c57449c...0e.exe
ubuntu-18.04-amd64
084c57449c...0e.exe
debian-9-armhf
084c57449c...0e.exe
debian-9-mips
084c57449c...0e.exe
debian-9-mipsel
14b94844b9...c3.exe
windows7-x64
1014b94844b9...c3.exe
windows10-2004-x64
1014b94844b9...c3.exe
android-11-x64
14b94844b9...c3.exe
android-13-x64
14b94844b9...c3.exe
macos-10.15-amd64
14b94844b9...c3.exe
ubuntu-18.04-amd64
14b94844b9...c3.exe
debian-9-armhf
14b94844b9...c3.exe
debian-9-mips
14b94844b9...c3.exe
debian-9-mipsel
2daa514408...2e.exe
windows7-x64
102daa514408...2e.exe
windows10-2004-x64
102daa514408...2e.exe
android-11-x64
2daa514408...2e.exe
android-13-x64
2daa514408...2e.exe
macos-10.15-amd64
Analysis
-
max time kernel
99s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/02/2025, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
533.7z
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
533.7z
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
533.7z
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
533.7z
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
533.7z
Resource
macos-20241101-en
Behavioral task
behavioral6
Sample
533.7z
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral7
Sample
533.7z
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral8
Sample
533.7z
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
533.7z
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral10
Sample
084c57449c765416706301c723116da5073aa60da415c0eb3013239611135b0e.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
084c57449c765416706301c723116da5073aa60da415c0eb3013239611135b0e.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral12
Sample
084c57449c765416706301c723116da5073aa60da415c0eb3013239611135b0e.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral13
Sample
084c57449c765416706301c723116da5073aa60da415c0eb3013239611135b0e.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral14
Sample
084c57449c765416706301c723116da5073aa60da415c0eb3013239611135b0e.exe
Resource
macos-20241106-en
Behavioral task
behavioral15
Sample
084c57449c765416706301c723116da5073aa60da415c0eb3013239611135b0e.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral16
Sample
084c57449c765416706301c723116da5073aa60da415c0eb3013239611135b0e.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral17
Sample
084c57449c765416706301c723116da5073aa60da415c0eb3013239611135b0e.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral18
Sample
084c57449c765416706301c723116da5073aa60da415c0eb3013239611135b0e.exe
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral19
Sample
14b94844b99ac43c014ea73c3400097e3239a7307d1618e84159a741ab0e8ac3.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
14b94844b99ac43c014ea73c3400097e3239a7307d1618e84159a741ab0e8ac3.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral21
Sample
14b94844b99ac43c014ea73c3400097e3239a7307d1618e84159a741ab0e8ac3.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral22
Sample
14b94844b99ac43c014ea73c3400097e3239a7307d1618e84159a741ab0e8ac3.exe
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral23
Sample
14b94844b99ac43c014ea73c3400097e3239a7307d1618e84159a741ab0e8ac3.exe
Resource
macos-20241106-en
Behavioral task
behavioral24
Sample
14b94844b99ac43c014ea73c3400097e3239a7307d1618e84159a741ab0e8ac3.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral25
Sample
14b94844b99ac43c014ea73c3400097e3239a7307d1618e84159a741ab0e8ac3.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral26
Sample
14b94844b99ac43c014ea73c3400097e3239a7307d1618e84159a741ab0e8ac3.exe
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral27
Sample
14b94844b99ac43c014ea73c3400097e3239a7307d1618e84159a741ab0e8ac3.exe
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral28
Sample
2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral31
Sample
2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral32
Sample
2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe
Resource
macos-20241101-en
General
-
Target
2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe
-
Size
70KB
-
MD5
193e702195e8ed5c50cc482569559462
-
SHA1
47a5307b78fa2c60c20ce63c553aef4a6d5a3e1c
-
SHA256
2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e
-
SHA512
d5ae5a8bccfc08bc07834caaebaed7a6cde1911170eb8de99322bf15be3ad111b5042d6401dcb06e64a6a429eee19d964878089af205474b377b77627bb63a35
-
SSDEEP
768:lXStkFWTBhyugDC60CPJkEBx9w7mSDh3vkkjvshT3ED18nv04ZPqpb348Uq1krHO:liMWV3gDCk6EBwT/kJbvkbuq1krj0z
Malware Config
Signatures
-
Nefilim
Ransomware first seen in early 2020 which shares code with the Nemty family. Rewritten in Golang in July 2020.
-
Nefilim family
-
Renames multiple (167) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4152 timeout.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5048 wrote to memory of 1804 5048 2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe 83 PID 5048 wrote to memory of 1804 5048 2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe 83 PID 5048 wrote to memory of 1804 5048 2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exeC:\Users\Admin\AppData\Local\Temp\2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe dsrm -subtree -noprompt -c user"http://+:443"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 3 /nobreak && del "C:\Users\Admin\AppData\Local\Temp\2daa5144081dd288c1dc936ec27b1c8bd709633450ceb73f235fccd1c3d3c62e.exe" /s /f /q2⤵
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3 /nobreak3⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4152
-
-