Resubmissions
12-02-2025 14:54
250212-r9zgwswmej 1012-02-2025 14:27
250212-rsdtvsvqet 1012-02-2025 14:17
250212-rl7hlavngy 1012-02-2025 13:47
250212-q3q2hatqes 1012-02-2025 13:43
250212-q1d9xstlap 1011-02-2025 01:03
250211-behmwstpdv 10Analysis
-
max time kernel
899s -
max time network
901s -
platform
windows11-21h2_x64 -
resource
win11-20250211-en -
resource tags
arch:x64arch:x86image:win11-20250211-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-02-2025 14:54
Static task
static1
Behavioral task
behavioral1
Sample
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
Resource
win11-20250211-en
General
-
Target
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
-
Size
8.5MB
-
MD5
2d690d32e637c43a18aa8f4f2fd28e48
-
SHA1
f8a5f75a34d2751c0e7195cd4adabddc1ece465e
-
SHA256
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
-
SHA512
2641192c4ebb0a66fdf6a9be16ccfc38a4cd98a32467d5b6e719c73b2893a28888b7c9c77d3db3a0d2e93d14408081bdc92238dc3a5b1479229843f354c7305e
-
SSDEEP
196608:exCyu9hdCjcHsm2gTEE/OBBZVaMKb0QqNnJi6lWzVYK5P6qwpxFlWavvy7:ervy
Malware Config
Signatures
-
Downloads MZ/PE file 3 IoCs
flow pid Process 15 1228 Process not Found 26 1228 Process not Found 23 4568 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1380 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 39 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\WFlags = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 1e00718000000000000000000000e1a40ed25739d211a40b0c50205241530000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.WindowsTerminal_8wekyb3d8bbwe\StartTerminalOnLoginTask taskmgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\NodeSlot = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\HotKey = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\ShowCmd = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings control.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "287309825" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \Registry\User\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\NotificationData explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f706806ee260aa0d7449371beb064c986830000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 0c0001008421de39050000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1008898722-3518013580-3694625758-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1384 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3488 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeShutdownPrivilege 1436 control.exe Token: SeCreatePagefilePrivilege 1436 control.exe Token: SeDebugPrivilege 3488 taskmgr.exe Token: SeSystemProfilePrivilege 3488 taskmgr.exe Token: SeCreateGlobalPrivilege 3488 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1384 explorer.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe 3488 taskmgr.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1384 wrote to memory of 3488 1384 explorer.exe 88 PID 1384 wrote to memory of 3488 1384 explorer.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e91⤵PID:4120
-
C:\Windows\system32\control.exe"C:\Windows\system32\control.exe" /name Microsoft.AdministrativeTools1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:3896
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /72⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3488
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:4676
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiIGluc3RhbGxkYXRldGltZT0iMTczOTI5NDgzNCIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNzY2NTUyNTM3MDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUzODM4NTMwNTAiLz48L2FwcD48L3JlcXVlc3Q-1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1380
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:104
-
C:\Windows\System32\g1xx1w.exe"C:\Windows\System32\g1xx1w.exe"1⤵PID:4068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5726b6ace1e7b0de1810a5e17c2ed5ce0
SHA1b6bceeaf3cc2052e639e9a79955d9da71fd94f37
SHA2560c59175ab68a6638edaa276d0a263df06bb5de360bf50d7853b9c7a16f7ca009
SHA512d1777fe6aa79a0c08ea5a8a184642ead180f04bc9ef280b7740cdbf6828fc8fea534ce61c7877439b2bf53a6fd5b656acf7cc088a9dfc06d3cc5d2839d19f251