Overview
overview
10Static
static
10241105-dtx...ed.zip
windows7-x64
1241105-dtx...ed.zip
windows10-2004-x64
1d91912b4b9...37.rar
windows7-x64
1d91912b4b9...37.rar
windows10-2004-x64
108751be484...2d.dll
windows7-x64
1008751be484...2d.dll
windows10-2004-x64
100a9f79abd4...51.exe
windows7-x64
30a9f79abd4...51.exe
windows10-2004-x64
30di3x.exe
windows7-x64
100di3x.exe
windows10-2004-x64
10201106-9sx...ed.zip
windows7-x64
1201106-9sx...ed.zip
windows10-2004-x64
12019-09-02...10.exe
windows7-x64
102019-09-02...10.exe
windows10-2004-x64
102c01b00772...eb.exe
windows7-x64
102c01b00772...eb.exe
windows10-2004-x64
731.exe
windows7-x64
1031.exe
windows10-2004-x64
103DMark 11 ...on.exe
windows7-x64
33DMark 11 ...on.exe
windows10-2004-x64
342f9729255...61.exe
windows7-x64
1042f9729255...61.exe
windows10-2004-x64
105da0116af4...18.exe
windows7-x64
75da0116af4...18.exe
windows10-2004-x64
106306868794.bin.zip
windows7-x64
16306868794.bin.zip
windows10-2004-x64
169c56d12ed...6b.exe
windows7-x64
1069c56d12ed...6b.exe
windows10-2004-x64
10905d572f23...50.exe
windows7-x64
10905d572f23...50.exe
windows10-2004-x64
10CVE-2018-1...oC.swf
windows7-x64
3CVE-2018-1...oC.swf
windows10-2004-x64
3Resubmissions
01/04/2025, 21:24
250401-z8184awycs 10Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 23:08
Static task
static1
Behavioral task
behavioral1
Sample
241105-dtxrgatbpg_pw_infected.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
241105-dtxrgatbpg_pw_infected.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
d91912b4b945e88e881e54573390e6723cfc41916b6546453b59e60f9beee337.rar
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
d91912b4b945e88e881e54573390e6723cfc41916b6546453b59e60f9beee337.rar
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
08751be484e1572995ebb085df1c2c6372084d63a64dce7fab28130d79a6ea2d.dll
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
08751be484e1572995ebb085df1c2c6372084d63a64dce7fab28130d79a6ea2d.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
0a9f79abd48b95544d7e2b6658637d1eb23067a94e10bf06d05c9ecc73cf4b51.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
0di3x.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
0di3x.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
201106-9sxjh7tvxj_pw_infected.zip
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
201106-9sxjh7tvxj_pw_infected.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
2019-09-02_22-41-10.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
2019-09-02_22-41-10.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
2c01b007729230c415420ad641ad92eb.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
2c01b007729230c415420ad641ad92eb.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
31.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
31.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
3DMark 11 Advanced Edition.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
3DMark 11 Advanced Edition.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
42f972925508a82236e8533567487761.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
42f972925508a82236e8533567487761.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
6306868794.bin.zip
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
6306868794.bin.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
69c56d12ed7024696936fb69b4c6bee58174a275cb53fa966646a0b092d9626b.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
CVE-2018-15982_PoC.swf
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
CVE-2018-15982_PoC.swf
Resource
win10v2004-20250217-en
General
-
Target
CVE-2018-15982_PoC.swf
-
Size
12KB
-
MD5
82fe94beb621a4368e76aa4a51998c00
-
SHA1
b7c79b8f05c3d998e21d01b07b9ba157160581a9
-
SHA256
c61dd1b37cbf2d72e3670e3c8dff28959683e6d85b8507cda25efe1dffc04bdb
-
SHA512
055677c2194ff132dc3c50ef900a36a0e4b8e5b85d176047fdefdec049aff4d5e2db1ccffefaf65575b4ca41e81fd24beb3c7cfd2fce6275642638d0cf624d27
-
SSDEEP
192:gR6qPBBRRcrxFx/pHPn9moz7p/+tqHM41rftZDBLj9b5d/:gwqDcLx/pH/IoBiqH/BfbDBLj9b5h
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 007932c4da87db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01C27361-F3CE-11EF-A528-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "446687026" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2536 2484 cmd.exe 31 PID 2484 wrote to memory of 2536 2484 cmd.exe 31 PID 2484 wrote to memory of 2536 2484 cmd.exe 31 PID 2536 wrote to memory of 2772 2536 rundll32.exe 32 PID 2536 wrote to memory of 2772 2536 rundll32.exe 32 PID 2536 wrote to memory of 2772 2536 rundll32.exe 32 PID 2772 wrote to memory of 2648 2772 iexplore.exe 33 PID 2772 wrote to memory of 2648 2772 iexplore.exe 33 PID 2772 wrote to memory of 2648 2772 iexplore.exe 33 PID 2772 wrote to memory of 2648 2772 iexplore.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CVE-2018-15982_PoC.swf1⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CVE-2018-15982_PoC.swf2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\CVE-2018-15982_PoC.swf3⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee80f30e839ce5cfaa39d06a8b450455
SHA161336a0ab165050d99ce9d10fa45290e2a8f98da
SHA25613e93aac583de6820787596d6a69a6684f4b0cce31c916ed9b517f5b5d8411a9
SHA512dba60fe1c10e706f77484b70d1560ed43f52d030ed83dba067dd0d015210b7e593262cc6e0594de876c33e8fce126722105e62e673c7ee001e62f16107ac870e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a034b1f2f747c1d9a4146b82d7d35fd
SHA10a253f122c132f48cae026806700668d2a18ac16
SHA25644e725b9cbae989a1941a1ccf74cbad6a50e5e1ee132cf19794075050b7c1f63
SHA5121112998c94364ea480a83a973c41b15918f4c2d50c5bdb56dff04c0362c16a8bc73762e3c69571e513eb28347324db204f5b30d86c32340344637671ed269c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5520f44cc4b5a97edb45fa85d52bebc62
SHA139b4ec2b9ce0049adda20221d7423dee4037affb
SHA256ad28cde491feed74d3a164b48afd5249ced0c67bd361e62f629efc63ff51b2f5
SHA512801febfd432f2c34788bc0d1821515cf1af7ee80848e6cfe555b2e4f03b1cec58c253a971a90868fd26be0918740a9dfecb471b523f8a2d93e2582abac9ec821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5725bd998f25b8adeb9953e305091eb06
SHA133418e56a61a2d156caef2a70f738275d0e8a96c
SHA2560f1a3010a2c073e8860e56adf92b4a78240b5d6c41c6bcc273aff706b9132039
SHA5122dedaf1f023ff7984d067c007329be4b5e45b7a7e5e6d0a59496d655da23f2eabf0a09243783c7601ef7087a025a2ae9fd4b9509cfc221b053130ed9fc4a22ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a9a2d857741add45706382d415926d1
SHA18922079dff18a1f1392f7073e206c94c5359b0af
SHA256956994cd97d7d38b65f588f845842039005922b3ac5b23561a0780b2a3f8c927
SHA5125107537022d6a054fff1bb590a8477810a1d4d84e42eb1fef8607610584a4066d2b19569b61a87c3f604588af0a4ec4656b4a4a743249286427c1d008b007ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c032477800f31052d9222a2995edb9b
SHA1ff92decffc5c5d0598691650404482094f9cb217
SHA256dccd2eb671ad00d8c7ed5b156131cefd330cc67ce4d5a3eceb9635860e9f64d3
SHA512dc43ba14668af2b6305e9e14aeb9284f171da1ab33e5902f395200bf2a3e13126f4f19c158822fb3a448252689956768c09b95c2ee42c42d391b581c94874fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dbcf6586a07b911ed7281aaea4715f7
SHA14e3b044f3a16b2ff15959f6da3988926c3e7748e
SHA256c9a88e0f7848507d53ee8aaab1fe52ff5bfae2ed73a3e2fd914c1acbc79589be
SHA512c0c1fe2d9266fba3cf7077430e8329bad45c52a5c4ab09239647c30cce2499a31ea5db515d9c740792d156913aed6f7f9f07b24b81f62384692887c3ca151e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5524502478f15ba9e7ab6443d93087b3a
SHA14f7ecf37cce0dce538b624a6f7d4698bb996d045
SHA256bf7e41e6fce57974c3dcd95b2d8ede985a64512d497f87236cfe92b416b428d6
SHA5125591b59673d4d18c0fca4e1d7c6475922fc57bb35743ad5700dde35052c19fa5d79714d4d920419f7b3863ed5fc330fcc8136a68661815e5d1769c8e844e624c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc