Overview
overview
10Static
static
7quarantine...XS.exe
windows7-x64
10quarantine...XS.exe
windows10-2004-x64
10quarantine...q7.exe
windows7-x64
5quarantine...q7.exe
windows10-2004-x64
5quarantine...yQ.exe
windows7-x64
7quarantine...yQ.exe
windows10-2004-x64
7quarantine...Nv.exe
windows7-x64
10quarantine...Nv.exe
windows10-2004-x64
10quarantine...TI.exe
windows7-x64
10quarantine...TI.exe
windows10-2004-x64
10quarantine...08.exe
windows7-x64
3quarantine...08.exe
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/02/2025, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
quarantine/27JinXS.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
quarantine/27JinXS.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/DVaKyq7.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
quarantine/DVaKyq7.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/FydOzyQ.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
quarantine/FydOzyQ.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
quarantine/mAtJWNv.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
quarantine/mAtJWNv.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/systemPTI.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
quarantine/systemPTI.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/uW8i508.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
quarantine/uW8i508.exe
Resource
win10v2004-20250217-en
General
-
Target
quarantine/DVaKyq7.exe
-
Size
339KB
-
MD5
75728febe161947937f82f0f36ad99f8
-
SHA1
d2b5a4970b73e03bd877b075bac0cdb3bfc510cf
-
SHA256
0a88c347a294b22b6d6554b711db339bca86c568863dec7844a2badec6ef4282
-
SHA512
7cfdf76b959895ae44abe4171662d9c6c28dfd444030d570fea0fa4f624adf226e35d655dd89b159a1e0d08bcd97dfe899c3646d7682aacf5f2dabfbdf3d9a67
-
SSDEEP
6144:WHYaosINWXFGYJabd0UyB8kOKWAKo1Ze7OwEK/MNt8lEdgxbuZm/uPEMCfwoZH:WHH9INsFF4R0UyBSKW0lK/MNWqdgJuYP
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1684 set thread context of 3032 1684 DVaKyq7.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2964 1684 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DVaKyq7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DVaKyq7.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1684 wrote to memory of 3032 1684 DVaKyq7.exe 30 PID 1684 wrote to memory of 3032 1684 DVaKyq7.exe 30 PID 1684 wrote to memory of 3032 1684 DVaKyq7.exe 30 PID 1684 wrote to memory of 3032 1684 DVaKyq7.exe 30 PID 1684 wrote to memory of 3032 1684 DVaKyq7.exe 30 PID 1684 wrote to memory of 3032 1684 DVaKyq7.exe 30 PID 1684 wrote to memory of 3032 1684 DVaKyq7.exe 30 PID 1684 wrote to memory of 3032 1684 DVaKyq7.exe 30 PID 1684 wrote to memory of 3032 1684 DVaKyq7.exe 30 PID 1684 wrote to memory of 3032 1684 DVaKyq7.exe 30 PID 1684 wrote to memory of 2964 1684 DVaKyq7.exe 31 PID 1684 wrote to memory of 2964 1684 DVaKyq7.exe 31 PID 1684 wrote to memory of 2964 1684 DVaKyq7.exe 31 PID 1684 wrote to memory of 2964 1684 DVaKyq7.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\quarantine\DVaKyq7.exe"C:\Users\Admin\AppData\Local\Temp\quarantine\DVaKyq7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\quarantine\DVaKyq7.exe"C:\Users\Admin\AppData\Local\Temp\quarantine\DVaKyq7.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 5002⤵
- Program crash
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc