Overview
overview
10Static
static
7quarantine...XS.exe
windows7-x64
10quarantine...XS.exe
windows10-2004-x64
10quarantine...q7.exe
windows7-x64
5quarantine...q7.exe
windows10-2004-x64
5quarantine...yQ.exe
windows7-x64
7quarantine...yQ.exe
windows10-2004-x64
7quarantine...Nv.exe
windows7-x64
10quarantine...Nv.exe
windows10-2004-x64
10quarantine...TI.exe
windows7-x64
10quarantine...TI.exe
windows10-2004-x64
10quarantine...08.exe
windows7-x64
3quarantine...08.exe
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/02/2025, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
quarantine/27JinXS.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
quarantine/27JinXS.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/DVaKyq7.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
quarantine/DVaKyq7.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/FydOzyQ.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
quarantine/FydOzyQ.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
quarantine/mAtJWNv.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
quarantine/mAtJWNv.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/systemPTI.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
quarantine/systemPTI.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/uW8i508.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
quarantine/uW8i508.exe
Resource
win10v2004-20250217-en
General
-
Target
quarantine/FydOzyQ.exe
-
Size
532KB
-
MD5
231c20b0fbf247fb166c6c0ef7bb268d
-
SHA1
a7d5d46ece3fe59238b9df17d230c2e0354f9773
-
SHA256
3743b3270450dad9fbf2b4a16fdd7fe4a3d1d171720ea738401e467205041f80
-
SHA512
9382a6359d777ff8c0877a47204acb149f96f9fe40f0514ad1ea98374a1a9173f5b2b2918db3eba095f59548cec3fa704c06c40f246ae6dd3c4e8d20d27523d1
-
SSDEEP
12288:DL2of9uNKPZnu3eqJS+fg4QqHH9INsFF4R0UyBSKW0lK/MNWqdgJuYuPE9o5:HkM+fjQid93PblKUNWt4YC
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral5/memory/808-1-0x00000000011A0000-0x000000000122E000-memory.dmp net_reactor -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 808 set thread context of 1332 808 FydOzyQ.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2052 808 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FydOzyQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FydOzyQ.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1332 FydOzyQ.exe 1332 FydOzyQ.exe 1332 FydOzyQ.exe 1332 FydOzyQ.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 808 wrote to memory of 1332 808 FydOzyQ.exe 30 PID 808 wrote to memory of 1332 808 FydOzyQ.exe 30 PID 808 wrote to memory of 1332 808 FydOzyQ.exe 30 PID 808 wrote to memory of 1332 808 FydOzyQ.exe 30 PID 808 wrote to memory of 1332 808 FydOzyQ.exe 30 PID 808 wrote to memory of 1332 808 FydOzyQ.exe 30 PID 808 wrote to memory of 1332 808 FydOzyQ.exe 30 PID 808 wrote to memory of 1332 808 FydOzyQ.exe 30 PID 808 wrote to memory of 1332 808 FydOzyQ.exe 30 PID 808 wrote to memory of 1332 808 FydOzyQ.exe 30 PID 808 wrote to memory of 2052 808 FydOzyQ.exe 31 PID 808 wrote to memory of 2052 808 FydOzyQ.exe 31 PID 808 wrote to memory of 2052 808 FydOzyQ.exe 31 PID 808 wrote to memory of 2052 808 FydOzyQ.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\quarantine\FydOzyQ.exe"C:\Users\Admin\AppData\Local\Temp\quarantine\FydOzyQ.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\quarantine\FydOzyQ.exe"C:\Users\Admin\AppData\Local\Temp\quarantine\FydOzyQ.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 5002⤵
- Program crash
PID:2052
-