Overview
overview
10Static
static
3quarantine...zX.exe
windows7-x64
10quarantine...zX.exe
windows10-2004-x64
10quarantine...LN.exe
windows7-x64
1quarantine...LN.exe
windows10-2004-x64
10quarantine...xj.exe
windows7-x64
10quarantine...xj.exe
windows10-2004-x64
10quarantine...uj.exe
windows7-x64
3quarantine...uj.exe
windows10-2004-x64
3quarantine...9F.exe
windows7-x64
8quarantine...9F.exe
windows10-2004-x64
8quarantine...LB.exe
windows7-x64
10quarantine...LB.exe
windows10-2004-x64
10quarantine...ty.exe
windows7-x64
10quarantine...ty.exe
windows10-2004-x64
10quarantine...Qw.exe
windows7-x64
3quarantine...Qw.exe
windows10-2004-x64
7quarantine...ff.exe
windows7-x64
10quarantine...ff.exe
windows10-2004-x64
10quarantine...nc.exe
windows7-x64
9quarantine...nc.exe
windows10-2004-x64
9quarantine...Ws.exe
windows7-x64
7quarantine...Ws.exe
windows10-2004-x64
7Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
quarantine/7UlMpzX.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
quarantine/7UlMpzX.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/BXxKvLN.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
quarantine/BXxKvLN.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/JCFx2xj.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
quarantine/JCFx2xj.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
quarantine/UBiTCuj.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
quarantine/UBiTCuj.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/bPDDW9F.exe
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
quarantine/bPDDW9F.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/d0HNrLB.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
quarantine/d0HNrLB.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
quarantine/infinity.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
quarantine/infinity.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
quarantine/khykuQw.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
quarantine/khykuQw.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
quarantine/soudneff.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
quarantine/soudneff.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
quarantine/v6Oqdnc.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
quarantine/v6Oqdnc.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
quarantine/zY9sqWs.exe
Resource
win7-20240903-en
General
-
Target
quarantine/khykuQw.exe
-
Size
7.6MB
-
MD5
accdbd5044408c82c19c977829713e4f
-
SHA1
070a001ac12139cc1238017d795a2b43ac52770d
-
SHA256
dfa2ab0714c9f234b63fd1295ce468bd247465701a90b8a9ab9eb3d6d032d258
-
SHA512
34fe4ec1307e7d45080b6e0fb093eb8f1d43fb71a3e3411e32a5798f9cacc69ea1b82d56fcf9e503dd22c51e9af92fde7c149ac5882af4daab5c3cb906cdeb85
-
SSDEEP
98304:fYRhnYdlvIib45D+ZicbrZRutIvD0wi9Q1Tjr+RTO7EC5pqQ5eoQQMgX3Q6jEd8O:5H8QK2GcJL
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2196 2060 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language khykuQw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2196 2060 khykuQw.exe 31 PID 2060 wrote to memory of 2196 2060 khykuQw.exe 31 PID 2060 wrote to memory of 2196 2060 khykuQw.exe 31 PID 2060 wrote to memory of 2196 2060 khykuQw.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\quarantine\khykuQw.exe"C:\Users\Admin\AppData\Local\Temp\quarantine\khykuQw.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 3282⤵
- Program crash
PID:2196
-