Overview
overview
10Static
static
3517b4e9dea...21.dat
windows7-x64
3517b4e9dea...21.dat
windows10-2004-x64
36a7718c005...82.bin
windows7-x64
36a7718c005...82.bin
windows10-2004-x64
36b5fcc0618...f1.txt
windows7-x64
16b5fcc0618...f1.txt
windows10-2004-x64
170949548f4...7e.txt
windows7-x64
170949548f4...7e.txt
windows10-2004-x64
1Polysy_Launcher.exe
windows10-2004-x64
10a48116275b...82.dat
windows7-x64
3a48116275b...82.dat
windows10-2004-x64
3iviewers.dll
windows7-x64
8iviewers.dll
windows10-2004-x64
10Resubmissions
07/03/2025, 03:43
250307-ead1pas1d1 10Analysis
-
max time kernel
0s -
max time network
5s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
517b4e9dea5396ee6996f1ae35291121.dat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
517b4e9dea5396ee6996f1ae35291121.dat
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
6a7718c005eed33ce409b03914a5b782.bin
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
6a7718c005eed33ce409b03914a5b782.bin
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
6b5fcc06180fde176b0cbef028282df1.txt
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
6b5fcc06180fde176b0cbef028282df1.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
70949548f432b49d62b8b4a1cddbc07e.txt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
70949548f432b49d62b8b4a1cddbc07e.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Polysy_Launcher.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral10
Sample
a48116275bbf2d3781a72732edfad182.dat
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
a48116275bbf2d3781a72732edfad182.dat
Resource
win10v2004-20250217-en
Behavioral task
behavioral12
Sample
iviewers.dll
Resource
win7-20240903-en
General
-
Target
517b4e9dea5396ee6996f1ae35291121.dat
-
Size
23.8MB
-
MD5
7ad8c9f2be167c90bae1ebeec2787706
-
SHA1
9fd65dffa03fc0d705bd20f2ab45695be426e485
-
SHA256
adcf7c0e2c61eaa09ac57324afa4534f27f9a756edba38ec99ef17e08dd14415
-
SHA512
d080ca7ae81a6742844cefbac6088fa6e758fdb0f078795d0c1f81c4222d44cd1801bea7bdde446944f7ea1569d1243ca191a5b70fab3ea3a2b6d00bafa7f05c
-
SSDEEP
393216:jli2ZBsnG2jK5wwi4OAVbqCrEhoIBaNbNDkIrsmrgOteX8aP+UDpYVv8t55a:hsndjawwi4OAoCaPaNDsNOosa2k+VvWK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3068 2112 cmd.exe 32 PID 2112 wrote to memory of 3068 2112 cmd.exe 32 PID 2112 wrote to memory of 3068 2112 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\517b4e9dea5396ee6996f1ae35291121.dat1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\517b4e9dea5396ee6996f1ae35291121.dat2⤵
- Modifies registry class
PID:3068
-