Overview
overview
10Static
static
3517b4e9dea...21.dat
windows7-x64
3517b4e9dea...21.dat
windows10-2004-x64
36a7718c005...82.bin
windows7-x64
36a7718c005...82.bin
windows10-2004-x64
36b5fcc0618...f1.txt
windows7-x64
16b5fcc0618...f1.txt
windows10-2004-x64
170949548f4...7e.txt
windows7-x64
170949548f4...7e.txt
windows10-2004-x64
1Polysy_Launcher.exe
windows10-2004-x64
10a48116275b...82.dat
windows7-x64
3a48116275b...82.dat
windows10-2004-x64
3iviewers.dll
windows7-x64
8iviewers.dll
windows10-2004-x64
10Resubmissions
07/03/2025, 03:43
250307-ead1pas1d1 10Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
517b4e9dea5396ee6996f1ae35291121.dat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
517b4e9dea5396ee6996f1ae35291121.dat
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
6a7718c005eed33ce409b03914a5b782.bin
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
6a7718c005eed33ce409b03914a5b782.bin
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
6b5fcc06180fde176b0cbef028282df1.txt
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
6b5fcc06180fde176b0cbef028282df1.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
70949548f432b49d62b8b4a1cddbc07e.txt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
70949548f432b49d62b8b4a1cddbc07e.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Polysy_Launcher.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral10
Sample
a48116275bbf2d3781a72732edfad182.dat
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
a48116275bbf2d3781a72732edfad182.dat
Resource
win10v2004-20250217-en
Behavioral task
behavioral12
Sample
iviewers.dll
Resource
win7-20240903-en
General
-
Target
a48116275bbf2d3781a72732edfad182.dat
-
Size
20.6MB
-
MD5
3e2bec14e1670971de9139a3d1871a35
-
SHA1
bb7feebb33bc2c69dd6910233c8210da996adab2
-
SHA256
c6adbc93211f13438fbeaae5cee03d8cb79b2167ac99719f9f44364f7877ed57
-
SHA512
a6f40572a48f3c6bc854c017bc7c478a7502ebfbf812e7244a23f2835a1ba2ed39a70ad175aa00cb802be4288f0c5bb9ecfc485c6fa7ca2708e83393da648089
-
SSDEEP
393216:P5IYftFepPCb1I7ZxUqPY0XYVDE2ccv/8iOoSW0HPneXFYij4XTPhxlmBYzi:P3regbm7ZFbao2cE/8SSW0veVYij4NxA
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1652 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1652 AcroRd32.exe 1652 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2260 2672 cmd.exe 31 PID 2672 wrote to memory of 2260 2672 cmd.exe 31 PID 2672 wrote to memory of 2260 2672 cmd.exe 31 PID 2260 wrote to memory of 1652 2260 rundll32.exe 32 PID 2260 wrote to memory of 1652 2260 rundll32.exe 32 PID 2260 wrote to memory of 1652 2260 rundll32.exe 32 PID 2260 wrote to memory of 1652 2260 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a48116275bbf2d3781a72732edfad182.dat1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\a48116275bbf2d3781a72732edfad182.dat2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a48116275bbf2d3781a72732edfad182.dat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52126ff73d26d5f68ef42e9fdb49bffcc
SHA1f55b067144762e420a92216c5565c6d94e05ebc4
SHA256e1e7cbe2ea943d297e9aecff81351f1b461716dc530e03261d0a05c96c532499
SHA5128b7e8657513d05fe5100e96c89bee58c81f6fa8ea72339d6771364b05e9871b039886a44a121b0054a213203816ab001ea8010202b7f22a7a651529cf6a69c1f