Overview
overview
10Static
static
3517b4e9dea...21.dat
windows7-x64
3517b4e9dea...21.dat
windows10-2004-x64
36a7718c005...82.bin
windows7-x64
36a7718c005...82.bin
windows10-2004-x64
36b5fcc0618...f1.txt
windows7-x64
16b5fcc0618...f1.txt
windows10-2004-x64
170949548f4...7e.txt
windows7-x64
170949548f4...7e.txt
windows10-2004-x64
1Polysy_Launcher.exe
windows10-2004-x64
10a48116275b...82.dat
windows7-x64
3a48116275b...82.dat
windows10-2004-x64
3iviewers.dll
windows7-x64
8iviewers.dll
windows10-2004-x64
10Resubmissions
07/03/2025, 03:43
250307-ead1pas1d1 10Analysis
-
max time kernel
102s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
517b4e9dea5396ee6996f1ae35291121.dat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
517b4e9dea5396ee6996f1ae35291121.dat
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
6a7718c005eed33ce409b03914a5b782.bin
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
6a7718c005eed33ce409b03914a5b782.bin
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
6b5fcc06180fde176b0cbef028282df1.txt
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
6b5fcc06180fde176b0cbef028282df1.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
70949548f432b49d62b8b4a1cddbc07e.txt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
70949548f432b49d62b8b4a1cddbc07e.txt
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Polysy_Launcher.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral10
Sample
a48116275bbf2d3781a72732edfad182.dat
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
a48116275bbf2d3781a72732edfad182.dat
Resource
win10v2004-20250217-en
Behavioral task
behavioral12
Sample
iviewers.dll
Resource
win7-20240903-en
General
-
Target
6a7718c005eed33ce409b03914a5b782.bin
-
Size
20.4MB
-
MD5
943e1d89214f1bacbb44013b0868074c
-
SHA1
0e97341c28725979410c0ffd9cde9119688d18cb
-
SHA256
9c5be8ef39305a0f8157ef34d38bd4d8e166930d4f698aab93104048700deb07
-
SHA512
c406989fc578d5d8c5212b7f17651371294a881283b1b2c2735e21bee24c921429c728978b0742597a7367d8ee97738f012ead663646a043cab7c2bea719a6ac
-
SSDEEP
393216:UWrmKiWpcSHbUkRVjW/6zdY4KITmDiBRsKR8trA3/m+Xn1Ul5s0v:/SKi4oHiRGAmD08pg/my1Ul5sa
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2848 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2848 AcroRd32.exe 2848 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2824 2528 cmd.exe 30 PID 2528 wrote to memory of 2824 2528 cmd.exe 30 PID 2528 wrote to memory of 2824 2528 cmd.exe 30 PID 2824 wrote to memory of 2848 2824 rundll32.exe 31 PID 2824 wrote to memory of 2848 2824 rundll32.exe 31 PID 2824 wrote to memory of 2848 2824 rundll32.exe 31 PID 2824 wrote to memory of 2848 2824 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\6a7718c005eed33ce409b03914a5b782.bin1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\6a7718c005eed33ce409b03914a5b782.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\6a7718c005eed33ce409b03914a5b782.bin"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5874b0d0bec2ebbcdd956cf972b1ec0ea
SHA180f5f094dd53fa14c264fed303f93d404136a20b
SHA256568fb1256890e829a4bd3e295d153e2768bc44c03bbb0e93b1a756858e50d935
SHA5128b99187e8346424e18af7da06d5197d9f39d892d00c2fb0cdf72c1d9e0ba8e7eb6a9115dca15ec3c79e2f42af4cc211afd4fd53bcbdd794001a5ac7d45f8bff5