Overview
overview
10Static
static
10bfccbd145f...11.exe
windows7-x64
10bfccbd145f...11.exe
windows10-2004-x64
10bff2e9336d...1b.exe
windows7-x64
10bff2e9336d...1b.exe
windows10-2004-x64
10c015c769dc...7b.exe
windows7-x64
10c015c769dc...7b.exe
windows10-2004-x64
10c02e930808...0e.exe
windows7-x64
10c02e930808...0e.exe
windows10-2004-x64
10c050e8dee0...78.exe
windows7-x64
7c050e8dee0...78.exe
windows10-2004-x64
7c06923d356...32.exe
windows7-x64
10c06923d356...32.exe
windows10-2004-x64
10c08fd2b60b...1e.exe
windows7-x64
10c08fd2b60b...1e.exe
windows10-2004-x64
10c094e156e6...d4.exe
windows7-x64
10c094e156e6...d4.exe
windows10-2004-x64
10c0b8bc022f...59.exe
windows7-x64
10c0b8bc022f...59.exe
windows10-2004-x64
10c0c57bb195...b1.exe
windows7-x64
10c0c57bb195...b1.exe
windows10-2004-x64
10c119d7a5cb...95.exe
windows7-x64
10c119d7a5cb...95.exe
windows10-2004-x64
10c13d1bcad6...37.exe
windows7-x64
7c13d1bcad6...37.exe
windows10-2004-x64
7c15177ea36...ea.exe
windows7-x64
10c15177ea36...ea.exe
windows10-2004-x64
7c156b157a6...f2.exe
windows7-x64
10c156b157a6...f2.exe
windows10-2004-x64
10c16c4b10a7...5e.exe
windows7-x64
10c16c4b10a7...5e.exe
windows10-2004-x64
10c16e3df003...bf.exe
windows7-x64
9c16e3df003...bf.exe
windows10-2004-x64
9Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
bfccbd145f18146e443f2ce65a8c8c11.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bfccbd145f18146e443f2ce65a8c8c11.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
bff2e9336d217437b4cca77856867f1b.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
bff2e9336d217437b4cca77856867f1b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
c015c769dc2854aed713103935c1cbcd71c6677d940e43a91c0c7f7772b9b77b.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
c015c769dc2854aed713103935c1cbcd71c6677d940e43a91c0c7f7772b9b77b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
c02e930808a65ef9fba82fc9cf46fcb8f2c064b70c35504c1b401a3b2c825b0e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
c02e930808a65ef9fba82fc9cf46fcb8f2c064b70c35504c1b401a3b2c825b0e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
c050e8dee0ecfccab6e06491c39fe078.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
c050e8dee0ecfccab6e06491c39fe078.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
c06923d356f2cec7eb28dc4224f24f43daee5fa1c13659c1d814849d01da6f32.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
c06923d356f2cec7eb28dc4224f24f43daee5fa1c13659c1d814849d01da6f32.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
c08fd2b60b6a2e2facc33281aff9f6f0eb6aff73c828e233da1f65bd92f24e1e.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
c08fd2b60b6a2e2facc33281aff9f6f0eb6aff73c828e233da1f65bd92f24e1e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
c094e156e6d4756e275d2c8a03c7b955d4c45dc77a3d35f9b8bbe54eb11023d4.exe
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
c094e156e6d4756e275d2c8a03c7b955d4c45dc77a3d35f9b8bbe54eb11023d4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
c0b8bc022f22daca9f588a7b6ae4ca9a19c813b07ea437b6d3a9d7549b6b8659.exe
Resource
win7-20250207-en
Behavioral task
behavioral18
Sample
c0b8bc022f22daca9f588a7b6ae4ca9a19c813b07ea437b6d3a9d7549b6b8659.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
c0c57bb1953e9f0faeaa8c98bf4b7f8f0a46376a179af70eb0574bbb33c6c7b1.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
c0c57bb1953e9f0faeaa8c98bf4b7f8f0a46376a179af70eb0574bbb33c6c7b1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
c119d7a5cbe03522b96e6fe8dd21f16e239d5ad617df9752ac0ca4827951e195.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
c119d7a5cbe03522b96e6fe8dd21f16e239d5ad617df9752ac0ca4827951e195.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
c13d1bcad6fcfcf44834495ffdc272af84ab028f7ef78cabbde472289c2c6237.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
c13d1bcad6fcfcf44834495ffdc272af84ab028f7ef78cabbde472289c2c6237.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
c15177ea36f2afdbf176de2a137587ea.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
c15177ea36f2afdbf176de2a137587ea.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
c156b157a6cb826977e0d4024ceb6580eaccc052cab1476023aabb9597b280f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
c156b157a6cb826977e0d4024ceb6580eaccc052cab1476023aabb9597b280f2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
c16c4b10a70fb5dd4c12a0d9ccc26a2330d75c5cb94684d4fc5e0ce499a1925e.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
c16c4b10a70fb5dd4c12a0d9ccc26a2330d75c5cb94684d4fc5e0ce499a1925e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
c16e3df00370b2202bf15f0dba272d66744d0643238fdb4b1c4d3e1afcd327bf.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
c16e3df00370b2202bf15f0dba272d66744d0643238fdb4b1c4d3e1afcd327bf.exe
Resource
win10v2004-20250314-en
General
-
Target
c050e8dee0ecfccab6e06491c39fe078.exe
-
Size
12KB
-
MD5
c050e8dee0ecfccab6e06491c39fe078
-
SHA1
39f9f5b7055a11e32f97be97764fcefdb0db7885
-
SHA256
a69b5776da05eb7c96ed317dfb00e2a677e79b74aaf7544bbe071a4654e97590
-
SHA512
b632a74947d7d3aa044ff5c4176b4e305293b7f0c8e369920f36c06deffd5ef9b5f209f948d639e73f2619e277a57bbb024af2d9cba6a72957f1ea8c327662d0
-
SSDEEP
384:LL7li/2z3q2DcEQvdfcJKLTp/NK9xa0y:fDMZQ9c0y
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2600 tmp344B.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 2600 tmp344B.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 2524 c050e8dee0ecfccab6e06491c39fe078.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp344B.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c050e8dee0ecfccab6e06491c39fe078.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2524 c050e8dee0ecfccab6e06491c39fe078.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2780 2524 c050e8dee0ecfccab6e06491c39fe078.exe 31 PID 2524 wrote to memory of 2780 2524 c050e8dee0ecfccab6e06491c39fe078.exe 31 PID 2524 wrote to memory of 2780 2524 c050e8dee0ecfccab6e06491c39fe078.exe 31 PID 2524 wrote to memory of 2780 2524 c050e8dee0ecfccab6e06491c39fe078.exe 31 PID 2780 wrote to memory of 2856 2780 vbc.exe 33 PID 2780 wrote to memory of 2856 2780 vbc.exe 33 PID 2780 wrote to memory of 2856 2780 vbc.exe 33 PID 2780 wrote to memory of 2856 2780 vbc.exe 33 PID 2524 wrote to memory of 2600 2524 c050e8dee0ecfccab6e06491c39fe078.exe 34 PID 2524 wrote to memory of 2600 2524 c050e8dee0ecfccab6e06491c39fe078.exe 34 PID 2524 wrote to memory of 2600 2524 c050e8dee0ecfccab6e06491c39fe078.exe 34 PID 2524 wrote to memory of 2600 2524 c050e8dee0ecfccab6e06491c39fe078.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c050e8dee0ecfccab6e06491c39fe078.exe"C:\Users\Admin\AppData\Local\Temp\c050e8dee0ecfccab6e06491c39fe078.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ll1fobz3\ll1fobz3.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3968.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc43AABC20C78247339315837ABF6F1EF.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp344B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp344B.tmp.exe" C:\Users\Admin\AppData\Local\Temp\c050e8dee0ecfccab6e06491c39fe078.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD58e662a4aec2fd8ed42979da1495548ee
SHA19829ab6af5e1a9f9e4e952a40f0c70e2b3942e03
SHA2569460b8c7e70df0f639872ffa4069862b48923375635ade977b15eecaabd5fd81
SHA512f5c74106b9a80a852907c563cc1bf60f8dad85aac1d94a30acdf498f834ef7c3c8fe98aa35dcfc7f5a23dbb78f874df1185dc3e74eef864dc0bffca90b97866f
-
Filesize
1KB
MD5e2ea65f4d6704c10dcac4a12402724ba
SHA1bc86897ab3d54a472cbd425f70335d1263b2afb2
SHA256aeee3f5629b28f848c2267d4e2742a18414788f973c3fbc64e3b0ee98ddcd538
SHA5129f125f6349446d66d35eb8417d634e8ae88d0070af9c8e2fbc3e1f786de4e6bc5f16f5220b74a2b019db1ef2ee4dd33d7382358069ee33f947f6f715bd7cbbaa
-
Filesize
2KB
MD57a2518c42db92b29251d4ae95f7be393
SHA13cc6950d268159c61b14e91f8f715755752740f8
SHA2563ce37a1c31547bbd5e357196e9a07482868a146049e43908a9f5846ca1a37e17
SHA512a46ec01019595223429a69eca2b164ec1ea2d90df535dc8476f712062ddce7ddc62ecd9ebbec47a57021eff238795ae67499725918755de4ddc1b8346523b18e
-
Filesize
273B
MD59217e56b1ff6847e6b389fd30c658709
SHA1813394714c058a3b4539b217aa5838244debe519
SHA256682377acd454927b97c652ceda915be04357acd85de9440ef3704408a516c404
SHA512880226410de8fc161f5de124a53c4976f3731bec78d890024855e99d243571ca2d98becae943f5479445829b0fb3b17bb5e75a877df5555abd865757d85068bf
-
Filesize
12KB
MD5c5a7dc179ad83062a27aeb1090686a22
SHA1844c391f8e0780e2d5b753816fddc36d3d5945b1
SHA2566ec259a5150a7c13d1f1f6cfa0ded62fea46c0676e6e303fbe9b396a801af55c
SHA512bdb5b167975752d18f0cbc4cc034455051667e8a3070cc3e6a5ddad376b55c88f7346a9d40f121fe03581f6085e00d65aefd940c8262e5abe2cb4434106bc473
-
Filesize
1KB
MD514576facbfef3c8d7f261c5a11de1b51
SHA1451670e7ee803924901e28c753b2b94eb9ab771e
SHA2562a66967db10b092def1f73ba84e4c3c0461c4e0ec66dbc9e14835ef33618b370
SHA512e1d764fae53837e655a1527268f38840a39c76349f4ea09d8cd3ca44460faae20baa7d1e413759dd70e3fa72184de202f4a5c1ecfa72f31f6bafd6540e2f32d5