Overview
overview
10Static
static
10fe25de503f...5a.exe
windows7-x64
10fe25de503f...5a.exe
windows10-2004-x64
10fe282eaa90...45.exe
windows7-x64
10fe282eaa90...45.exe
windows10-2004-x64
10fe402f76d3...4d.exe
windows7-x64
10fe402f76d3...4d.exe
windows10-2004-x64
10fe55574c53...c0.exe
windows7-x64
1fe55574c53...c0.exe
windows10-2004-x64
5fe8a65a43d...3f.exe
windows7-x64
7fe8a65a43d...3f.exe
windows10-2004-x64
7fe99ddfdfc...6c.exe
windows7-x64
10fe99ddfdfc...6c.exe
windows10-2004-x64
10feb2c82a66...50.exe
windows7-x64
10feb2c82a66...50.exe
windows10-2004-x64
10fef2b831e5...91.exe
windows7-x64
8fef2b831e5...91.exe
windows10-2004-x64
8ff03c0c01a...cd.exe
windows7-x64
7ff03c0c01a...cd.exe
windows10-2004-x64
10ff1699c2d9...5a.exe
windows7-x64
10ff1699c2d9...5a.exe
windows10-2004-x64
10ff573ccb26...dd.exe
windows7-x64
10ff573ccb26...dd.exe
windows10-2004-x64
10ff5eef1816...3f.exe
windows7-x64
10ff5eef1816...3f.exe
windows10-2004-x64
10ff9b69031d...c2.exe
windows7-x64
10ff9b69031d...c2.exe
windows10-2004-x64
10ffc0421dee...0b.exe
windows7-x64
10ffc0421dee...0b.exe
windows10-2004-x64
7ffc45f2c58...73.exe
windows7-x64
10ffc45f2c58...73.exe
windows10-2004-x64
10fffa7ee6ec...91.exe
windows7-x64
10fffa7ee6ec...91.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:18
Behavioral task
behavioral1
Sample
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
fe25de503f5fa57842d11d2180a935855b8f89b23fd6fa95ff10272cee5f305a.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
fe282eaa9036b889aafc6db602127b45.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
fe282eaa9036b889aafc6db602127b45.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
fe402f76d319a9f80cd522e793223efbc3f914bfe149da1801c999b8539c964d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
fe55574c53882722b864ad5f07d521c0.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
fe55574c53882722b864ad5f07d521c0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
fe8a65a43dcdd12c0341ab7e5cc56c3f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
fe99ddfdfc78f8223ddd4511fafbccd50e22d089c428f9c6cea01d89b2142c6c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
feb2c82a6695709d9304734b55a6a350.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
feb2c82a6695709d9304734b55a6a350.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
ff03c0c01a5acef84aa5acdf32b445cd.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
ff03c0c01a5acef84aa5acdf32b445cd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
ff1699c2d9f4f22e51e270417a93a15a.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ff1699c2d9f4f22e51e270417a93a15a.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
ff573ccb268f734e737c764bc60f0ddd.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ff573ccb268f734e737c764bc60f0ddd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
ff5eef1816b5037715c6da38464a8a3f.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
ff5eef1816b5037715c6da38464a8a3f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
ff9b69031d761a8641f29c72ab6db843864620d9db1b867995e370840a891cc2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
ffc0421deeff7949183a7fbc2e55850b.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
ffc0421deeff7949183a7fbc2e55850b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
ffc45f2c5865480a76df2d8f64009673.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ffc45f2c5865480a76df2d8f64009673.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
fffa7ee6ec076412930605bd55bbc491.exe
Resource
win7-20240903-en
General
-
Target
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe
-
Size
3.2MB
-
MD5
7494010a358747ff81d28f600257398c
-
SHA1
2e23901e568bc0c51f9c8da9a193c52c0b9b6be8
-
SHA256
fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591
-
SHA512
be92074b60041dd130f13f548cf5d004605efd9aae0a4f362b5c40060b740ff97b5f531d0648e73e30a63cc611ff007d6a091fed301092485d886ad67eaddcfb
-
SSDEEP
98304:nRS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/d:nkj8NBFwxpNOuk2I
Malware Config
Signatures
-
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe -
Deletes itself 1 IoCs
pid Process 5096 9pjP1KbFIVkB1g.exe -
Executes dropped EXE 1 IoCs
pid Process 5096 9pjP1KbFIVkB1g.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 864 sc.exe 5700 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 684 fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe 5096 9pjP1KbFIVkB1g.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 684 fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe Token: SeDebugPrivilege 5096 9pjP1KbFIVkB1g.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 684 wrote to memory of 5096 684 fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe 95 PID 684 wrote to memory of 5096 684 fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe 95 PID 5096 wrote to memory of 1536 5096 9pjP1KbFIVkB1g.exe 97 PID 5096 wrote to memory of 1536 5096 9pjP1KbFIVkB1g.exe 97 PID 1536 wrote to memory of 864 1536 cmd.exe 99 PID 1536 wrote to memory of 864 1536 cmd.exe 99 PID 1536 wrote to memory of 5700 1536 cmd.exe 100 PID 1536 wrote to memory of 5700 1536 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe"C:\Users\Admin\AppData\Local\Temp\fef2b831e5d7a921a1fce11bc1827b87250bbca7552946a14444c35dbc4e1591.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\9pjP1KbFIVkB1g.exe"C:\Users\Admin\AppData\Local\Temp\9pjP1KbFIVkB1g.exe" QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXGZlZjJiODMxZTVkN2E5MjFhMWZjZTExYmMxODI3Yjg3MjUwYmJjYTc1NTI5NDZhMTQ0NDRjMzVkYmM0ZTE1OTEuZXhl2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C sc stop "SysMain" & sc config "SysMain" start=disabled3⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\system32\sc.exesc stop "SysMain"4⤵
- Launches sc.exe
PID:864
-
-
C:\Windows\system32\sc.exesc config "SysMain" start=disabled4⤵
- Launches sc.exe
PID:5700
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD526fd464bc5065fd87456f1d9a99dc928
SHA1d35248d69e5986eac8e49832c3ffe26d128e9c2c
SHA256e879bc7bd68844950fa61cb49592bb8a01e1b997c2cd4caaa8f9b517b00e3f2f
SHA5128fe832bdc220abb1856ee97eb1ddce8a86292127d9040f13cad23edbc078449a8a0a746cff9ab0740acdea7cc2cb8c6f2206ca2940cd8f4d977efefec9c16ca1