Overview
overview
10Static
static
10477abe4b25...51.exe
windows7-x64
10477abe4b25...51.exe
windows10-2004-x64
1047c6de91e1...b0.exe
windows7-x64
1047c6de91e1...b0.exe
windows10-2004-x64
1047ce70cdef...aa.exe
windows7-x64
1047ce70cdef...aa.exe
windows10-2004-x64
74809a98c25...ee.exe
windows7-x64
14809a98c25...ee.exe
windows10-2004-x64
10480bfd19cc...7e.exe
windows7-x64
10480bfd19cc...7e.exe
windows10-2004-x64
104818942b62...ae.exe
windows7-x64
104818942b62...ae.exe
windows10-2004-x64
10485ef3e4d3...15.exe
windows7-x64
10485ef3e4d3...15.exe
windows10-2004-x64
10486a44dd40...61.exe
windows7-x64
10486a44dd40...61.exe
windows10-2004-x64
10487afaa242...b4.exe
windows7-x64
3487afaa242...b4.exe
windows10-2004-x64
3488aec85d4...b2.exe
windows7-x64
8488aec85d4...b2.exe
windows10-2004-x64
848dd84f7a2...da.exe
windows7-x64
1048dd84f7a2...da.exe
windows10-2004-x64
104931b13a12...db.exe
windows7-x64
104931b13a12...db.exe
windows10-2004-x64
104963d3411f...95.exe
windows7-x64
34963d3411f...95.exe
windows10-2004-x64
34981b96b4a...e4.exe
windows7-x64
34981b96b4a...e4.exe
windows10-2004-x64
34996155e60...cb.exe
windows7-x64
104996155e60...cb.exe
windows10-2004-x64
1049986bd925...30.exe
windows7-x64
1049986bd925...30.exe
windows10-2004-x64
10Analysis
-
max time kernel
7s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:10
Behavioral task
behavioral1
Sample
477abe4b25790663f42286884bad1f54fccac4fd3c881cf1c7d7ad8d7bab3351.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
477abe4b25790663f42286884bad1f54fccac4fd3c881cf1c7d7ad8d7bab3351.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
47c6de91e1706234f4587aa8f42a8c76d818b3055dc457b6dda51b803bf09ab0.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
47c6de91e1706234f4587aa8f42a8c76d818b3055dc457b6dda51b803bf09ab0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
47ce70cdeffbe184e4414b64b813fcaa.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
47ce70cdeffbe184e4414b64b813fcaa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
4809a98c25f0a7be709206691dd2a0ee.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
4809a98c25f0a7be709206691dd2a0ee.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
480bfd19cce007d5891ad838d903b17e.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
480bfd19cce007d5891ad838d903b17e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
4818942b6268d474373eadf8aa175f0de0315fc406eafa97d7fa7db7c154e9ae.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
4818942b6268d474373eadf8aa175f0de0315fc406eafa97d7fa7db7c154e9ae.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
485ef3e4d31b39e6107f797859f14415.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
485ef3e4d31b39e6107f797859f14415.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
486a44dd40852eb23aeca8e8951ffa61.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
486a44dd40852eb23aeca8e8951ffa61.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
487afaa2421384f1449a96637df558b4.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
487afaa2421384f1449a96637df558b4.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
48dd84f7a2cbfb0a068fa1a74c35fa4983f355dd026648bde3c594d0afe696da.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
48dd84f7a2cbfb0a068fa1a74c35fa4983f355dd026648bde3c594d0afe696da.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
4931b13a1265c5602753b3933aeb20740855f573997799ae8aed85ca66d193db.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
4931b13a1265c5602753b3933aeb20740855f573997799ae8aed85ca66d193db.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
4963d3411f742a92635dbd83146f3f5f7abed444f92750bcdd14072efd30e695.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
4963d3411f742a92635dbd83146f3f5f7abed444f92750bcdd14072efd30e695.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
4981b96b4a936aa6e960d3d9604a63e4.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
4981b96b4a936aa6e960d3d9604a63e4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
4996155e60aac91174cee14de1120fcb.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
4996155e60aac91174cee14de1120fcb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
49986bd925df8b3a09e58c4999927830.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
49986bd925df8b3a09e58c4999927830.exe
Resource
win10v2004-20250314-en
General
-
Target
487afaa2421384f1449a96637df558b4.exe
-
Size
15KB
-
MD5
487afaa2421384f1449a96637df558b4
-
SHA1
87f9edc71b13f5bb1b87e0369e531ee6d17aff4d
-
SHA256
b6fd976bea3755f5b73802548928b389789584076b9d5a3e5d42642792707cdd
-
SHA512
905765c455b15e2221e92cb42abb075aac1bb8add344f4e8a4d9334361239d741077918f9d04f21effbb3c72f19124521bc097170099d6a31b802c523b2b6985
-
SSDEEP
384:o7y8xJoeC71aRZtKBl9vOVUkgha4H94jWjel0:oek65URZWnvOVJ4H9XA0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 487afaa2421384f1449a96637df558b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2900 cmd.exe 3060 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3060 PING.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2924 2428 487afaa2421384f1449a96637df558b4.exe 31 PID 2428 wrote to memory of 2924 2428 487afaa2421384f1449a96637df558b4.exe 31 PID 2428 wrote to memory of 2924 2428 487afaa2421384f1449a96637df558b4.exe 31 PID 2428 wrote to memory of 2924 2428 487afaa2421384f1449a96637df558b4.exe 31 PID 2924 wrote to memory of 1260 2924 csc.exe 33 PID 2924 wrote to memory of 1260 2924 csc.exe 33 PID 2924 wrote to memory of 1260 2924 csc.exe 33 PID 2924 wrote to memory of 1260 2924 csc.exe 33 PID 2428 wrote to memory of 2900 2428 487afaa2421384f1449a96637df558b4.exe 34 PID 2428 wrote to memory of 2900 2428 487afaa2421384f1449a96637df558b4.exe 34 PID 2428 wrote to memory of 2900 2428 487afaa2421384f1449a96637df558b4.exe 34 PID 2428 wrote to memory of 2900 2428 487afaa2421384f1449a96637df558b4.exe 34 PID 2900 wrote to memory of 3060 2900 cmd.exe 36 PID 2900 wrote to memory of 3060 2900 cmd.exe 36 PID 2900 wrote to memory of 3060 2900 cmd.exe 36 PID 2900 wrote to memory of 3060 2900 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\487afaa2421384f1449a96637df558b4.exe"C:\Users\Admin\AppData\Local\Temp\487afaa2421384f1449a96637df558b4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vbmru0tn\vbmru0tn.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD2F8.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC806941BFE44343A49EB269F3C8DD6037.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:1260
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\487afaa2421384f1449a96637df558b4.exe" & move "갌갉갈감갍개갏갭갡갢갡갨갨.exe" "C:\Users\Admin\AppData\Local\Temp\487afaa2421384f1449a96637df558b4.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51bf24b67d7c87af946b00d41570ed062
SHA13ee3fe3f286c5c26a48d5ffce25a7d062ed53cae
SHA25670bcc1c1b767501b8cc52f48ccf4c98f1bbc20c2ae4604955580c1c2aa28a7bf
SHA5128001e85fa201520a462cc36e5cae168f240dbd9d95b5b6ba39af8dedc5660e0de74d5c1f41c2229f2044b8fecc9b0e2612eb8f73527cbb097892e10f4ed0814d
-
Filesize
15KB
MD55a70ad8b398b00600df7bea34fcf99a5
SHA1cac3025ef09753e14765950a32e27d465e87b9b5
SHA25648d14a03e22119ef315ec8cc0be65cb5a471a815a0743ba579c871388ddb0316
SHA5120e7fb8095acb232d20e3931e6a45ff60ee959b21b178fbf3247839e44b26cf3196ec6e0cd04578fd55a148a57eb0da2867ca0969aba59a5f67efe4d66513b2cd
-
Filesize
1KB
MD579dd75c66f0f37e60756d4056df72b00
SHA13afbb2a7abbf8d510e12925008eef39c2b9b2b76
SHA25654cc91a8c4dfc5c074d30c56ec0119314f2cfdee9061480ed3ba93a5f1c82a75
SHA512dc6fdba22c42075e1e58fc5b1b97722eb3dcfccaabb5b56a3905ac4c789da1023937b743892175776c10f5af51bc84e5b28199458d87982b5d5d2ddcc6566aec
-
Filesize
25KB
MD57eff2cca5c0e7e3c5c2604bee5103524
SHA1b1cf02f78e6d9f1c2009e6f89f8ae8530afe6e6a
SHA25618f427f589ece62f69a1d4f47bd902d8f4d322cd1766358768268e9b983a48c5
SHA5124676f3d5f628729e5d8ac3d19623d19b99b5bad2ff37fbecf2fbe0688cc59c0085788458edba29c2bef4896ae38b1c50a5d89fb3c0354adf654f90cf1154469c
-
Filesize
299B
MD5b7602bf29172e194d99cb34df938004c
SHA1383e578d93173c8088ec2d6c84bf06a9a05720a5
SHA256b2a1ff966547167e5b76740a2f28f5e7cd5bf7893ac68abb3354848ee57173bb
SHA512f45796fc7a5f86d60b99edbd0146b3c48ff202accc3053271e76e2799f71d1bc4674aacf24d463c43827c49a5b338c79c69a80eb22aa0d4fb786c46365c2f84d