Overview
overview
10Static
static
10477abe4b25...51.exe
windows7-x64
10477abe4b25...51.exe
windows10-2004-x64
1047c6de91e1...b0.exe
windows7-x64
1047c6de91e1...b0.exe
windows10-2004-x64
1047ce70cdef...aa.exe
windows7-x64
1047ce70cdef...aa.exe
windows10-2004-x64
74809a98c25...ee.exe
windows7-x64
14809a98c25...ee.exe
windows10-2004-x64
10480bfd19cc...7e.exe
windows7-x64
10480bfd19cc...7e.exe
windows10-2004-x64
104818942b62...ae.exe
windows7-x64
104818942b62...ae.exe
windows10-2004-x64
10485ef3e4d3...15.exe
windows7-x64
10485ef3e4d3...15.exe
windows10-2004-x64
10486a44dd40...61.exe
windows7-x64
10486a44dd40...61.exe
windows10-2004-x64
10487afaa242...b4.exe
windows7-x64
3487afaa242...b4.exe
windows10-2004-x64
3488aec85d4...b2.exe
windows7-x64
8488aec85d4...b2.exe
windows10-2004-x64
848dd84f7a2...da.exe
windows7-x64
1048dd84f7a2...da.exe
windows10-2004-x64
104931b13a12...db.exe
windows7-x64
104931b13a12...db.exe
windows10-2004-x64
104963d3411f...95.exe
windows7-x64
34963d3411f...95.exe
windows10-2004-x64
34981b96b4a...e4.exe
windows7-x64
34981b96b4a...e4.exe
windows10-2004-x64
34996155e60...cb.exe
windows7-x64
104996155e60...cb.exe
windows10-2004-x64
1049986bd925...30.exe
windows7-x64
1049986bd925...30.exe
windows10-2004-x64
10Analysis
-
max time kernel
7s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:10
Behavioral task
behavioral1
Sample
477abe4b25790663f42286884bad1f54fccac4fd3c881cf1c7d7ad8d7bab3351.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
477abe4b25790663f42286884bad1f54fccac4fd3c881cf1c7d7ad8d7bab3351.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
47c6de91e1706234f4587aa8f42a8c76d818b3055dc457b6dda51b803bf09ab0.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
47c6de91e1706234f4587aa8f42a8c76d818b3055dc457b6dda51b803bf09ab0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
47ce70cdeffbe184e4414b64b813fcaa.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
47ce70cdeffbe184e4414b64b813fcaa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
4809a98c25f0a7be709206691dd2a0ee.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
4809a98c25f0a7be709206691dd2a0ee.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
480bfd19cce007d5891ad838d903b17e.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
480bfd19cce007d5891ad838d903b17e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
4818942b6268d474373eadf8aa175f0de0315fc406eafa97d7fa7db7c154e9ae.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
4818942b6268d474373eadf8aa175f0de0315fc406eafa97d7fa7db7c154e9ae.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
485ef3e4d31b39e6107f797859f14415.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
485ef3e4d31b39e6107f797859f14415.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
486a44dd40852eb23aeca8e8951ffa61.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
486a44dd40852eb23aeca8e8951ffa61.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
487afaa2421384f1449a96637df558b4.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
487afaa2421384f1449a96637df558b4.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
48dd84f7a2cbfb0a068fa1a74c35fa4983f355dd026648bde3c594d0afe696da.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
48dd84f7a2cbfb0a068fa1a74c35fa4983f355dd026648bde3c594d0afe696da.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
4931b13a1265c5602753b3933aeb20740855f573997799ae8aed85ca66d193db.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
4931b13a1265c5602753b3933aeb20740855f573997799ae8aed85ca66d193db.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
4963d3411f742a92635dbd83146f3f5f7abed444f92750bcdd14072efd30e695.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
4963d3411f742a92635dbd83146f3f5f7abed444f92750bcdd14072efd30e695.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
4981b96b4a936aa6e960d3d9604a63e4.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
4981b96b4a936aa6e960d3d9604a63e4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
4996155e60aac91174cee14de1120fcb.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
4996155e60aac91174cee14de1120fcb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
49986bd925df8b3a09e58c4999927830.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
49986bd925df8b3a09e58c4999927830.exe
Resource
win10v2004-20250314-en
General
-
Target
487afaa2421384f1449a96637df558b4.exe
-
Size
15KB
-
MD5
487afaa2421384f1449a96637df558b4
-
SHA1
87f9edc71b13f5bb1b87e0369e531ee6d17aff4d
-
SHA256
b6fd976bea3755f5b73802548928b389789584076b9d5a3e5d42642792707cdd
-
SHA512
905765c455b15e2221e92cb42abb075aac1bb8add344f4e8a4d9334361239d741077918f9d04f21effbb3c72f19124521bc097170099d6a31b802c523b2b6985
-
SSDEEP
384:o7y8xJoeC71aRZtKBl9vOVUkgha4H94jWjel0:oek65URZWnvOVJ4H9XA0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 487afaa2421384f1449a96637df558b4.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4900 PING.EXE 4836 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4900 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5684 wrote to memory of 2064 5684 487afaa2421384f1449a96637df558b4.exe 91 PID 5684 wrote to memory of 2064 5684 487afaa2421384f1449a96637df558b4.exe 91 PID 5684 wrote to memory of 2064 5684 487afaa2421384f1449a96637df558b4.exe 91 PID 2064 wrote to memory of 5852 2064 csc.exe 93 PID 2064 wrote to memory of 5852 2064 csc.exe 93 PID 2064 wrote to memory of 5852 2064 csc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\487afaa2421384f1449a96637df558b4.exe"C:\Users\Admin\AppData\Local\Temp\487afaa2421384f1449a96637df558b4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5684 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\sjaltgcu\sjaltgcu.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6E89.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE984302173024C209B8B9CE1F1B4EA8.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:5852
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\487afaa2421384f1449a96637df558b4.exe" & move "갬갮갍갂간갎객.exe" "C:\Users\Admin\AppData\Local\Temp\487afaa2421384f1449a96637df558b4.exe"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4836 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD544e074db4a497dbaf82526827ba3641d
SHA137f0e3ff89ba0a7d15337160b03dcfb9a36f948d
SHA2569f0375c9f17cc7303dcb483781674cefb88c9294510bbfc9181f43202d243539
SHA5128affec500f508f953ad55423c255fbfe49dabdf6e4579c1e8c5e7bb332ab9dfd4bc3283cb1782ba5c9c12a2b5df6194eaa1c5b411626066d8a63ed2ba7f23473
-
Filesize
15KB
MD55dbfcc2fe28b7649822f7e2c43f5e96d
SHA1a092c4fdcf6e748f27086d7def0d16a1328983bf
SHA25677b13e49d3b6b964138d9f05d5da661ccb6000936fbe99748f9f8cc4a75c8d6b
SHA5121b035c3470f184175b7904b928ffa6c053ba3b774c1b7835fab32c0571c8594841ed89b56b3c97b17b36a775ac9bd9ee7ad41acd39eb189cea152388aa38e6ea
-
Filesize
1KB
MD5ceb7ed0637e15ca42f5d964490237625
SHA1260998dc264231c1703f91b0523ed159965764fc
SHA2562dfe9abfec134621c4624ff3d48630fd6c02a282cb17abf3ac289e788e9561dc
SHA512cfe43ed26c8574034abdf2c1a454ef5ce0039e5dd0a13f4dc68bfbc3c444af9106561b161974b66b40905aa4e42bdd7983a37b0f0adcd828d45aae82329e3946
-
Filesize
26KB
MD5a6b5033144744d90b586eb2c9375286c
SHA142a9299889a29b5c0271bf49c06e16429b9053a1
SHA25614d4d2548dc473c03a0df3b8a0905bd3cf1f22438049089203a6484fca16d626
SHA5126e7cf58286be7d7623feb12b7ac9b59f0536f355d228530f07b7ffdc99599406add8b1c5e8b58a5d003178e60efca88b1267ab7027f1869883c835e344e0aa49
-
Filesize
281B
MD581261d00f241578aa41c42cf0979578f
SHA12f794704f0d5593af7b457a191d2261b295999c9
SHA2564606ff7c5917a5002e15e1d259588d104ca219cb2c5bdd8ab11f674886cb02f4
SHA5120a83972ff82d77dc7d97e8910951786f3d26ed8e1b91372781c7a02b815b973be26a47ee66ef5b5b8d105d88f0747de67d828eb80cf662aad8e0e4fa5546b36a