Overview
overview
10Static
static
10820e99e073...06.exe
windows7-x64
7820e99e073...06.exe
windows10-2004-x64
782159a5146...bd.exe
windows7-x64
382159a5146...bd.exe
windows10-2004-x64
3822a16f7ff...c0.exe
windows7-x64
10822a16f7ff...c0.exe
windows10-2004-x64
108242f8a803...ff.exe
windows7-x64
108242f8a803...ff.exe
windows10-2004-x64
10825b5bf780...55.exe
windows7-x64
10825b5bf780...55.exe
windows10-2004-x64
10825cbe9334...3e.exe
windows7-x64
7825cbe9334...3e.exe
windows10-2004-x64
7828b11fa8d...bb.exe
windows7-x64
3828b11fa8d...bb.exe
windows10-2004-x64
382a9dfe728...ab.exe
windows7-x64
1082a9dfe728...ab.exe
windows10-2004-x64
1082aff6a3f0...e2.exe
windows7-x64
1082aff6a3f0...e2.exe
windows10-2004-x64
1082dc0c2f48...04.exe
windows7-x64
1082dc0c2f48...04.exe
windows10-2004-x64
1082eb00f02e...57.exe
windows7-x64
1082eb00f02e...57.exe
windows10-2004-x64
1082fdd73396...ed.exe
windows7-x64
182fdd73396...ed.exe
windows10-2004-x64
1832a48a191...90.exe
windows7-x64
10832a48a191...90.exe
windows10-2004-x64
10833949a7ff...98.exe
windows7-x64
10833949a7ff...98.exe
windows10-2004-x64
10833aad3410...1f.exe
windows7-x64
8833aad3410...1f.exe
windows10-2004-x64
8834458e6ef...93.exe
windows7-x64
7834458e6ef...93.exe
windows10-2004-x64
10Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
820e99e0735f8d9d1de08e386589c506.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
820e99e0735f8d9d1de08e386589c506.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
82159a5146f475b4ae5350327fdc1abd.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
82159a5146f475b4ae5350327fdc1abd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
822a16f7ff868ecf1ac2602e4b40e7c0.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
822a16f7ff868ecf1ac2602e4b40e7c0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
8242f8a80325df8bb3e826fd03cf2d8ba7595d26428d7594f15b2cec819013ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
8242f8a80325df8bb3e826fd03cf2d8ba7595d26428d7594f15b2cec819013ff.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
825b5bf7809427781ab9eefb0f139255.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
825b5bf7809427781ab9eefb0f139255.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
825cbe9334005aa8e6a90be34a4d583e.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
825cbe9334005aa8e6a90be34a4d583e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
828b11fa8d8c85c08db7353be46e7ebb.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
828b11fa8d8c85c08db7353be46e7ebb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
82a9dfe7288184b982ebc2d37e82aaab.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
82a9dfe7288184b982ebc2d37e82aaab.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
82aff6a3f0ad4533029392f48502a7e2.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
82aff6a3f0ad4533029392f48502a7e2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
82dc0c2f48327b7dad22ea176fcf9e6b8dfcd5de417b762bd41d38ca4d50e404.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
82dc0c2f48327b7dad22ea176fcf9e6b8dfcd5de417b762bd41d38ca4d50e404.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
82eb00f02e7f035adb6a08912ec1b957.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
82eb00f02e7f035adb6a08912ec1b957.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
82fdd73396f0e932123186cd1418e8eaad1577fa9cd9293b0429fb35e05deeed.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
82fdd73396f0e932123186cd1418e8eaad1577fa9cd9293b0429fb35e05deeed.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
832a48a191a3e98e1914659c9a2c9098e73dd164c4e84d97899a6051a6515f90.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
832a48a191a3e98e1914659c9a2c9098e73dd164c4e84d97899a6051a6515f90.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
833949a7ffdc7975f7e894f152e0289e6d3b1131b56c9180bb9fe772780efc98.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
833949a7ffdc7975f7e894f152e0289e6d3b1131b56c9180bb9fe772780efc98.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
833aad3410b30a9ec5214be9fe616e327c813883502cfa1a0b597de784106c1f.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
833aad3410b30a9ec5214be9fe616e327c813883502cfa1a0b597de784106c1f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
834458e6efa75273db3e9a2c5c4c3293.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
834458e6efa75273db3e9a2c5c4c3293.exe
Resource
win10v2004-20250314-en
General
-
Target
820e99e0735f8d9d1de08e386589c506.exe
-
Size
15KB
-
MD5
820e99e0735f8d9d1de08e386589c506
-
SHA1
335b44f3ea73fc36519ca1f823f3afd7ce2c64dd
-
SHA256
701b77e509df1ce240271f9cc9ac874df64e593e0eb8f3cd207db9dcebbc22bc
-
SHA512
378353ffdafa706600a0a6c2efcf0bfa0d2d6eec948557a31667d9de2fccae6ac3fe735730ce4ed38210526834cfbdb1f549f48337cde2615d4cee3e78fc3e54
-
SSDEEP
384:8MrJk6GClRZt9qGOVNJk7ha4H949dyNx:hk6pRZPrOVh4H9wQx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 820e99e0735f8d9d1de08e386589c506.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2760 cmd.exe 2664 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2664 PING.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2084 2248 820e99e0735f8d9d1de08e386589c506.exe 31 PID 2248 wrote to memory of 2084 2248 820e99e0735f8d9d1de08e386589c506.exe 31 PID 2248 wrote to memory of 2084 2248 820e99e0735f8d9d1de08e386589c506.exe 31 PID 2248 wrote to memory of 2084 2248 820e99e0735f8d9d1de08e386589c506.exe 31 PID 2084 wrote to memory of 3064 2084 csc.exe 33 PID 2084 wrote to memory of 3064 2084 csc.exe 33 PID 2084 wrote to memory of 3064 2084 csc.exe 33 PID 2084 wrote to memory of 3064 2084 csc.exe 33 PID 2248 wrote to memory of 2760 2248 820e99e0735f8d9d1de08e386589c506.exe 34 PID 2248 wrote to memory of 2760 2248 820e99e0735f8d9d1de08e386589c506.exe 34 PID 2248 wrote to memory of 2760 2248 820e99e0735f8d9d1de08e386589c506.exe 34 PID 2248 wrote to memory of 2760 2248 820e99e0735f8d9d1de08e386589c506.exe 34 PID 2760 wrote to memory of 2664 2760 cmd.exe 36 PID 2760 wrote to memory of 2664 2760 cmd.exe 36 PID 2760 wrote to memory of 2664 2760 cmd.exe 36 PID 2760 wrote to memory of 2664 2760 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\820e99e0735f8d9d1de08e386589c506.exe"C:\Users\Admin\AppData\Local\Temp\820e99e0735f8d9d1de08e386589c506.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uqfrkwhp\uqfrkwhp.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDF5.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCC8BE47614BEA4CE1B097F6C71765808D.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\820e99e0735f8d9d1de08e386589c506.exe" & move "갣갯갆갇갉갭개.exe" "C:\Users\Admin\AppData\Local\Temp\820e99e0735f8d9d1de08e386589c506.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54e8ec104662fbbc9041053cdabbb63ea
SHA1693ff91a4636bf2947619f46bf0786e5885a1088
SHA256e348c08371bb97db9401decb411a1967037abbf65d149dcf075ec807d303f645
SHA5124df36345012bf0d6ce443addbf03931b9b5180d07b3753cf3b2d0b970bc320ee420dc59c2fb7bef9d0182883b2ce8faf8e9bbe6d4890cd627a389b2a0ed19a13
-
Filesize
15KB
MD51331ce534f81637b3f1547bc89b70220
SHA1da57a5a25f3bc4c3f80f998ad3cb399c0a9fa4ff
SHA2568a1f18824e5443a26c3bb474f3136278d813dc887a06a96d72053133af1c9d63
SHA51297079f35831cd7f56fe22e5d3b2ba2a9b2a2c03b27952c776ab969ed3525d0bb43c1c49a2c494c5c957b067a252fc595ceeea2477af380f869eb7f16c82f758d
-
Filesize
1KB
MD512904ca7143c82e45388901916c97292
SHA178e3e09604d525f43011c4ce3267d5e9c1675611
SHA25641280608261476e35e7e62e7ef683842fe37a82630d3e54770fc9931368ed36e
SHA512170ba8a8f065a78ae272fd948996edaf6f0181ee62ccdf1bbb3fb3cb7ee93a5bc7c8aaf51dcce08da5aefa59c41a6cc0d52bc64924fb7187b5ead27cee2f6669
-
Filesize
25KB
MD54a4bff9e50db86795838ee748f94912b
SHA16f308364cba7582601c354639b01e71dc9d2d378
SHA2563616e80a039f40dfc35de9499f80c53156952678f82eefbd7b1b3351f39d2869
SHA512236d43a9a250330728cbac338c8fb6caddb58ded0162eb458b24f1c90832ef3c1a76fe75e84a98873ea4582ec6074dc2fd7e503c29a8dffd14d10388efcd5005
-
Filesize
281B
MD56de1a7d4873fefd1995e186ca33614da
SHA164209d1f0d9a16cc1dcd93497af263da996cdd3c
SHA25674e6ffe5b2332e9b8da5d0cddcdb1fb6e9a385ea978828bd6ca70038eae39937
SHA512118f0cffbf069cee1c09b9570d4fd6f63bb3f6127952102ece0d06d57a15fd468c23fa41836f709706498dff140ab1b82cc58f48be8347b5acea86e3eac91eeb