Overview
overview
10Static
static
10820e99e073...06.exe
windows7-x64
7820e99e073...06.exe
windows10-2004-x64
782159a5146...bd.exe
windows7-x64
382159a5146...bd.exe
windows10-2004-x64
3822a16f7ff...c0.exe
windows7-x64
10822a16f7ff...c0.exe
windows10-2004-x64
108242f8a803...ff.exe
windows7-x64
108242f8a803...ff.exe
windows10-2004-x64
10825b5bf780...55.exe
windows7-x64
10825b5bf780...55.exe
windows10-2004-x64
10825cbe9334...3e.exe
windows7-x64
7825cbe9334...3e.exe
windows10-2004-x64
7828b11fa8d...bb.exe
windows7-x64
3828b11fa8d...bb.exe
windows10-2004-x64
382a9dfe728...ab.exe
windows7-x64
1082a9dfe728...ab.exe
windows10-2004-x64
1082aff6a3f0...e2.exe
windows7-x64
1082aff6a3f0...e2.exe
windows10-2004-x64
1082dc0c2f48...04.exe
windows7-x64
1082dc0c2f48...04.exe
windows10-2004-x64
1082eb00f02e...57.exe
windows7-x64
1082eb00f02e...57.exe
windows10-2004-x64
1082fdd73396...ed.exe
windows7-x64
182fdd73396...ed.exe
windows10-2004-x64
1832a48a191...90.exe
windows7-x64
10832a48a191...90.exe
windows10-2004-x64
10833949a7ff...98.exe
windows7-x64
10833949a7ff...98.exe
windows10-2004-x64
10833aad3410...1f.exe
windows7-x64
8833aad3410...1f.exe
windows10-2004-x64
8834458e6ef...93.exe
windows7-x64
7834458e6ef...93.exe
windows10-2004-x64
10Analysis
-
max time kernel
116s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
820e99e0735f8d9d1de08e386589c506.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
820e99e0735f8d9d1de08e386589c506.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
82159a5146f475b4ae5350327fdc1abd.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
82159a5146f475b4ae5350327fdc1abd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
822a16f7ff868ecf1ac2602e4b40e7c0.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
822a16f7ff868ecf1ac2602e4b40e7c0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
8242f8a80325df8bb3e826fd03cf2d8ba7595d26428d7594f15b2cec819013ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
8242f8a80325df8bb3e826fd03cf2d8ba7595d26428d7594f15b2cec819013ff.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
825b5bf7809427781ab9eefb0f139255.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
825b5bf7809427781ab9eefb0f139255.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
825cbe9334005aa8e6a90be34a4d583e.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
825cbe9334005aa8e6a90be34a4d583e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
828b11fa8d8c85c08db7353be46e7ebb.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
828b11fa8d8c85c08db7353be46e7ebb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
82a9dfe7288184b982ebc2d37e82aaab.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
82a9dfe7288184b982ebc2d37e82aaab.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
82aff6a3f0ad4533029392f48502a7e2.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
82aff6a3f0ad4533029392f48502a7e2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
82dc0c2f48327b7dad22ea176fcf9e6b8dfcd5de417b762bd41d38ca4d50e404.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
82dc0c2f48327b7dad22ea176fcf9e6b8dfcd5de417b762bd41d38ca4d50e404.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
82eb00f02e7f035adb6a08912ec1b957.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
82eb00f02e7f035adb6a08912ec1b957.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
82fdd73396f0e932123186cd1418e8eaad1577fa9cd9293b0429fb35e05deeed.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
82fdd73396f0e932123186cd1418e8eaad1577fa9cd9293b0429fb35e05deeed.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
832a48a191a3e98e1914659c9a2c9098e73dd164c4e84d97899a6051a6515f90.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
832a48a191a3e98e1914659c9a2c9098e73dd164c4e84d97899a6051a6515f90.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
833949a7ffdc7975f7e894f152e0289e6d3b1131b56c9180bb9fe772780efc98.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
833949a7ffdc7975f7e894f152e0289e6d3b1131b56c9180bb9fe772780efc98.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
833aad3410b30a9ec5214be9fe616e327c813883502cfa1a0b597de784106c1f.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
833aad3410b30a9ec5214be9fe616e327c813883502cfa1a0b597de784106c1f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
834458e6efa75273db3e9a2c5c4c3293.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
834458e6efa75273db3e9a2c5c4c3293.exe
Resource
win10v2004-20250314-en
General
-
Target
820e99e0735f8d9d1de08e386589c506.exe
-
Size
15KB
-
MD5
820e99e0735f8d9d1de08e386589c506
-
SHA1
335b44f3ea73fc36519ca1f823f3afd7ce2c64dd
-
SHA256
701b77e509df1ce240271f9cc9ac874df64e593e0eb8f3cd207db9dcebbc22bc
-
SHA512
378353ffdafa706600a0a6c2efcf0bfa0d2d6eec948557a31667d9de2fccae6ac3fe735730ce4ed38210526834cfbdb1f549f48337cde2615d4cee3e78fc3e54
-
SSDEEP
384:8MrJk6GClRZt9qGOVNJk7ha4H949dyNx:hk6pRZPrOVh4H9wQx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation 820e99e0735f8d9d1de08e386589c506.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 820e99e0735f8d9d1de08e386589c506.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1540 cmd.exe 1776 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1776 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 768 wrote to memory of 4056 768 820e99e0735f8d9d1de08e386589c506.exe 95 PID 768 wrote to memory of 4056 768 820e99e0735f8d9d1de08e386589c506.exe 95 PID 768 wrote to memory of 4056 768 820e99e0735f8d9d1de08e386589c506.exe 95 PID 4056 wrote to memory of 2300 4056 csc.exe 97 PID 4056 wrote to memory of 2300 4056 csc.exe 97 PID 4056 wrote to memory of 2300 4056 csc.exe 97 PID 768 wrote to memory of 1540 768 820e99e0735f8d9d1de08e386589c506.exe 98 PID 768 wrote to memory of 1540 768 820e99e0735f8d9d1de08e386589c506.exe 98 PID 768 wrote to memory of 1540 768 820e99e0735f8d9d1de08e386589c506.exe 98 PID 1540 wrote to memory of 1776 1540 cmd.exe 100 PID 1540 wrote to memory of 1776 1540 cmd.exe 100 PID 1540 wrote to memory of 1776 1540 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\820e99e0735f8d9d1de08e386589c506.exe"C:\Users\Admin\AppData\Local\Temp\820e99e0735f8d9d1de08e386589c506.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\sylgdxma\sylgdxma.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB258.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA921F1C712744869851EF2DA895347.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2300
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\820e99e0735f8d9d1de08e386589c506.exe" & move "갌갎갮갗감갘갡갣갅갏갃.exe" "C:\Users\Admin\AppData\Local\Temp\820e99e0735f8d9d1de08e386589c506.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f38105163234aea5d471f253754050e7
SHA161f425760751781f527dc2d4e9313731ad70376d
SHA256e2554492e6a2ab1082cf539dbfec1f602454d74276eb06aa351b3cdbd33689d4
SHA512e262c3b724cf2d9a8bd49c98ed9c969078b586a1dcbbbc05ceacbc2b801113e8f05ff1099f3ccb6db77ac4bbc159f0d2d35e5979b162556f837d93a72e0d9110
-
Filesize
15KB
MD571f08f4b3d996724a4f6bd119268cc85
SHA13f4d605ec85822e87bb5c0260da4f6d52db34621
SHA2567814a50f81d34362fdb68407dcb42067e57f6ae1d370889cf8ef694288328248
SHA51294de38d430a68140c98a4b70ce0a6c5580c733b54dcfe64955affca88fc4af5ba5c2c0eec5c02559b1591edbeeef5d0369de312304b7d08ee46d8ce3853c5b1b
-
Filesize
1KB
MD57ca24324e4d094e6c51fdd032b9a3230
SHA1dd97dbe9529fa2043a9479a09016a21a20c2b1bc
SHA256083ca1142798ecd412b3ebc38ee1feb93a3bf61cbd5d7910ce2304ad0db93e97
SHA512b71c79e6e5a202208ede703567d78b0929f0d33e9ed3706eadd666d30f54ac0059f3be8ef60c0e8dc6d857f0fb33a3e5b9c3768fe959ea950c46ecb7a40de174
-
Filesize
25KB
MD59c14a6361d91c606b5a9186176f51ecd
SHA16c7886b5d3b8221d0883c00d7397b6a19f7b0a4f
SHA2569d1f88114cfd05c7525e1d295711c418fdcf1f19c43ed9ce8a13b6d306ecde03
SHA512e744a4a5183efc07b2454f611c46ecc16b006a14235c2a28bb810c73844590c197a5fda5b0b6c6e1411b4fa9ec3c5787b528ffa1c6dd7eaf47ebcb877a6787e5
-
Filesize
293B
MD54cbd86b7c417636c09521b057572e100
SHA17ddd23e5fb94b767bb8457c5318621fa56a77833
SHA256a78786327b2e499ba78d62f5c8e40f495f8132377782b949a148d9ee94626eb3
SHA5127e7953f9e6276a7252d694ec5c539bef96a00e36950d2225f1a0812d4e5c9ef773d9c8552f91cefbba271b28da84298f829101f7983f61a98ab34313a239ed8e