Overview
overview
10Static
static
1067a62cb441...ba.exe
windows7-x64
1067a62cb441...ba.exe
windows10-2004-x64
1067c679ac1d...4d.exe
windows7-x64
1067c679ac1d...4d.exe
windows10-2004-x64
1067e080e7fb...78.exe
windows7-x64
1067e080e7fb...78.exe
windows10-2004-x64
1067e78da23e...0e.exe
windows7-x64
867e78da23e...0e.exe
windows10-2004-x64
867e9ff3c0b...3e.exe
windows7-x64
767e9ff3c0b...3e.exe
windows10-2004-x64
7682b4b814e...27.exe
windows7-x64
10682b4b814e...27.exe
windows10-2004-x64
1068461a12fa...a4.exe
windows7-x64
1068461a12fa...a4.exe
windows10-2004-x64
1068921d96c9...34.exe
windows7-x64
1068921d96c9...34.exe
windows10-2004-x64
1068aaab301e...db.exe
windows7-x64
1068aaab301e...db.exe
windows10-2004-x64
1068b8408aa7...2b.exe
windows7-x64
768b8408aa7...2b.exe
windows10-2004-x64
768e912a390...88.exe
windows7-x64
1068e912a390...88.exe
windows10-2004-x64
1068fef6943e...6c.exe
windows7-x64
1068fef6943e...6c.exe
windows10-2004-x64
10691fe746ab...24.exe
windows7-x64
8691fe746ab...24.exe
windows10-2004-x64
8692a24fa9e...4b.exe
windows7-x64
10692a24fa9e...4b.exe
windows10-2004-x64
1069319ee860...9e.exe
windows7-x64
769319ee860...9e.exe
windows10-2004-x64
76947cb60fe...09.exe
windows7-x64
16947cb60fe...09.exe
windows10-2004-x64
1Analysis
-
max time kernel
103s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:12
Behavioral task
behavioral1
Sample
67a62cb441400a13757721a9f7d8c6ba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
67a62cb441400a13757721a9f7d8c6ba.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
67c679ac1d31b57180ad84a2ccd0a74d.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
67c679ac1d31b57180ad84a2ccd0a74d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
67e080e7fb0b34b6c79705d7689afc78.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
67e080e7fb0b34b6c79705d7689afc78.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
67e78da23e09ae504200e107f8bd9c60081203120fd9f7abb56696c552dc520e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
67e78da23e09ae504200e107f8bd9c60081203120fd9f7abb56696c552dc520e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
682b4b814ea823587a4f3c3d6c7bc1b59baece364d2b670fd3e45e798afeac27.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
682b4b814ea823587a4f3c3d6c7bc1b59baece364d2b670fd3e45e798afeac27.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
68461a12fa99132c70d16fe56ad023eec0f3813ac15c52eb407d7422716fa0a4.exe
Resource
win7-20250207-en
Behavioral task
behavioral14
Sample
68461a12fa99132c70d16fe56ad023eec0f3813ac15c52eb407d7422716fa0a4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
68921d96c994564496baf8e8befa5834.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
68921d96c994564496baf8e8befa5834.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
68aaab301e4dc976a9ee18a646fab60e01c839867d05d24df6dad31b95e6aedb.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
68aaab301e4dc976a9ee18a646fab60e01c839867d05d24df6dad31b95e6aedb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
68b8408aa7c238f2f6646abb8c2ff32b.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
68b8408aa7c238f2f6646abb8c2ff32b.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
68e912a390ec3a616480c7e3f1330988.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
68e912a390ec3a616480c7e3f1330988.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
68fef6943ee096474fd5049bb302656c.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
68fef6943ee096474fd5049bb302656c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
691fe746ab84ce9cc21d871e1c3f9b24.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
691fe746ab84ce9cc21d871e1c3f9b24.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
692a24fa9e70407c4d311a134752a34b.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
692a24fa9e70407c4d311a134752a34b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
69319ee8609b1c1eebe97dc2bdf84c9e.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
69319ee8609b1c1eebe97dc2bdf84c9e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
6947cb60fed661aec1436b0ed5b443e13f6985da262967c2a9eb8160b1064e09.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
6947cb60fed661aec1436b0ed5b443e13f6985da262967c2a9eb8160b1064e09.exe
Resource
win10v2004-20250314-en
General
-
Target
68b8408aa7c238f2f6646abb8c2ff32b.exe
-
Size
15KB
-
MD5
68b8408aa7c238f2f6646abb8c2ff32b
-
SHA1
1eec3953051baedef2f9b56dce1dd2673a6dff29
-
SHA256
46e5a4768db1d83d467431c07274873f38728339a82ceddfa9ca188d7e83cf93
-
SHA512
41a57f39395e031524cdca1ff5c23f0db206f24bd2bef8d5b9ab2c399e9a5eaf0c27a563a420a1f157221194847af130061462effb2293120cf15f9844e68801
-
SSDEEP
384:7OTxng39jk1pH+uURZt4dyK3OV1fksha4H94XGZlcvbFZ:AxQ9jupmRZbAOV1q4H9HZluhZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation 68b8408aa7c238f2f6646abb8c2ff32b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68b8408aa7c238f2f6646abb8c2ff32b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4712 PING.EXE 4700 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4712 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5728 wrote to memory of 6072 5728 68b8408aa7c238f2f6646abb8c2ff32b.exe 91 PID 5728 wrote to memory of 6072 5728 68b8408aa7c238f2f6646abb8c2ff32b.exe 91 PID 5728 wrote to memory of 6072 5728 68b8408aa7c238f2f6646abb8c2ff32b.exe 91 PID 6072 wrote to memory of 5804 6072 csc.exe 93 PID 6072 wrote to memory of 5804 6072 csc.exe 93 PID 6072 wrote to memory of 5804 6072 csc.exe 93 PID 5728 wrote to memory of 4700 5728 68b8408aa7c238f2f6646abb8c2ff32b.exe 94 PID 5728 wrote to memory of 4700 5728 68b8408aa7c238f2f6646abb8c2ff32b.exe 94 PID 5728 wrote to memory of 4700 5728 68b8408aa7c238f2f6646abb8c2ff32b.exe 94 PID 4700 wrote to memory of 4712 4700 cmd.exe 96 PID 4700 wrote to memory of 4712 4700 cmd.exe 96 PID 4700 wrote to memory of 4712 4700 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\68b8408aa7c238f2f6646abb8c2ff32b.exe"C:\Users\Admin\AppData\Local\Temp\68b8408aa7c238f2f6646abb8c2ff32b.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\unrkamdz\unrkamdz.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9D98.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA3D7CD0FA754090BCC187694F6E7494.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:5804
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\68b8408aa7c238f2f6646abb8c2ff32b.exe" & move "갊갅개갭갗갬값간갠같각갚.exe" "C:\Users\Admin\AppData\Local\Temp\68b8408aa7c238f2f6646abb8c2ff32b.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ca724103670fb745fe55dc9faf64c2e3
SHA16b9641867d2b68e5bf9444f2ad977bf9beffc2d1
SHA2564b4d342294bded6891d8357aeb0b183ad31e69d4cd40538b7c955ccc150887b4
SHA512a0a7dd076478403ea696b0e2e0dfb45b4e536235f40a08a26d308bc9a42b6e85805234f620783ba18d027e241cfebe492fc5a5bc749d14785c780ed317b4fe16
-
Filesize
15KB
MD5ea3614b5dc1dbf356f5f99e1382a549f
SHA14b644e465b3768f19c87e182124e4ae9654d311c
SHA25608ef6ecf74b9a4c1b7e48991152a937362ee4deb15e8f306c23985ce6db8b6e3
SHA512e38e0826b4af88a17854d39cf55c0726fb2d2a74ed692db2168325130e8151788ba7b2df1fd83a3c61916d222cb48c37e22b4b9065ff85f74f553b898315abcd
-
Filesize
1KB
MD5c14c6f667b67d5c8ff426968dae68a73
SHA1d264635fa0d8dee158b1798eaa47e3d183155aa5
SHA256a4e35b27a759fea90e3a09a853fa70517b92ae999787f7a3c2458708f128a273
SHA5125edcad218038ae0cb575eaa48b3851697a3cd60e3443a7ca65f7aa5c01484b100016df92a1c2e1c3af61bad10b438a85b14d5c11b9a90c3c9682357df2c04303
-
Filesize
26KB
MD58bb13875ffb487e95354b69229428f55
SHA10643ce606799389815fd27320a556f9ef2b4f451
SHA25670c13f3ed3f2008ebbe25840c02188f168d9034291587473531e20446f6db8c7
SHA512fd9531e1162949a608fcf75ba59a2d57ada9c66f39506f24ebb7e9a6d497d8ab342a8747ebee3131ce89f1f756000382d66e7c03acc399b37f5f70719f85b62d
-
Filesize
296B
MD529ebe2dcc1b5b3b3623be6d7487bdd61
SHA10de05ce0199c4ca39d437f7cd253ed2009987224
SHA256cccbcd73f0de6cef20cab470c05ad8c427f990e20e7347af1ec5b1819a46878e
SHA51259566fde99c283e35869a7dcf06c40261efb97ecee950831503448de4f667b9559e7eeaf4d715458b2749aa1ddc7390b291d737662e03eeaf345cc286295c5d7