Overview
overview
10Static
static
1067a62cb441...ba.exe
windows7-x64
1067a62cb441...ba.exe
windows10-2004-x64
1067c679ac1d...4d.exe
windows7-x64
1067c679ac1d...4d.exe
windows10-2004-x64
1067e080e7fb...78.exe
windows7-x64
1067e080e7fb...78.exe
windows10-2004-x64
1067e78da23e...0e.exe
windows7-x64
867e78da23e...0e.exe
windows10-2004-x64
867e9ff3c0b...3e.exe
windows7-x64
767e9ff3c0b...3e.exe
windows10-2004-x64
7682b4b814e...27.exe
windows7-x64
10682b4b814e...27.exe
windows10-2004-x64
1068461a12fa...a4.exe
windows7-x64
1068461a12fa...a4.exe
windows10-2004-x64
1068921d96c9...34.exe
windows7-x64
1068921d96c9...34.exe
windows10-2004-x64
1068aaab301e...db.exe
windows7-x64
1068aaab301e...db.exe
windows10-2004-x64
1068b8408aa7...2b.exe
windows7-x64
768b8408aa7...2b.exe
windows10-2004-x64
768e912a390...88.exe
windows7-x64
1068e912a390...88.exe
windows10-2004-x64
1068fef6943e...6c.exe
windows7-x64
1068fef6943e...6c.exe
windows10-2004-x64
10691fe746ab...24.exe
windows7-x64
8691fe746ab...24.exe
windows10-2004-x64
8692a24fa9e...4b.exe
windows7-x64
10692a24fa9e...4b.exe
windows10-2004-x64
1069319ee860...9e.exe
windows7-x64
769319ee860...9e.exe
windows10-2004-x64
76947cb60fe...09.exe
windows7-x64
16947cb60fe...09.exe
windows10-2004-x64
1Analysis
-
max time kernel
139s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:12
Behavioral task
behavioral1
Sample
67a62cb441400a13757721a9f7d8c6ba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
67a62cb441400a13757721a9f7d8c6ba.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
67c679ac1d31b57180ad84a2ccd0a74d.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
67c679ac1d31b57180ad84a2ccd0a74d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
67e080e7fb0b34b6c79705d7689afc78.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
67e080e7fb0b34b6c79705d7689afc78.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
67e78da23e09ae504200e107f8bd9c60081203120fd9f7abb56696c552dc520e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
67e78da23e09ae504200e107f8bd9c60081203120fd9f7abb56696c552dc520e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
682b4b814ea823587a4f3c3d6c7bc1b59baece364d2b670fd3e45e798afeac27.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
682b4b814ea823587a4f3c3d6c7bc1b59baece364d2b670fd3e45e798afeac27.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
68461a12fa99132c70d16fe56ad023eec0f3813ac15c52eb407d7422716fa0a4.exe
Resource
win7-20250207-en
Behavioral task
behavioral14
Sample
68461a12fa99132c70d16fe56ad023eec0f3813ac15c52eb407d7422716fa0a4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
68921d96c994564496baf8e8befa5834.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
68921d96c994564496baf8e8befa5834.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
68aaab301e4dc976a9ee18a646fab60e01c839867d05d24df6dad31b95e6aedb.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
68aaab301e4dc976a9ee18a646fab60e01c839867d05d24df6dad31b95e6aedb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
68b8408aa7c238f2f6646abb8c2ff32b.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
68b8408aa7c238f2f6646abb8c2ff32b.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
68e912a390ec3a616480c7e3f1330988.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
68e912a390ec3a616480c7e3f1330988.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
68fef6943ee096474fd5049bb302656c.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
68fef6943ee096474fd5049bb302656c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
691fe746ab84ce9cc21d871e1c3f9b24.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
691fe746ab84ce9cc21d871e1c3f9b24.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
692a24fa9e70407c4d311a134752a34b.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
692a24fa9e70407c4d311a134752a34b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
69319ee8609b1c1eebe97dc2bdf84c9e.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
69319ee8609b1c1eebe97dc2bdf84c9e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
6947cb60fed661aec1436b0ed5b443e13f6985da262967c2a9eb8160b1064e09.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
6947cb60fed661aec1436b0ed5b443e13f6985da262967c2a9eb8160b1064e09.exe
Resource
win10v2004-20250314-en
General
-
Target
67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe
-
Size
517KB
-
MD5
f3882841d807ebcc147ff9c45263ee4d
-
SHA1
b97d48e074558a172948c835044eff8142af4882
-
SHA256
67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e
-
SHA512
fb3d4cccd0a6210886422250ce60da509659a49c27b1a9bb279725563f39365acff1f7fb868a2537e8db896fd849e4872488c367eda94af9bcf0aa654ca29697
-
SSDEEP
1536:N4eK+IFjWfoPbuaTRM3nFkwHbaA3LL0idWwiQcmWkF7jV:G+IF6foPCaTRMXbaev0FQcmWkRV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2564 audiohd.exe -
Loads dropped DLL 2 IoCs
pid Process 2768 67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe 2768 67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiohd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2768 67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe 2564 audiohd.exe 2448 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2768 67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe Token: SeDebugPrivilege 2564 audiohd.exe Token: SeDebugPrivilege 2448 powershell.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2564 2768 67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe 30 PID 2768 wrote to memory of 2564 2768 67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe 30 PID 2768 wrote to memory of 2564 2768 67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe 30 PID 2768 wrote to memory of 2564 2768 67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe 30 PID 2564 wrote to memory of 2448 2564 audiohd.exe 31 PID 2564 wrote to memory of 2448 2564 audiohd.exe 31 PID 2564 wrote to memory of 2448 2564 audiohd.exe 31 PID 2564 wrote to memory of 2448 2564 audiohd.exe 31 PID 2448 wrote to memory of 3044 2448 powershell.exe 33 PID 2448 wrote to memory of 3044 2448 powershell.exe 33 PID 2448 wrote to memory of 3044 2448 powershell.exe 33 PID 2448 wrote to memory of 3044 2448 powershell.exe 33 PID 3044 wrote to memory of 376 3044 csc.exe 34 PID 3044 wrote to memory of 376 3044 csc.exe 34 PID 3044 wrote to memory of 376 3044 csc.exe 34 PID 3044 wrote to memory of 376 3044 csc.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe"C:\Users\Admin\AppData\Local\Temp\67e9ff3c0b908ed9076058d06270b856681178ce2e7d35867d1f5f75b715353e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Microsoft\audiohd.exe"C:\Users\Admin\AppData\Local\Microsoft\audiohd.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -Path "C:\Users\Admin\AppData\Local\Microsoft\local.cs"; [LocalServ]::Listen()3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\sckfexpc.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6D45.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC6D44.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:376
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5ff169c4274b91df68a1a0548b9186b29
SHA1e2a406a1a49c5825d4f4279e82d1ca369433b244
SHA2566da3e26b268e4a6c21e192c8b9a1b89aef6880bad673b79e6a889d29641ac2cc
SHA5128785d91046722c0e8278fb95404ae284c3cf5e96060d06a7dc2209866b96618978e41844759da30fec7bdcef677fada61d3db498adbe989eaa87fbf84fc3366b
-
Filesize
1KB
MD5d6956527d3d686c82f48f10e64f663ac
SHA16e904f0f599dba95b705f5461671e85310f3749f
SHA2564695aca86ec16d85841a7d3fe5fb1ff543680848286ffb8c7f33b442d70019a5
SHA512ea8ffe12ff545833aa72f8e5aa55f73abdbf551bd6c5250556d64e45f480dbf6b4c7c8a9ddeb82d62b5e5c08dd60a3cd68b73dad437ef27462fba198a68154aa
-
Filesize
6KB
MD5fd2e67fb34365828e7cec72d3c3bcd00
SHA1fb86cb1c67b7e44937d41c0df9628bea281fe0b9
SHA25618e61e463f216d305e4a0853ba152d16e387f43dd3755052bac9727579bf6f80
SHA51281566970a1d6626cf77ca6ec8bb00f529242e095ac13825fa732a861fe50bc063c2de3733408359e9d7eab443de470982eb2ed1176293e384918a4c23774c105
-
Filesize
13KB
MD504fce2b68a7e573aafc1b40bdd36b0cf
SHA14a1ae1b4e5ca7fd385918716b0f9ad0bce3bdb7d
SHA25658589cfea47ad5f85297e33a420d8c28ee52f19455bb859d1cc005ba7f7bbbd6
SHA5129fb8c26b6224fe1c38f4e2e5fad57b514bccc151fbdea371b969d35c3ddf5907bb775fecdb7dfe24f5ccc467989fc783107bd97f28f54f29610da83e6a6f7fac
-
Filesize
652B
MD5a4e2a2735ae9d8ff843c48795a1bda62
SHA154cbfe5482ba7f4e09500db6717ba90344da56b2
SHA2566858421a2fe6424d704ea799cf50311e323ec16d6f71c10ee8d42a9798155c36
SHA512bc255a643b077f909fd0b48e2400f4d04219dc2a15c3eee1d8dd94af80e75f6eb1e3aa9dc656d76b69f29b1ed7121c5c7251cfab7a8dd4ba155050bc693c5eca
-
Filesize
309B
MD5fdd6544411b06f65c368299de2759f44
SHA18322745a68138310a318f954a03d6ccca3653d0f
SHA256e98555bd1a21eec7d62d46470614b2cedaae4e0eb6d2e4ddade5284e27c112c9
SHA512e3a9366e4ba987df9b1e63ad6bc8aa007f0a6ae8e439b396ad521669e2ab2fa7e516c742b18c0b0003940988fc38664a066bf7084a5bd5962e54520007c77f6b
-
Filesize
521KB
MD5511123af022350ae744eb9387c87983d
SHA12de26b95ceed9fafa3ee8592947dc07cad643030
SHA256e5b5ee5a16c483d69c5f7796bcef597d5c85d577ffd2d352d786c9364b984df2
SHA5124ed5abfe8e10519d0b6ea8a1e9a9faadfae8c95a812500447490ce8fc636ad5b4815890041231a8a8096c48984b1c3f488c3aa3ba059aa10d6d1e871b6e53e26