Overview
overview
8Static
static
5Windows Lo...2.2.7z
windows7-x64
1Windows Lo...2.2.7z
windows10-2004-x64
1Windows Lo...ys.ini
windows7-x64
1Windows Lo...ys.ini
windows10-2004-x64
1Windows Lo...me.txt
windows7-x64
1Windows Lo...me.txt
windows10-2004-x64
1Windows Lo...er.exe
windows7-x64
8Windows Lo...er.exe
windows10-2004-x64
7Windows Lo...ms.md5
windows7-x64
3Windows Lo...ms.md5
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 14:05
Behavioral task
behavioral1
Sample
Windows Loader v2.2.2.7z
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Windows Loader v2.2.2.7z
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Windows Loader v2.2.2/Keys.ini
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Windows Loader v2.2.2/Keys.ini
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
Windows Loader v2.2.2/Read me.txt
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Windows Loader v2.2.2/Read me.txt
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
Windows Loader v2.2.2/Windows Loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Windows Loader v2.2.2/Windows Loader.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
Windows Loader v2.2.2/checksums.md5
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Windows Loader v2.2.2/checksums.md5
Resource
win10v2004-20250314-en
General
-
Target
Windows Loader v2.2.2/checksums.md5
-
Size
145B
-
MD5
cab45d50be4c1fc788d29593464b1f35
-
SHA1
d38b7abee249bc2751dd5373b358f69b895d5a8c
-
SHA256
c083f57ac4d8a5eaf9bc934f08204a691fa9e4fd275f90aaadfd195a4eef820f
-
SHA512
ee9548867850c018544c2d1cbf512ea759be2fd276113ae89354cdbcae7fd549bf47bbf3ccdbce5ff8a17702dcd36f90b01f512da576fc9528a41e87d2c378f4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2800 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2800 AcroRd32.exe 2800 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 764 wrote to memory of 2828 764 cmd.exe 32 PID 764 wrote to memory of 2828 764 cmd.exe 32 PID 764 wrote to memory of 2828 764 cmd.exe 32 PID 2828 wrote to memory of 2800 2828 rundll32.exe 33 PID 2828 wrote to memory of 2800 2828 rundll32.exe 33 PID 2828 wrote to memory of 2800 2828 rundll32.exe 33 PID 2828 wrote to memory of 2800 2828 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Windows Loader v2.2.2\checksums.md5"1⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Windows Loader v2.2.2\checksums.md52⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Windows Loader v2.2.2\checksums.md5"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d4828ffdd5ee42a08e0e183077147764
SHA1324875dbf9d2b8cbd83b8db91c1f884ec675e382
SHA2561b5835f976e03c514e79eeacbc78301a13990b48af94e5335e04cb593557b30f
SHA512b238eb9fcd73c4d533bc2de1afc0a511f5b82254d7c4b33e17acfb94792e39bf06b0867160cc347deb4cce00b683e1a85b0f7b8b1c33a119af8b0901749b4e9f