Resubmissions

08/04/2025, 14:11

250408-rhjmcsvp15 10

22/03/2025, 06:18

250322-g2ywaay1fy 10

Analysis

  • max time kernel
    8s
  • max time network
    9s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2025, 14:11

Errors

Reason
Machine shutdown

General

  • Target

    f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5.exe

  • Size

    373KB

  • MD5

    1390a05960fe6acd3fd25279513346f0

  • SHA1

    c65393f72d9e00c770ba3ef393701bc87e13b938

  • SHA256

    f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5

  • SHA512

    90c3d8d61687e3bccd9e6e15f6c5f3db6770471878b452f9a11874ea70391eac5639424fd3f4a03de7729d642355fb2e6e0c4e65e3e4765cb76111a7b2de5bcc

  • SSDEEP

    6144:tyMIULPy/x3xUArN62f7GU7njrbma/3LaQURrM2TuP6zJcW:XDy/xhUAtf7tjrbma7OJxuSzp

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5.exe
    "C:\Users\Admin\AppData\Local\Temp\f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5192
    • C:\Users\Admin\AppData\Roaming\future\grotesque.exe
      "C:\Users\Admin\AppData\Roaming\future\grotesque.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4940
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\future\grotesque.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3104
    • C:\Users\Admin\AppData\Roaming\future\grotesque.exe
      C:\Users\Admin\AppData\Roaming\future\grotesque.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4860
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
          PID:3688

    Network

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\future\grotesque.exe

      Filesize

      374KB

      MD5

      cf1d4e849a0df3ba1f2bd4a9bf4001d4

      SHA1

      a4847d6169567d3158dd7f6940a3ea2d83a907fa

      SHA256

      bdb45e8724ea61648e4da7d25f07d922d6aaad7a00d772d06d2ef02e5276c741

      SHA512

      4deb20f07df4dcf108bcffe6422ea571682dc3cdc50044d3239aef927a19c2ad436fa58184c54b8d693c33d2777771df0a3a31afba52b2871fba51a1c436e8d6

    • memory/3688-24-0x0000000000400000-0x0000000000466000-memory.dmp

      Filesize

      408KB

    • memory/3688-23-0x0000000000400000-0x0000000000466000-memory.dmp

      Filesize

      408KB

    • memory/3688-20-0x0000000000400000-0x0000000000466000-memory.dmp

      Filesize

      408KB

    • memory/3688-19-0x0000000000400000-0x0000000000466000-memory.dmp

      Filesize

      408KB

    • memory/4860-8-0x0000000074B20000-0x00000000750D1000-memory.dmp

      Filesize

      5.7MB

    • memory/4860-9-0x0000000074B20000-0x00000000750D1000-memory.dmp

      Filesize

      5.7MB

    • memory/4860-10-0x0000000074B20000-0x00000000750D1000-memory.dmp

      Filesize

      5.7MB

    • memory/4940-18-0x0000000074B20000-0x00000000750D1000-memory.dmp

      Filesize

      5.7MB

    • memory/4940-17-0x0000000074B20000-0x00000000750D1000-memory.dmp

      Filesize

      5.7MB

    • memory/4940-16-0x0000000074B20000-0x00000000750D1000-memory.dmp

      Filesize

      5.7MB

    • memory/5192-15-0x0000000074B20000-0x00000000750D1000-memory.dmp

      Filesize

      5.7MB

    • memory/5192-14-0x0000000074B20000-0x00000000750D1000-memory.dmp

      Filesize

      5.7MB

    • memory/5192-0-0x0000000074B22000-0x0000000074B23000-memory.dmp

      Filesize

      4KB

    • memory/5192-13-0x0000000074B22000-0x0000000074B23000-memory.dmp

      Filesize

      4KB

    • memory/5192-2-0x0000000074B20000-0x00000000750D1000-memory.dmp

      Filesize

      5.7MB

    • memory/5192-1-0x0000000074B20000-0x00000000750D1000-memory.dmp

      Filesize

      5.7MB