Resubmissions

14/04/2025, 07:51

250414-jp1kfssjz9 10

14/04/2025, 07:46

250414-jl9nyssjt9 10

08/04/2025, 15:58

250408-tevasswl18 10

08/04/2025, 14:19

250408-rm2nqsvqw2 10

Analysis

  • max time kernel
    8s
  • max time network
    10s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2025, 14:19

Errors

Reason
Machine shutdown

General

  • Target

    f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5.exe

  • Size

    373KB

  • MD5

    1390a05960fe6acd3fd25279513346f0

  • SHA1

    c65393f72d9e00c770ba3ef393701bc87e13b938

  • SHA256

    f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5

  • SHA512

    90c3d8d61687e3bccd9e6e15f6c5f3db6770471878b452f9a11874ea70391eac5639424fd3f4a03de7729d642355fb2e6e0c4e65e3e4765cb76111a7b2de5bcc

  • SSDEEP

    6144:tyMIULPy/x3xUArN62f7GU7njrbma/3LaQURrM2TuP6zJcW:XDy/xhUAtf7tjrbma7OJxuSzp

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5.exe
    "C:\Users\Admin\AppData\Local\Temp\f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    PID:684
    • C:\Users\Admin\AppData\Roaming\future\grotesque.exe
      "C:\Users\Admin\AppData\Roaming\future\grotesque.exe"
      2⤵
        PID:5024
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\future\grotesque.exe
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:5868
      • C:\Users\Admin\AppData\Roaming\future\grotesque.exe
        C:\Users\Admin\AppData\Roaming\future\grotesque.exe
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4944
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          3⤵
            PID:1324

      Network

      MITRE ATT&CK Enterprise v16

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\future\grotesque.exe

        Filesize

        374KB

        MD5

        baa7fee4c28bb967b6091d9f7bf3b0e5

        SHA1

        6b469dadf17a494b05df1cb950bd1759b1251c8c

        SHA256

        343d5fd2be5f006cde5d194986cfcc1c7cfbe81e08c773152d5ce25b0b966eee

        SHA512

        bf6312d8c61b5f977b944e6fffbba505e7b8544cfe7edc6d1f9cedde5eaf060d6521f3fe8e7b37f093293798c9c8bc9ab7210d125cce356dc2f6a040496e4af7

      • memory/684-14-0x0000000074780000-0x0000000074D31000-memory.dmp

        Filesize

        5.7MB

      • memory/684-1-0x0000000074780000-0x0000000074D31000-memory.dmp

        Filesize

        5.7MB

      • memory/684-2-0x0000000074780000-0x0000000074D31000-memory.dmp

        Filesize

        5.7MB

      • memory/684-0-0x0000000074782000-0x0000000074783000-memory.dmp

        Filesize

        4KB

      • memory/684-13-0x0000000074782000-0x0000000074783000-memory.dmp

        Filesize

        4KB

      • memory/1324-22-0x0000000000400000-0x0000000000466000-memory.dmp

        Filesize

        408KB

      • memory/1324-19-0x0000000000400000-0x0000000000466000-memory.dmp

        Filesize

        408KB

      • memory/1324-18-0x0000000000400000-0x0000000000466000-memory.dmp

        Filesize

        408KB

      • memory/4944-9-0x0000000074780000-0x0000000074D31000-memory.dmp

        Filesize

        5.7MB

      • memory/4944-10-0x0000000074780000-0x0000000074D31000-memory.dmp

        Filesize

        5.7MB

      • memory/4944-8-0x0000000074780000-0x0000000074D31000-memory.dmp

        Filesize

        5.7MB

      • memory/5024-16-0x0000000074780000-0x0000000074D31000-memory.dmp

        Filesize

        5.7MB

      • memory/5024-17-0x0000000074780000-0x0000000074D31000-memory.dmp

        Filesize

        5.7MB

      • memory/5024-15-0x0000000074780000-0x0000000074D31000-memory.dmp

        Filesize

        5.7MB