Overview
overview
10Static
static
100a36d74a14...04.exe
windows10-2004-x64
80b8b9525ea...96.exe
windows10-2004-x64
10bcbf39901...03.exe
windows10-2004-x64
100e5e999136...e7.exe
windows10-2004-x64
100fc0de254b...ce.exe
windows10-2004-x64
101a47c4fd5a...a8.exe
windows10-2004-x64
71a6ed538d9...ed.exe
windows10-2004-x64
71ac9b17068...d7.exe
windows10-2004-x64
81be6fdb2df...e9.exe
windows10-2004-x64
102bbbb9b0cd...b2.exe
windows10-2004-x64
102cda90e9e8...33.exe
windows10-2004-x64
32d58b1a373...aa.exe
windows10-2004-x64
52e966d3480...2e.exe
windows10-2004-x64
73a0297561d...1c.exe
windows10-2004-x64
103a90ad3258...8d.exe
windows10-2004-x64
63e76598b80...50.exe
windows10-2004-x64
104a5b5eb5a4...36.exe
windows10-2004-x64
104b482e8492...8c.exe
windows10-2004-x64
64bd46a2850...9c.exe
windows10-2004-x64
104cca8b360d...0a.exe
windows10-2004-x64
104e31114ffd...f7.exe
windows10-2004-x64
105ac2fcc4da...83.exe
windows10-2004-x64
105b25182d96...14.exe
windows10-2004-x64
75ddb366ead...46.exe
windows10-2004-x64
95f1364d246...bc.exe
windows10-2004-x64
106e0c9935ea...65.exe
windows10-2004-x64
16ea27426ff...08.exe
windows10-2004-x64
47dad12bd22...d2.exe
windows10-2004-x64
87db9e09e8b...71.exe
windows10-2004-x64
37e9af10bfe...5a.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2025, 08:20
Behavioral task
behavioral1
Sample
0a36d74a1458e8ca334d0c8169ec320e9d7735853a4c0c74660b578a13ee3104.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
0b8b9525ead4b3ebf6e5ba923057432a809d70b8beecb07df329ad23bf5a0c96.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
0bcbf399011c69a1690f596d2b607eb835ea55e7fc9b4e8a160cd49e0713af03.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
0e5e9991361cc4228bbb1f7c531379f52c2dd8e353af3f27b0d87a2c0d75b4e7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
0fc0de254bc80e54c708fbd0eb0460c730283508b94108e4b2d1d70525ef3fce.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral6
Sample
1a47c4fd5aa52c954123b3871ed1e6cdacf81b1d18e8281d1b0ab304133ee3a8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral8
Sample
1ac9b17068a19f093e347bafa92112dc8f1a935ba176aadbf58e57f35e4beed7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
1be6fdb2df40e128e25bd4959ae3fa83c634ced9f51ab2994c209dcadc9adde9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral10
Sample
2bbbb9b0cdbb3a1f26ce3357d9119edf008e4894c881351f89989a67d0a192b2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
2cda90e9e87c9db37ba5015909a7efb45fbe3a351ec9ca7a5359204e801dcb33.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral12
Sample
2d58b1a3735269002d5499c67bd32c3b800fd1c44ca78d19ac3d21df84832faa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
2e966d34801be95eae9a7f1dd5efe3885c234c473d377185f3b7af4dbbb99d2e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
3a0297561d1cab1471cd84e4c5308f19a9a33606784938235c7ff2eaa85d001c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
3a90ad325806107cadbd87ed4825ff967c3535e74433ab04fa6ff30b512b818d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral16
Sample
3e76598b8086857c38e2016dc729fa4879136e46b6f5962ff0b042ef35666b50.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral17
Sample
4a5b5eb5a4e1ba423df24c110fc43f7b3428d2126e99fd9c170b9dfb2baf7236.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral18
Sample
4b482e8492e8c1943330745899214b29bfd2582000371243400d854838dfb88c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
4bd46a2850788e5697d214dd4409c063b6f9c38c886443211f22fb0ff19bff9c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral20
Sample
4cca8b360d5053a789ea822ab80261dc6f010c1c72b0d449ca8cdcaffd2e2c0a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral22
Sample
5ac2fcc4daab08132ad947ffedcf88286f2af526a260111f3ae00de9ba0a6283.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
5b25182d96ac6fca82ecb8f99198295f45bf8fceea3fb196beb2a4e7bc862714.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
5ddb366eada77b037e23b02034be67099372dad8ab32668381290af66ec4ba46.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
5f1364d24646f22acc7127263adfb401a9c3a4655f9ecb085f931ebc9aaf61bc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral26
Sample
6e0c9935ea61a09f4ced2b9a871b5f21b637a7979b21aa4ccb490a9442182865.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral27
Sample
6ea27426ff47b4abd8a8e53f7d3452c981aa6fe86ca07ef15e45f6f8fcae3108.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral28
Sample
7dad12bd22c31f2618cc56cbd738f1cce5afaea128fcfe1deb18f4ac7366c9d2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
7db9e09e8bdcc45eafbb75b83d57503d11bf54d96c9eaa003fe8e5d518180571.exe
Resource
win10v2004-20250314-en
General
-
Target
1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed.exe
-
Size
1.7MB
-
MD5
0cc5dc97283bfeee413467481e6822b4
-
SHA1
e60240c37dc62b6ae1795583cab43dc10bb9dce0
-
SHA256
1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed
-
SHA512
e2794ef5d4abb23ba09ad1e9884c0463dff0ac43608f1b30053949727fafdca957ad2980bb43f655940eaf215f0ac52e37f90369aa621033b4c775875cc008b0
-
SSDEEP
24576:9lXvnqqFQJLYYC2TU6oH+gyFlbUscwL4ie+JwcIKIgYbK1uV9279NAl5Q9AxJ//F:zfKq0lbUscwkp+jmcVg3Uha
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed.exe -
Executes dropped EXE 2 IoCs
pid Process 2352 [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.exe 4900 [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp -
Loads dropped DLL 5 IoCs
pid Process 4900 [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp 4900 [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp 4900 [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp 4900 [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp 4900 [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2352 1148 1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed.exe 89 PID 1148 wrote to memory of 2352 1148 1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed.exe 89 PID 1148 wrote to memory of 2352 1148 1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed.exe 89 PID 2352 wrote to memory of 4900 2352 [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.exe 90 PID 2352 wrote to memory of 4900 2352 [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.exe 90 PID 2352 wrote to memory of 4900 2352 [FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed.exe"C:\Users\Admin\AppData\Local\Temp\1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\[FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.exe"C:\Users\Admin\AppData\Local\Temp\[FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\is-ABLNT.tmp\[FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp"C:\Users\Admin\AppData\Local\Temp\is-ABLNT.tmp\[FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp" /SL5="$5004E,722115,152064,C:\Users\Admin\AppData\Local\Temp\[FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4900
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c2a1bd6ace6cdb4b8de1b120e2b39e4f
SHA1a75cfe74a7ff7574b1e3b494d9e56bd527eb0074
SHA256e8ca4938e08021e1db3ac1bbf498ceca3c21264584360c3101f7a5664d966423
SHA512640c9b9dc2653183c1ab8477688962307ebb73032d1b71caadbe50d530bb4e19ce98095b7f11ae70c7aafc251da68533ba0c9aa52faa7123573a1c1661a09b5a
-
Filesize
283B
MD590f0484dfa4b0d62268e627534de6d17
SHA173b9a68c79aa94b4eb53af9aeb69df7c202cd2f5
SHA25693d72ea06c6548904e9a99f3e538bd8d9e74153ba2ad39c277bf4a043b09f712
SHA5120f1539774ef15b399c07d4161d3da7b9a8ba0dda25287aba06ab8e48b9ff839bb5e793b77ed341efd8a81fd7a8953e5e2251e98bbd609668ea23daad71a22022
-
C:\Users\Admin\AppData\Local\Temp\is-ABLNT.tmp\[FreeTP.Org]Enshrouded-Multiplayer-Fix-Online-v1.2.tmp
Filesize1.4MB
MD57300211c571951be86be6c6f8cdfc09d
SHA15464e16689003406513c7677b3d970f673551d18
SHA256e77c3184d90f6e7a1276bb8389aba06296be97deb2e8a3433ca9a537538696da
SHA5129c340edcd63c87565a9de26892d2e83647798583cc942bf608b54e86b8fd36bc2ad64421241b88f0a0682e7c006a5af712e62d3231ca5a81264d8b1a1905ebb4
-
Filesize
7KB
MD5abd301b0263b0e0cebdd71e4855ac7d3
SHA11e8480c3f3b47a5daa7cb1183b6a7a49998cda6e
SHA256aff003e75bbf410ed2f7ca8728afe01ab4a517536647ad20109d00c4adf570d5
SHA512b5abb188bd23d7fc2e3253a5639cc3eba6d21774dba55b43395cf84ddb49fe707ad54dc0a7f157e6b0804c1662d9c4cb4bef2787aafb194ea73fbebd1a63bb6b
-
Filesize
62KB
MD5b91658597f15d7f689c86f5a2e7824bd
SHA100da609aa0b39140b767a3bc2644433d64edbd71
SHA256b3cda6ab45ad5aa6a0a5f700d2c8987b3c1c1ebda63165d9bd5a566b24dcbd84
SHA51200b287fb14b947edf4b16d52243e9a992595d8894e83d8590473103d1b54a4670b323db13c4f78234617c44f905baf517e68fcceaad313f3ea7cd44cf036daea
-
Filesize
32KB
MD5295832fa6400cb3407cfe84b06785531
SHA17068910c2e0ea7f4535c770517e29d9c2d2ee77b
SHA25613e372c4d843603096f33603915c3f25d0e0d4475001c33ce5263bfcd1760784
SHA51250516f9761efd14641f65bd773cfdd50c4ab0de977e094ba9227796dc319d9330321c7914243fc7dc04b5716752395f8dac8ccdfdb98ba7e5f5c1172408ce57b
-
Filesize
12KB
MD551af4120d6d22b1126cc87a5143740ef
SHA11cb4e91e765537a72c9628056d29fbd6a7ce515c
SHA256c74fed62141f7e666379a0b00d5b39c86975332cf08151cbe8cab88eff2c393c
SHA5122595be954684ca34bc9284337524a5191c72fbea46b59555a5113ed8404a1e7ab6c2aa0f5a975f832cccdd8934ff1140c679ecd940f31cc14b4c3a362a225cbc
-
Filesize
76KB
MD52e35d2894df3b691dbd8e0d4f4c84efc
SHA1d0fc14963e397d185e9f2d7dea1d07bc6308d5b9
SHA256869079ba362cbc560d673db290248ec2aa075a74f22a82d90621f1118f8e1c4d
SHA51229ba662ab2e77aef0547ff76213a1b6ef52be27a446923790a27cf8b69377621048387dbb9f22001b6d15837dddada84c7350614ec9622258319658822705f90
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b