Overview
overview
10Static
static
100a36d74a14...04.exe
windows10-2004-x64
80b8b9525ea...96.exe
windows10-2004-x64
10bcbf39901...03.exe
windows10-2004-x64
100e5e999136...e7.exe
windows10-2004-x64
100fc0de254b...ce.exe
windows10-2004-x64
101a47c4fd5a...a8.exe
windows10-2004-x64
71a6ed538d9...ed.exe
windows10-2004-x64
71ac9b17068...d7.exe
windows10-2004-x64
81be6fdb2df...e9.exe
windows10-2004-x64
102bbbb9b0cd...b2.exe
windows10-2004-x64
102cda90e9e8...33.exe
windows10-2004-x64
32d58b1a373...aa.exe
windows10-2004-x64
52e966d3480...2e.exe
windows10-2004-x64
73a0297561d...1c.exe
windows10-2004-x64
103a90ad3258...8d.exe
windows10-2004-x64
63e76598b80...50.exe
windows10-2004-x64
104a5b5eb5a4...36.exe
windows10-2004-x64
104b482e8492...8c.exe
windows10-2004-x64
64bd46a2850...9c.exe
windows10-2004-x64
104cca8b360d...0a.exe
windows10-2004-x64
104e31114ffd...f7.exe
windows10-2004-x64
105ac2fcc4da...83.exe
windows10-2004-x64
105b25182d96...14.exe
windows10-2004-x64
75ddb366ead...46.exe
windows10-2004-x64
95f1364d246...bc.exe
windows10-2004-x64
106e0c9935ea...65.exe
windows10-2004-x64
16ea27426ff...08.exe
windows10-2004-x64
47dad12bd22...d2.exe
windows10-2004-x64
87db9e09e8b...71.exe
windows10-2004-x64
37e9af10bfe...5a.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2025, 08:25
Behavioral task
behavioral1
Sample
0a36d74a1458e8ca334d0c8169ec320e9d7735853a4c0c74660b578a13ee3104.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
0b8b9525ead4b3ebf6e5ba923057432a809d70b8beecb07df329ad23bf5a0c96.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
0bcbf399011c69a1690f596d2b607eb835ea55e7fc9b4e8a160cd49e0713af03.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
0e5e9991361cc4228bbb1f7c531379f52c2dd8e353af3f27b0d87a2c0d75b4e7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
0fc0de254bc80e54c708fbd0eb0460c730283508b94108e4b2d1d70525ef3fce.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral6
Sample
1a47c4fd5aa52c954123b3871ed1e6cdacf81b1d18e8281d1b0ab304133ee3a8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
1a6ed538d9ee30c5d1988968896c7028f99b24f43e5abbae96cc63281bcd8bed.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral8
Sample
1ac9b17068a19f093e347bafa92112dc8f1a935ba176aadbf58e57f35e4beed7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
1be6fdb2df40e128e25bd4959ae3fa83c634ced9f51ab2994c209dcadc9adde9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral10
Sample
2bbbb9b0cdbb3a1f26ce3357d9119edf008e4894c881351f89989a67d0a192b2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
2cda90e9e87c9db37ba5015909a7efb45fbe3a351ec9ca7a5359204e801dcb33.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral12
Sample
2d58b1a3735269002d5499c67bd32c3b800fd1c44ca78d19ac3d21df84832faa.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
2e966d34801be95eae9a7f1dd5efe3885c234c473d377185f3b7af4dbbb99d2e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
3a0297561d1cab1471cd84e4c5308f19a9a33606784938235c7ff2eaa85d001c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
3a90ad325806107cadbd87ed4825ff967c3535e74433ab04fa6ff30b512b818d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral16
Sample
3e76598b8086857c38e2016dc729fa4879136e46b6f5962ff0b042ef35666b50.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
4a5b5eb5a4e1ba423df24c110fc43f7b3428d2126e99fd9c170b9dfb2baf7236.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral18
Sample
4b482e8492e8c1943330745899214b29bfd2582000371243400d854838dfb88c.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
4bd46a2850788e5697d214dd4409c063b6f9c38c886443211f22fb0ff19bff9c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral20
Sample
4cca8b360d5053a789ea822ab80261dc6f010c1c72b0d449ca8cdcaffd2e2c0a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
4e31114ffd1000c0242b7537d6329641dc0457dcd6590c57659326a1785ce2f7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral22
Sample
5ac2fcc4daab08132ad947ffedcf88286f2af526a260111f3ae00de9ba0a6283.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
5b25182d96ac6fca82ecb8f99198295f45bf8fceea3fb196beb2a4e7bc862714.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
5ddb366eada77b037e23b02034be67099372dad8ab32668381290af66ec4ba46.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral25
Sample
5f1364d24646f22acc7127263adfb401a9c3a4655f9ecb085f931ebc9aaf61bc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral26
Sample
6e0c9935ea61a09f4ced2b9a871b5f21b637a7979b21aa4ccb490a9442182865.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
6ea27426ff47b4abd8a8e53f7d3452c981aa6fe86ca07ef15e45f6f8fcae3108.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral28
Sample
7dad12bd22c31f2618cc56cbd738f1cce5afaea128fcfe1deb18f4ac7366c9d2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
7db9e09e8bdcc45eafbb75b83d57503d11bf54d96c9eaa003fe8e5d518180571.exe
Resource
win10v2004-20250314-en
General
-
Target
7dad12bd22c31f2618cc56cbd738f1cce5afaea128fcfe1deb18f4ac7366c9d2.exe
-
Size
1010KB
-
MD5
eb217b0ac055b81266b477fe13e1676f
-
SHA1
5347d74cd3021717c3d67105648f325613df0782
-
SHA256
7dad12bd22c31f2618cc56cbd738f1cce5afaea128fcfe1deb18f4ac7366c9d2
-
SHA512
6f38c118961844c7afa13bfe81a6d40de90bee23f5933a6949495db66a196372b224f676a6ecfca135fb9e6666e2b096e27b1be33adbf95cbed2c89361af8c38
-
SSDEEP
24576:OA/GdQEfRiHN7iaqCavgYCkS/Tfc8DvGyHa/d:OqEp6tKyX/TTHe
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 29 4712 DAsap.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation DAsap.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DownloadAsap.lnk DAsap.exe -
Executes dropped EXE 2 IoCs
pid Process 2828 DAsap.exe 4712 DAsap.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dad12bd22c31f2618cc56cbd738f1cce5afaea128fcfe1deb18f4ac7366c9d2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DAsap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DAsap.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 4712 DAsap.exe 4712 DAsap.exe 4712 DAsap.exe 4712 DAsap.exe 4712 DAsap.exe 4712 DAsap.exe 4712 DAsap.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 4712 DAsap.exe 4712 DAsap.exe 4712 DAsap.exe 4712 DAsap.exe 4712 DAsap.exe 4712 DAsap.exe 4712 DAsap.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4992 wrote to memory of 2828 4992 7dad12bd22c31f2618cc56cbd738f1cce5afaea128fcfe1deb18f4ac7366c9d2.exe 87 PID 4992 wrote to memory of 2828 4992 7dad12bd22c31f2618cc56cbd738f1cce5afaea128fcfe1deb18f4ac7366c9d2.exe 87 PID 4992 wrote to memory of 2828 4992 7dad12bd22c31f2618cc56cbd738f1cce5afaea128fcfe1deb18f4ac7366c9d2.exe 87 PID 2828 wrote to memory of 4712 2828 DAsap.exe 91 PID 2828 wrote to memory of 4712 2828 DAsap.exe 91 PID 2828 wrote to memory of 4712 2828 DAsap.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dad12bd22c31f2618cc56cbd738f1cce5afaea128fcfe1deb18f4ac7366c9d2.exe"C:\Users\Admin\AppData\Local\Temp\7dad12bd22c31f2618cc56cbd738f1cce5afaea128fcfe1deb18f4ac7366c9d2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\SFX20250409082538804\DAsap.exe"C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\SFX20250409082538804\DAsap.exe" -entry2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Centralx\DAsap\DAsap.exe"C:\Users\Admin\AppData\Local\Centralx\DAsap\DAsap.exe"3⤵
- Downloads MZ/PE file
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4712
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5b4c28f8d7afb680328d007be1214eaef
SHA1963e66857fab9f2a662cd09db9812119919e0218
SHA25638b8b0898ac19c5843cca47084902f06f209a0531e9eb80b1aac819e34055f01
SHA5128d9438664939eba1dbba33a97f3ff9a9169d618f566f1c7b8572f0a7c6a831d3979e4bb0f407d2c41adfd2841655e17d9c0d54facd30cac83218dca90a089468
-
Filesize
102KB
MD5272af2fb09e12d721f28b19f0a2bab17
SHA158da01ea4f739ab0aa30306e0a6f47ede8a3a54d
SHA25635621e28c2cd5cc8e335e0ad3e7a4be98c49b58513a6a0ecbda6f618e7d6acf4
SHA51290cbaa963d0c5d24f8847415d5aeb832131228ddcaf3759d06e9ec95acd54cb17cf496f3b4f051af933fc54e28cab0dcc7a622d082f3f6aa43938800041f0e97
-
Filesize
83KB
MD5af7f3fe20c37c962b95556919420baea
SHA152d7e93c0885c0560bc8ac8daf7bdd98a4173e52
SHA25611028e7f437d63e3bf0274679598ce5b44fe54102049335d75654d24ae1b553e
SHA5129ec42c60fe5f25e45c4a276873b1fd026acaae18fb223fe03f8d826e7169057358843c81595acca457e47d5ab9be02a2327277424cc5704d7a39311b69141c89
-
Filesize
2KB
MD5bfa45cf04985c5a164d9c762df55752a
SHA1e467e2f6ed5a4d2c8ab9cf214abad8bd02554a69
SHA2565a9fdeec5c8f3fbadd7badd1c914cef6331ed9b5c5808702d06e1ae6cd5add84
SHA5123c3f288437563354c773fa687cfa0b9c492fdee06676bb3104f596d5cfe36a5be26de03c0e7fbae5418cdc1c1cfcd86cfb17a8f692bc97631227bf5bf9f32c2b
-
Filesize
2KB
MD57efac2ff9807ca59d3b41825ee89c52a
SHA1c746da2b7d1b690d9866fc8a8fb27e29de7b25a0
SHA2563e39a0fc735517f8692fd30ba8ce4cbe0379fddf05bdd49ff2201f348732896d
SHA51299823035045eaa90855d60cbec450fd97b1cb54e6de01ccdb8ac9f7d2123a8681ff700f69dbaf509b559cca1fecfb1926aa3f33d75b29a2919e9f87fb0c77751
-
Filesize
2KB
MD5f72507e530019cdcd3084b5142dce140
SHA16e6fcf12f0e854fe09d4b0f5439f564e0f5b4051
SHA2564a84310128b2fa239b49e960b414fa994f1e3119b5ef578d09d5bd0e8d727e52
SHA5120af8ac6f9f306f3ab45bcb6da09ed4d79e942c0be77bc1b56f39482c3168ab801c585951f5d90b8c9e285101693e54ff5016f6e9d4069390992b1a1d6b8c0ea4
-
Filesize
2KB
MD5c862f0186231e33bc13b6286775c7c2b
SHA1a246257ee7632fc592f8342f15cb2d3ce9f17129
SHA25692a4038fc61917a6ba050241f7120e34328f26fd73d9b21cf8aa8880eb29dce7
SHA5128f649194fda531eb8ea2e44593d1a7f6fd0876e8bda14a98f4357a4e847902c24093059e49bd549ebe079e95d9deaf6e34038ec8430b7797467bd39b25d86da8
-
Filesize
2KB
MD5030171b14a1acf6411f3fd08e6f5b18f
SHA1b3ad9de45c6e0889291a9e810c1b400d8a4a87ef
SHA2569bc89788ce080537d48ae2f3a7f698938d0e7e7b4474b6630deec1ec82f514c2
SHA512b69c18e34b42c049f45b0549f5e3900b4c1369450681af3dbf9a1e173798061399e8f2079dfd9a9fece629695f18f63b8bdf74e5a01ebe1e7cecb82bf844bf87
-
Filesize
2KB
MD5dfd765007e4e17a719498c4c639b3007
SHA150bf58f8a3b45c1f8dd61c2db24bcee86325a362
SHA256d045d6c06d4d326b27b5c271e56494a4d379e7bd938ec09c5e32a23718f6ea04
SHA5120e542820c8db1836d0d8bd5a2378dc16b2ccb4a2589b9ba01075b55327ce3eb7de16fd9a0fb8f76345605c49a840a621fff6839aa6cf40a742bf605a68c4d717
-
Filesize
2KB
MD592dc0a28d2946d746c796500c9d0a936
SHA110a8c099b90527b8b3a126f193126b4d43648c8d
SHA2560d6600762b93b63c901edb3de8fc0bb3cead28b0bd14034dc9a34a5b492cbaa0
SHA512c86d3b0ccf369000f1f1e23ca9cf105d62088e2f97f1e0e3f1563443304ccf29fdc6a14eb85c10bbf92793cc8351694b42795a35f49bf4e8a5879a61e129d31b
-
Filesize
2KB
MD58f22b3781b10998d58cbcad79d42c617
SHA17e9ddcfea550fae2c7353a987e32f39ddea27766
SHA2569d7a18c063e85ee6298597020104fb5c46508d35e989d71cb2934478072a80f6
SHA512d4b9a012fb9656cbf6eefad422d6f14964d9a962c62c258c13362b32aabe8dafdefd2a4ccee39ae0742d9bbc7341b38b5cee0d3d3628d95203975ba7512b2a64
-
Filesize
2KB
MD541229014a9c2c2b55f2906c1cf2f43bf
SHA1b80e94d3554f46b5560c1600e9be199eb26c46e6
SHA256d62500353b078cedd9826f19a0ba74a013295de2769f435c50105bb1bc56456e
SHA512a0fe391f9c25a68062a8e8976308e5441f3e3207539970dd92876a1556139257ae69d007502ba4168c55f32b56d74d5acd6c3bcf5f2e7242e5949e319a733b3f
-
Filesize
2KB
MD50edeb389329352b686e2631306bdb85f
SHA150a7d33195f89de229c561fa4bc5fedd0775e759
SHA256bc648eb4aa35451696de38fffd7c5b9598282bc873a0d913134b1f639d7a2a9a
SHA5121b24791a77608c96de77b7ed997302105928e5b73de0aafc5db2c4da2e7d7cc0a4120183aabd6682b6ac1af672586fe7e172b356b9508904171c6d45f6b044af
-
Filesize
2KB
MD5174397568a2320bdb7a8a41822e8b0f6
SHA16aa1c6e8a82cc3f805a380ea11d40350598fad62
SHA256c52789596a0417b47f59c06f0aca8326dec9b25967663333171c27d3ce330c24
SHA5123139e0c124ccaadb45f4c2b4f5c3ca192c1b2627da54059ed2e4ecd06ffd87e65a0bc1cd0a09e85902e020da209e505fa2203190cb924aa55680e50f9f5d36b6
-
Filesize
2KB
MD5f70fd966a4f12a6f4d8fec61f899dff5
SHA1e1804598f13bb132a767d5f9927f16ae1ad4adbe
SHA256112f8655931476e562f561882feab66babeb787d452fe5f1cbc99deee02f5d9b
SHA5123be810c9c88e256cb5b4ebfa0c013b9f3cbf1fc865513baaa06993ff0f049a6ba0f40c3723228a7f73559cd4b8256c872c17a6d042223fbd6a2936328e682ea4
-
Filesize
2KB
MD507f02ab74ba50639ddab995495227baa
SHA1ea6f1d29eff03c35f554acb268d3ce355caf50c4
SHA256065da02064b504f0555429455e2e3451af77c894c8bdb77fdd8d524d6781af19
SHA512c0c8cfe2e4b6fc1b3849b6a1e50d2c36b4b22cae41e11bb6b3c2ee4968e9c4fb94d65051f27b04bfc9f453160bd4439c1a198933c37eab67c48bd97757a4e69c
-
Filesize
2KB
MD57156b347ab52b4dd651f02891142dea0
SHA1e4f27cd32c15824b7c897d316d70efa01e946258
SHA2569352ebeac05449ce0d3d6f1dd6bdae2f876d6106f073d4555fbfc4435cb4eefc
SHA51278974112db5dbff8ed3ccf4d418906307786bb3c4d2d0b27095af205fc2ac3ce831f4a1162749cd083a61bc1a825c5eefa55eb7c61935e333741239261a03e77
-
Filesize
1.2MB
MD5c4e2cff7a8f6fcb920671c4741f86361
SHA138626d0d1b7e93460bbf5af11263f2e4e6de2f40
SHA25642efc2a700c8efe9754b1746532a8f92c0f017aec5efb867ec4f10b291f1dd23
SHA51221afe116e2292031b17fecdf7d2cd597c34d585bbe664c5554aee9b246f15c06c9f45822f1548a5b5089e7938109a040b0d4b7da5c6df6f2008fcd5a57e113db