Overview
overview
10Static
static
10f5ae5532f1...b5.exe
windows11-21h2-x64
10f5cb51ffdb...c0.exe
windows11-21h2-x64
10f5ed127464...bc.exe
windows11-21h2-x64
10f62837f3bc...7a.exe
windows11-21h2-x64
10f628fa20e8...3b.exe
windows11-21h2-x64
10f640f01e80...c5.exe
windows11-21h2-x64
7f66fa3036e...07.exe
windows11-21h2-x64
7f68f044685...50.exe
windows11-21h2-x64
3f6ac1ea5c1...25.exe
windows11-21h2-x64
8f6b7978847...1a.exe
windows11-21h2-x64
7f6e2978004...35.exe
windows11-21h2-x64
10f721adec82...71.exe
windows11-21h2-x64
10f736c152b3...c8.exe
windows11-21h2-x64
10f780377dd9...c9.exe
windows11-21h2-x64
7f7a96bf083...c8.exe
windows11-21h2-x64
1f812ad48d0...9b.exe
windows11-21h2-x64
10f8173be0fb...a4.exe
windows11-21h2-x64
1f835ddaf49...d7.exe
windows11-21h2-x64
10f846950431...1c.exe
windows11-21h2-x64
10f89219b77e...00.exe
windows11-21h2-x64
10f8a3f1d5a1...b0.exe
windows11-21h2-x64
10f908d30321...39.exe
windows11-21h2-x64
10f926cc363c...a8.exe
windows11-21h2-x64
10f947bf8f07...dd.exe
windows11-21h2-x64
10f97418dbfc...06.exe
windows11-21h2-x64
7f98ee08aed...cc.exe
windows11-21h2-x64
10f990d850e1...f8.exe
windows11-21h2-x64
8f99ae4a378...93.exe
windows11-21h2-x64
10f9a573b21a...18.exe
windows11-21h2-x64
10fa0d8e0c80...8e.exe
windows11-21h2-x64
10fa8e531e08...84.exe
windows11-21h2-x64
10fa942bbb98...d7.exe
windows11-21h2-x64
10Resubmissions
14/04/2025, 07:51
250414-jp1kfssjz9 1014/04/2025, 07:46
250414-jl9nyssjt9 1008/04/2025, 15:58
250408-tevasswl18 1008/04/2025, 14:19
250408-rm2nqsvqw2 10Analysis
-
max time kernel
100s -
max time network
106s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/04/2025, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
f5ae5532f18462594d061ae3bdf732b5.exe
Resource
win11-20250410-en
Behavioral task
behavioral2
Sample
f5cb51ffdb87e6d78da4a60b2a83a2c0.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
f5ed1274646abc95fd8b87f43adcadbc.exe
Resource
win11-20250410-en
Behavioral task
behavioral4
Sample
f62837f3bc66012b94d74cc471f3d97a.exe
Resource
win11-20250410-en
Behavioral task
behavioral5
Sample
f628fa20e85aaf1cc562cfd512392d3d12da2ef70adc31068f1e3d7f2b0a4f3b.exe
Resource
win11-20250410-en
Behavioral task
behavioral6
Sample
f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5.exe
Resource
win11-20250411-en
Behavioral task
behavioral7
Sample
f66fa3036e662d8f7ccce8795fb8b907.exe
Resource
win11-20250410-en
Behavioral task
behavioral8
Sample
f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe
Resource
win11-20250410-en
Behavioral task
behavioral9
Sample
f6ac1ea5c19284854998f25244a12f25.exe
Resource
win11-20250410-en
Behavioral task
behavioral10
Sample
f6b79788476c3806befcdd2dead8231a.exe
Resource
win11-20250410-en
Behavioral task
behavioral11
Sample
f6e297800457d823c0597e833d555135.exe
Resource
win11-20250410-en
Behavioral task
behavioral12
Sample
f721adec82fb8994517719b69e8aa337d4619879e64cbd2fd80fc4e190e22c71.exe
Resource
win11-20250410-en
Behavioral task
behavioral13
Sample
f736c152b3d1812f1142ed0da99e0ac8.exe
Resource
win11-20250410-en
Behavioral task
behavioral14
Sample
f780377dd90d33c8280734d882fc2ac9.exe
Resource
win11-20250410-en
Behavioral task
behavioral15
Sample
f7a96bf0830c5f7513d65086e0f7eb6679565b6ffdc6d1e325ee21303b38fec8.exe
Resource
win11-20250410-en
Behavioral task
behavioral16
Sample
f812ad48d0a6d53611389e30fd8ae9f80a245fe3360b52dc833f6bf7b7b7859b.exe
Resource
win11-20250411-en
Behavioral task
behavioral17
Sample
f8173be0fb3bebc0120e2cb017eb9922adebbb430734d0363e2d38e28ee47ea4.exe
Resource
win11-20250410-en
Behavioral task
behavioral18
Sample
f835ddaf4933c7bd4a3aa1f015442bb48b69f863f467dd8d1db09e6f2a427fd7.exe
Resource
win11-20250410-en
Behavioral task
behavioral19
Sample
f846950431f463a0a7e663ea7003e31c.exe
Resource
win11-20250410-en
Behavioral task
behavioral20
Sample
f89219b77e5fde5a7a1581e3e4cc0b00.exe
Resource
win11-20250410-en
Behavioral task
behavioral21
Sample
f8a3f1d5a1d18a666d9b81a974e212b0.exe
Resource
win11-20250410-en
Behavioral task
behavioral22
Sample
f908d30321810e4c87131f6fea397e39.exe
Resource
win11-20250410-en
Behavioral task
behavioral23
Sample
f926cc363c27c542c23e14398096eda8.exe
Resource
win11-20250410-en
Behavioral task
behavioral24
Sample
f947bf8f07543c9beae3fdba615ba1dd.exe
Resource
win11-20250410-en
Behavioral task
behavioral25
Sample
f97418dbfcdd3f6d26c6cad46d16ec06.exe
Resource
win11-20250411-en
Behavioral task
behavioral26
Sample
f98ee08aed6b41b1f9e6e1ca752d22cc.exe
Resource
win11-20250410-en
Behavioral task
behavioral27
Sample
f990d850e111bf361124a5a27c29b5634503f2c8f2c710bbf0693bd4f557f5f8.exe
Resource
win11-20250410-en
Behavioral task
behavioral28
Sample
f99ae4a3786f8c8da71654ddaba30b4791692d795c93ec1f60b0c58f3be43c93.exe
Resource
win11-20250410-en
Behavioral task
behavioral29
Sample
f9a573b21a7be92000f27a3802bb3518.exe
Resource
win11-20250410-en
Behavioral task
behavioral30
Sample
fa0d8e0c80c4d5be75d4ff442d6a85ea4750bffb3526d4d2d3b2e03f3ccfb28e.exe
Resource
win11-20250410-en
Behavioral task
behavioral31
Sample
fa8e531e0860851ba2d1fb27a07f1879162d4f9bee94df2b818bae9d7834a884.exe
Resource
win11-20250410-en
Behavioral task
behavioral32
Sample
fa942bbb984e2be3a2e1d8414cc00cd7.exe
Resource
win11-20250410-en
General
-
Target
f780377dd90d33c8280734d882fc2ac9.exe
-
Size
12KB
-
MD5
f780377dd90d33c8280734d882fc2ac9
-
SHA1
2ca8e1e97f1d9893389ea6f7505fe7c24924b387
-
SHA256
d44c91defb81890cb0045d3a612485a4db65c1f4e52ce405efa453b8a07229e7
-
SHA512
ffa397cbe485bef45d52cbe19527bd7e16d5fe3847e80844dbb45fe96effefb8f0c3cfdcfa9d164786a063d6bc74a38c99ec2bab132b3841caaefb72b26be643
-
SSDEEP
384:SL7li/2zcq2DcEQvdfcJKLTp/NK9xa4f:MYMZQ9c4f
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5228 tmp4E6F.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 5228 tmp4E6F.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp4E6F.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f780377dd90d33c8280734d882fc2ac9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3124 f780377dd90d33c8280734d882fc2ac9.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3124 wrote to memory of 5536 3124 f780377dd90d33c8280734d882fc2ac9.exe 78 PID 3124 wrote to memory of 5536 3124 f780377dd90d33c8280734d882fc2ac9.exe 78 PID 3124 wrote to memory of 5536 3124 f780377dd90d33c8280734d882fc2ac9.exe 78 PID 5536 wrote to memory of 2700 5536 vbc.exe 80 PID 5536 wrote to memory of 2700 5536 vbc.exe 80 PID 5536 wrote to memory of 2700 5536 vbc.exe 80 PID 3124 wrote to memory of 5228 3124 f780377dd90d33c8280734d882fc2ac9.exe 81 PID 3124 wrote to memory of 5228 3124 f780377dd90d33c8280734d882fc2ac9.exe 81 PID 3124 wrote to memory of 5228 3124 f780377dd90d33c8280734d882fc2ac9.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\f780377dd90d33c8280734d882fc2ac9.exe"C:\Users\Admin\AppData\Local\Temp\f780377dd90d33c8280734d882fc2ac9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rv4a54w2\rv4a54w2.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4F78.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7DB5EE172784B0B99ACAB50EBD719F6.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp4E6F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp4E6F.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f780377dd90d33c8280734d882fc2ac9.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5228
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5edd1445ec43a61e6fbc0ccb98d762b54
SHA1430ba0714e42cd3944e4a6ad90b4d42e7250066c
SHA256990fffd8454a4ffd63b2de87810d9dde156842209664adf5b961bd5594ce7dbc
SHA5125c0296b3db6fa2f5ece33fc6baa02eb4da2855d722c8eb02edee28848fd999b1e8527e413722553dbff020a9f3555aa2b58d4ac72dc9ade2c29014fdaac5e2ba
-
Filesize
1KB
MD5b9bcab0b63dd8d4aa83afa66a051b299
SHA1df22eaa2d38b37f18d3ae1764a4a04912b580c92
SHA2563efddaa82dcaf2e95826bfcfc71b1d9b1facb3cb574ead9b6165995df363c898
SHA5121178fe2636d6db4419e186e69149b53a52f23e0d1182370cc9d558a85c613f45edd8985feb0dbce1d8cb4dfd90e48116611110fc84ebf633bc41b5ab37eaeb21
-
Filesize
2KB
MD5f9078eea0ebf5159828d44fae8e47687
SHA1925ed2b8a04f956de05a936b14792fe482b0fbaf
SHA256a2f974cfe11024ee41f5ce930ee525a77f221c99edec1e59b210dfe3bc9c24b5
SHA5121669e37829cfcf3efff4ec4140abc71995794659f9fdd8df590707b28090abf78d47d0839fb22cd4ee330ac516f06d5869cc4554b427269ad89cff9bd16a71d0
-
Filesize
273B
MD5b76c6ed98bb53e736c45c0af19b65f90
SHA1a2796c15a2d0b0609abdbac9bf7e36d90c18c6ff
SHA25626ec19a34b3d464014a77d0bdfeef1a0576a6f0eb14320b3272c4353e18c3206
SHA512ac434bd9b6a51328bf4fe08e75cc02d2b23ca3b9b7b1f1e72707172c875e380e724a3c284e42ec6e19c3e6eb2e2fdeb4b183345173e82431c7344083c5a099f2
-
Filesize
12KB
MD5a81ad24c8db6f99332d87e17d38ef734
SHA177c8424597ee3b6118db7607d6e420ba43b887b5
SHA25696a56095ce6724c60f1f79edccaff9443f095ed71c8572e386f2d153cb2277c1
SHA512703a70284ad45905ca18b3c5b7eaa5dd2f18e564667356acd060dc7614234d110e6bc594d103a04fb7bd73c974d4521b52ac8d9e7a1b8ea6a5cc9737814137ea
-
Filesize
1KB
MD5600225ea75e0f8aa9b595da9790b6069
SHA14aff7eb3c3ef0a3d1d1359e61573d5448ae60fdf
SHA2564497ba592d89f1b920c859ddce13d0129f0e0a93812957945688ada3cdeaca0a
SHA512204c5631f0a38e7361e9db391daf760b8fb92c05e57eda224f86e53347c5322cc8719073ae0ebebeb2d8c0146050a6564eef27de47d2d9431ebff4b8d79a3180