Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2023, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
ThunderBird.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ThunderBird.exe
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
ThunderBird.exe
Resource
win10v2004-20230703-en
General
-
Target
ThunderBird.exe
-
Size
47.0MB
-
MD5
794340f45de887fb5ff3ffe1c11a4e6d
-
SHA1
b8d7bba33a9763936f169249d7b71809233c52c5
-
SHA256
b4c3d5aef9813e7e1c14480b0090609a9665d86fafc5f8e2a0f4f432a400b32c
-
SHA512
c7eefb264eaa0adf77065a5c7a752325b025689ce6613e06875a3313e90dcfb4375bdf339b5601668fda97a3bb1598d964ac56b324a6315bf6994b125e2382be
-
SSDEEP
786432:BtakRWH1pLCgJqrYW1zC8MQ7Hx6IVswnbOo52bAJ6g6:BQkQP+aMpC8MQEnl1bAJ6D
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{6EFCADA9-2EE5-4F77-9DDF-E1AE23D94784}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 3068 powershell.exe 3068 powershell.exe 4880 powershell.exe 4880 powershell.exe 4708 powershell.exe 4708 powershell.exe 1064 powershell.exe 1064 powershell.exe 452 powershell.exe 3600 powershell.exe 436 powershell.exe 436 powershell.exe 436 powershell.exe 452 powershell.exe 452 powershell.exe 3600 powershell.exe 3600 powershell.exe 2704 powershell.exe 2704 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3068 powershell.exe Token: SeDebugPrivilege 4880 powershell.exe Token: SeIncreaseQuotaPrivilege 3068 powershell.exe Token: SeSecurityPrivilege 3068 powershell.exe Token: SeTakeOwnershipPrivilege 3068 powershell.exe Token: SeLoadDriverPrivilege 3068 powershell.exe Token: SeSystemProfilePrivilege 3068 powershell.exe Token: SeSystemtimePrivilege 3068 powershell.exe Token: SeProfSingleProcessPrivilege 3068 powershell.exe Token: SeIncBasePriorityPrivilege 3068 powershell.exe Token: SeCreatePagefilePrivilege 3068 powershell.exe Token: SeBackupPrivilege 3068 powershell.exe Token: SeRestorePrivilege 3068 powershell.exe Token: SeShutdownPrivilege 3068 powershell.exe Token: SeDebugPrivilege 3068 powershell.exe Token: SeSystemEnvironmentPrivilege 3068 powershell.exe Token: SeRemoteShutdownPrivilege 3068 powershell.exe Token: SeUndockPrivilege 3068 powershell.exe Token: SeManageVolumePrivilege 3068 powershell.exe Token: 33 3068 powershell.exe Token: 34 3068 powershell.exe Token: 35 3068 powershell.exe Token: 36 3068 powershell.exe Token: SeDebugPrivilege 4708 powershell.exe Token: SeIncreaseQuotaPrivilege 4708 powershell.exe Token: SeSecurityPrivilege 4708 powershell.exe Token: SeTakeOwnershipPrivilege 4708 powershell.exe Token: SeLoadDriverPrivilege 4708 powershell.exe Token: SeSystemProfilePrivilege 4708 powershell.exe Token: SeSystemtimePrivilege 4708 powershell.exe Token: SeProfSingleProcessPrivilege 4708 powershell.exe Token: SeIncBasePriorityPrivilege 4708 powershell.exe Token: SeCreatePagefilePrivilege 4708 powershell.exe Token: SeBackupPrivilege 4708 powershell.exe Token: SeRestorePrivilege 4708 powershell.exe Token: SeShutdownPrivilege 4708 powershell.exe Token: SeDebugPrivilege 4708 powershell.exe Token: SeSystemEnvironmentPrivilege 4708 powershell.exe Token: SeRemoteShutdownPrivilege 4708 powershell.exe Token: SeUndockPrivilege 4708 powershell.exe Token: SeManageVolumePrivilege 4708 powershell.exe Token: 33 4708 powershell.exe Token: 34 4708 powershell.exe Token: 35 4708 powershell.exe Token: 36 4708 powershell.exe Token: SeDebugPrivilege 1064 powershell.exe Token: SeIncreaseQuotaPrivilege 1064 powershell.exe Token: SeSecurityPrivilege 1064 powershell.exe Token: SeTakeOwnershipPrivilege 1064 powershell.exe Token: SeLoadDriverPrivilege 1064 powershell.exe Token: SeSystemProfilePrivilege 1064 powershell.exe Token: SeSystemtimePrivilege 1064 powershell.exe Token: SeProfSingleProcessPrivilege 1064 powershell.exe Token: SeIncBasePriorityPrivilege 1064 powershell.exe Token: SeCreatePagefilePrivilege 1064 powershell.exe Token: SeBackupPrivilege 1064 powershell.exe Token: SeRestorePrivilege 1064 powershell.exe Token: SeShutdownPrivilege 1064 powershell.exe Token: SeDebugPrivilege 1064 powershell.exe Token: SeSystemEnvironmentPrivilege 1064 powershell.exe Token: SeRemoteShutdownPrivilege 1064 powershell.exe Token: SeUndockPrivilege 1064 powershell.exe Token: SeManageVolumePrivilege 1064 powershell.exe Token: 33 1064 powershell.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3780 wrote to memory of 4740 3780 ThunderBird.exe 86 PID 3780 wrote to memory of 4740 3780 ThunderBird.exe 86 PID 4740 wrote to memory of 688 4740 cmd.exe 88 PID 4740 wrote to memory of 688 4740 cmd.exe 88 PID 3780 wrote to memory of 4880 3780 ThunderBird.exe 89 PID 3780 wrote to memory of 4880 3780 ThunderBird.exe 89 PID 3780 wrote to memory of 3068 3780 ThunderBird.exe 90 PID 3780 wrote to memory of 3068 3780 ThunderBird.exe 90 PID 4880 wrote to memory of 1852 4880 powershell.exe 92 PID 4880 wrote to memory of 1852 4880 powershell.exe 92 PID 1852 wrote to memory of 2832 1852 csc.exe 93 PID 1852 wrote to memory of 2832 1852 csc.exe 93 PID 3780 wrote to memory of 4708 3780 ThunderBird.exe 95 PID 3780 wrote to memory of 4708 3780 ThunderBird.exe 95 PID 3780 wrote to memory of 1064 3780 ThunderBird.exe 100 PID 3780 wrote to memory of 1064 3780 ThunderBird.exe 100 PID 3780 wrote to memory of 4660 3780 ThunderBird.exe 102 PID 3780 wrote to memory of 4660 3780 ThunderBird.exe 102 PID 3780 wrote to memory of 452 3780 ThunderBird.exe 104 PID 3780 wrote to memory of 452 3780 ThunderBird.exe 104 PID 3780 wrote to memory of 3600 3780 ThunderBird.exe 108 PID 3780 wrote to memory of 3600 3780 ThunderBird.exe 108 PID 3780 wrote to memory of 436 3780 ThunderBird.exe 105 PID 3780 wrote to memory of 436 3780 ThunderBird.exe 105 PID 3780 wrote to memory of 4904 3780 ThunderBird.exe 110 PID 3780 wrote to memory of 4904 3780 ThunderBird.exe 110 PID 4904 wrote to memory of 3328 4904 cmd.exe 112 PID 4904 wrote to memory of 3328 4904 cmd.exe 112 PID 3780 wrote to memory of 2704 3780 ThunderBird.exe 113 PID 3780 wrote to memory of 2704 3780 ThunderBird.exe 113 PID 3780 wrote to memory of 4364 3780 ThunderBird.exe 115 PID 3780 wrote to memory of 4364 3780 ThunderBird.exe 115 PID 4364 wrote to memory of 4272 4364 cmd.exe 117 PID 4364 wrote to memory of 4272 4364 cmd.exe 117 PID 3780 wrote to memory of 4604 3780 ThunderBird.exe 118 PID 3780 wrote to memory of 4604 3780 ThunderBird.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:1172
-
C:\Users\Admin\AppData\Local\Temp\ThunderBird.exe"C:\Users\Admin\AppData\Local\Temp\ThunderBird.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp"2⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\system32\chcp.comchcp3⤵PID:688
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c "Add-Type -Name Window -Namespace Console -MemberDefinition ' [DllImport(\"Kernel32.dll\")] public static extern IntPtr GetConsoleWindow(); [DllImport(\"user32.dll\")] public static extern bool ShowWindow(IntPtr hWnd, Int32 nCmdShow); ' $consolePtr = [Console.Window]::GetConsoleWindow() #0 hide [Console.Window]::ShowWindow($consolePtr, 0) "2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ceurdopr\ceurdopr.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9AE8.tmp" "c:\Users\Admin\AppData\Local\Temp\ceurdopr\CSCDD5D21EF97AF43ED89293F5A2CA66F.TMP"4⤵PID:2832
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"2⤵PID:4660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""2⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system32\findstr.exefindstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"3⤵PID:3328
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid"2⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid3⤵PID:4272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""undefined\VBoxManage.exe" list vms --long"2⤵PID:4604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
2KB
MD52f87410b0d834a14ceff69e18946d066
SHA1f2ec80550202d493db61806693439a57b76634f3
SHA2565422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65
SHA512a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4
-
Filesize
2KB
MD5c8c43d0eaefbfd1be22f01ccd909cf97
SHA113fcf45f10e63f19f08d28bcf8ae9f6e95bd7f00
SHA256029fd6ba7fd95649ba1100cb57068985007088bf9b82d68a12904b7ee45434da
SHA5124b915638afe2be0246aac7c40916597c86ee6f1ac35dd77d20a7746960346ef697f530b03251f301fe8e687f6e3fa37640df4b9727d29b2f80440478c931c974
-
Filesize
2KB
MD5b7c93769b2711e60e835ded135786ae3
SHA1fb1aedc8eafe539f466d3b0e8cfb34eb78478166
SHA256abc46c311d4c4f53930e672a731e37c0ebb2339fd823a3ff6c4d8cfdc1f622aa
SHA51289c46a5a09839fa71701a6789aa66de9b3f72ee8a9e70eb18cbe30599ff76b28a6b93a8db7688c039c625ac42a9f7b1bfd22f09820393b7cce7cc5a040908265
-
Filesize
2KB
MD58078045e4d5a1794600849c8e676d471
SHA175313723e11fc47cf3f64545e5ba46ddaafbdcf1
SHA2565f8984ba3ec22741410893c298a8769fc0ffd4f5e784b7f647446a060b609980
SHA51266f81d898c2ff6ab9e3738d2d69afaf3c0d60738e311d3faa79b9923244a0dd55817af5c1a6be3d6fe8783bea9981ef62b79650f03c5cad7a5e373c32abe5b7b
-
Filesize
2KB
MD5542ab3a1ae2ed388aa7282ba2157e45e
SHA189bfe976951a12a62212b65a410224935806e371
SHA2564e624a10fa040f13964d436454c89f9dc44d8f89ebe9875e3a73266e946253d7
SHA51209516a828424a4ab5243be826f7ca996f7e04f6fb87b53bfc2867762b7033caa4419b98642f963e6bf272883ac25d027866e4cf7ee582418a1a2195ac8ad5896
-
Filesize
2KB
MD5542ab3a1ae2ed388aa7282ba2157e45e
SHA189bfe976951a12a62212b65a410224935806e371
SHA2564e624a10fa040f13964d436454c89f9dc44d8f89ebe9875e3a73266e946253d7
SHA51209516a828424a4ab5243be826f7ca996f7e04f6fb87b53bfc2867762b7033caa4419b98642f963e6bf272883ac25d027866e4cf7ee582418a1a2195ac8ad5896
-
Filesize
1KB
MD574ec389778084e20f7a03d8a5108af18
SHA1b62cb5eaaa3498362ddc8e290b2a6f6c9e49971f
SHA25688f9ffe4c974777df08ee8e28c44133d529e0df7fe8fbb1cb74d1606e0c93fc0
SHA5124856c463e77008e5bd35fc737571c7fc32e71dad1b1e4feaadfa7c395fd1360d1bd40f19f1d4191be389fae25050a04d62f2d8e17681ffc2813d2e7b103059b9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD5aa9138d05f20e9c33175bbdc819324d2
SHA15cbce38c048cd4e45c73b453ac7bdee8b7fb03c1
SHA256d99f2639d8c5a336d6adfc5d197f52871b6576dc8e6d44666e9136a9c3e660e4
SHA51267a9978d20ba1102ebad6d37e2ba0be3de4015afff6ed2c8e99991b761077cd514e34ebcf2fc7aa92716133986b48a33860b76ab4eb6a9e86f209e2bcb8b8741
-
Filesize
652B
MD52b002f90f5d5ecf4ccb735507e175ecd
SHA1c37c5f16db9d1cf42703a686b12a4e410f0599bc
SHA256bc7c56f1b9695cb84c368a6dac6b2fb9271c94df3ac74e9cd6553d373c38329a
SHA512f9f832e1d1f597622a2da78ec43754162ae9e7ab9d35ed5162bf5781817965b2f8ce9f1a8705dc00b1d0d6545b49ee9d73c5cf33d425b4ec0650af79f0c3a0f2
-
Filesize
312B
MD5ecbf151f81ff98f7dff196304a40239e
SHA1ccf6b97b6f8276656b042d64f0595963fe9ec79c
SHA256295ca195631c485c876e7c468ddcbb3fe7cd219d3e5005a2441be2de54e62ac8
SHA5124526a59055a18af6c0c13fb9f55a9a9bc15aa1407b697849e19b6cc32c88ee7206b3efff806bd154d36bce144ae1d9c407c6ea0f5077c54fbe92cd172c203720
-
Filesize
369B
MD5b40293fa9b11b29b23c1be97d66879c9
SHA10f3368afb8408593c6c018ecba26e69806062d83
SHA2567b7b2c8643b792b273ccb4a9e534d2d7e537c945878946a4f89865817f6388e0
SHA512a1944660972c0b7d7b2eae073eb7619871832a59c90913f5f3b8a583ad3a83576c401fe6717086901dc535b9f7d018fa2a095aee80b36c5abe9f35515d761c66