Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
25/11/2023, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
AUS 9141124-2023.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
AUS 9141124-2023.exe
Resource
win10v2004-20231020-en
General
-
Target
AUS 9141124-2023.exe
-
Size
938KB
-
MD5
1530c857fe5d228b4836a177a7fbb92f
-
SHA1
05d8268b3f56c60b3d318902c37920f9ad030872
-
SHA256
a48bdc85f4da302d6c3bd23a5edb8b56a64ffe9e0f79b6e150c11982295b277e
-
SHA512
1b2ff549ef77316e8256a4cc242b85b539d00252d7f9bb6d2d27e2f999838fa68625b6dbd716488bada4a210a3c01c6d96bd3df56021b758c22beda086e9e2e0
-
SSDEEP
24576:8mtD/61xQUqRbqfLZAY4cFAs+VXI4YU5nLsjvEN:Z6gVRbqfWsQMUVL
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2936 netiougc.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1748 set thread context of 2432 1748 AUS 9141124-2023.exe 28 PID 2432 set thread context of 1232 2432 AUS 9141124-2023.exe 8 PID 2432 set thread context of 2936 2432 AUS 9141124-2023.exe 31 PID 2936 set thread context of 1232 2936 netiougc.exe 8 -
description ioc Process Key created \Registry\User\S-1-5-21-2084844033-2744876406-2053742436-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netiougc.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2432 AUS 9141124-2023.exe 2432 AUS 9141124-2023.exe 2432 AUS 9141124-2023.exe 2432 AUS 9141124-2023.exe 2432 AUS 9141124-2023.exe 2432 AUS 9141124-2023.exe 2432 AUS 9141124-2023.exe 2432 AUS 9141124-2023.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1232 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2432 AUS 9141124-2023.exe 1232 Explorer.EXE 1232 Explorer.EXE 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe 2936 netiougc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2432 1748 AUS 9141124-2023.exe 28 PID 1748 wrote to memory of 2432 1748 AUS 9141124-2023.exe 28 PID 1748 wrote to memory of 2432 1748 AUS 9141124-2023.exe 28 PID 1748 wrote to memory of 2432 1748 AUS 9141124-2023.exe 28 PID 1748 wrote to memory of 2432 1748 AUS 9141124-2023.exe 28 PID 1748 wrote to memory of 2432 1748 AUS 9141124-2023.exe 28 PID 1748 wrote to memory of 2432 1748 AUS 9141124-2023.exe 28 PID 1232 wrote to memory of 2936 1232 Explorer.EXE 31 PID 1232 wrote to memory of 2936 1232 Explorer.EXE 31 PID 1232 wrote to memory of 2936 1232 Explorer.EXE 31 PID 1232 wrote to memory of 2936 1232 Explorer.EXE 31 PID 2936 wrote to memory of 2836 2936 netiougc.exe 33 PID 2936 wrote to memory of 2836 2936 netiougc.exe 33 PID 2936 wrote to memory of 2836 2936 netiougc.exe 33 PID 2936 wrote to memory of 2836 2936 netiougc.exe 33 PID 2936 wrote to memory of 2836 2936 netiougc.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\AUS 9141124-2023.exe"C:\Users\Admin\AppData\Local\Temp\AUS 9141124-2023.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\AUS 9141124-2023.exe"C:\Users\Admin\AppData\Local\Temp\AUS 9141124-2023.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2432
-
-
-
C:\Windows\SysWOW64\netiougc.exe"C:\Windows\SysWOW64\netiougc.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD51e73cacce02ae20026a81f1e56416aa3
SHA1f491a7301ce11cf11a92c0245c7e03d927422286
SHA2560dd0dd38cde5a14e7d6d0830db62cc7037e521fd042b0b8da0763128b2c0b3f2
SHA512afe77facd8b16cc744ac2277414ffaf83436999d15eb8ac707f8098e2f8ed4cb29b430392ebe46b7fa65b20730615bc33dee9416f7141da5032a630894980a0a
-
Filesize
927KB
MD57fd80b1cc72dc580c02ca4cfbfb2592d
SHA118da905af878b27151b359cf1a7d0a650764e8a1
SHA2561e6dccbdf8527abb53c289da920463b7895300d0d984cc7e91a3ecda4e673190
SHA51213f7f29b5ed31c551aa5f27742557aa4d026a226087d6fcbca094819759ecc753a2c33b7422ae88dc6a4a0a966edb8485a18e59a0283ba2686cae5d78e0190a3