Resubmissions

19/01/2024, 15:19

240119-sp7hfahah6 5

19/01/2024, 15:17

240119-spb2jagdgm 5

Analysis

  • max time kernel
    410s
  • max time network
    1142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 15:17

General

  • Target

    BT-23.10.0-64UWD-Win10-Win11.exe

  • Size

    58.2MB

  • MD5

    3d1299ef2998b60d60d0b0676916ab32

  • SHA1

    ab603bfb318ea47a3aadd2482f8070dc0c1dfd86

  • SHA256

    a639a39bf1c7b5e27b3487f14a8d99f81d5e7334580e917606cb4a32647a2816

  • SHA512

    961e9b905ff47a5564e43c3c9e5571cf9ac210ec6f5a034d59601e539f7ec3c07d1eddf6be0365d3ed9e9d5a9d1b23bcb80e78ef8386a777d282b47cb1d3b2d9

  • SSDEEP

    393216:hB9i8PUgDtfGi39joJ5HFsPyaGBkE5v1AamBNS:wI71945lDtv+aKNS

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BT-23.10.0-64UWD-Win10-Win11.exe
    "C:\Users\Admin\AppData\Local\Temp\BT-23.10.0-64UWD-Win10-Win11.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\Temp\{F04803B8-3DBC-4A14-9701-198C9AFE794C}\WirelessSetup.exe
      "C:\Windows\Temp\{F04803B8-3DBC-4A14-9701-198C9AFE794C}\WirelessSetup.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Windows\Temp\65ab56e9dcb0bfce48c85dd48f0f19118dfd99\WirelessSetup.exe
        "C:\Windows\Temp\65ab56e9dcb0bfce48c85dd48f0f19118dfd99\WirelessSetup.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_EF52C1EC85F21F31CC0157A5C8803013

    Filesize

    765B

    MD5

    9389c5403447352cb33f439c7e9c18b2

    SHA1

    14b4c1deeefe1502f02a1e148722cf1f2e78553b

    SHA256

    7c833c358158f743a1f6089bb0e4fc466830e971d8717d1004ffc783217d3350

    SHA512

    c3f304fe27d2cb1f7fa20917636bf361636b41262da5d17102800b6e208b6c301d4e8c1da7c27c640285989044e8a3e779f9862184891d3ed0843b65b129b170

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3AA0DCD5A74331FBD6F344550EC48B87_5138147F2BE7083CBCE306C8D330136B

    Filesize

    638B

    MD5

    a2c38169adb6b9b0f2e9f3f140c14fd4

    SHA1

    fd9cfcd4c168a12982931ea095815ebb7e017d2a

    SHA256

    a2695f19e6d8b475fc2dfc2f231118b3936ec6c03630904f2a3a18057eab5a38

    SHA512

    53beffa061a651f0301380c9ca9bd16d5db814939abe4ffe50dc756ab71b83f07da733cb9acb318b434013ff6f02e512d7611c399f30b1ce78a31ea7fbd0e8d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

    Filesize

    1KB

    MD5

    765c6d3c40db39f2d87414f0809a8c05

    SHA1

    7ca9fd389aa670b0369449f74b0be9d732197e63

    SHA256

    28aadfaa6706dc3e815b14c5d6716586e9c42a44f3bdda0e8b214a93fa601fdb

    SHA512

    a1ebf643958539fb6e2fe9001836506e633e06b5bae0c6a7b5b10e4a3c76d9db72a1f7db289a14b63420cd90a713cb5efaa04b11eda8a842226b6767a7070402

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_EF52C1EC85F21F31CC0157A5C8803013

    Filesize

    484B

    MD5

    7babcfdaaf5c41c427dd91ea47f8758c

    SHA1

    838a2589c85f8993fed818ddd775dfd047fc277a

    SHA256

    0a6630ea94230e52e6b2044ddc167d823a1a9403622421daf4f55929591d821c

    SHA512

    4c20b7eef2caee3a8ee223b6b0cd89b8327ab9c20233e64cb1d05b4d2535faa06b068830347e6bc31b27783f3c5c1db11cc71d6a058434bdb25710aa7d9559bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3AA0DCD5A74331FBD6F344550EC48B87_5138147F2BE7083CBCE306C8D330136B

    Filesize

    484B

    MD5

    d8a217752ab44215fa87d4f618d8acb9

    SHA1

    0561ba7341b9f6b08a9f9a14c8d5f2b3fac2b318

    SHA256

    2eeefad78c73916b2711a5c600570a418ef3e314f03ad4d2c5b6807ba43fb203

    SHA512

    cbbbcdf62d80d1e4de20ec45699b8085e9823120b6401eb8251b2370f7fdd87fd8273d3380cd83ac037b69a1ea9a09cfac167a970209eb976609bfe93535b5ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

    Filesize

    482B

    MD5

    7032e5aa034cd537f1933598aa1a4d09

    SHA1

    4f013eeda8d032338215e38f4ea73cb3cb7d96a0

    SHA256

    f27610c7718f75fa61db0af5e6cd5d75f720685d305135431a9781f78a5fa3cf

    SHA512

    849e3bd51a9f841b21414b67d803c6b4ed878f2ca9e32771d26b167943180cc45a9060d2cd2c37887069334fa83700ab9e7178d43e778def503311180f1e4b59

  • C:\Windows\Temp\65ab56e9dcb0bfce48c85dd48f0f19118dfd99\Intel Bluetooth.msi

    Filesize

    18.7MB

    MD5

    36ceb370bc75270b31aa50fad3dac895

    SHA1

    a7eb2b25cf566bc2d9adf06000bc0d0698fd20a3

    SHA256

    8ed98722bfc10564a08be99cff8cfa953f9aa78eea5cf482c5f5657159479fa7

    SHA512

    943f512b94c3523ba8149fdbc4f5959f3cd6a70677502b3ca4233b33cbed3064e52f03a978c4b4cf454e0531e189a663896984a28d3a4479fb5e63c416314795

  • C:\Windows\Temp\{F04803B8-3DBC-4A14-9701-198C9AFE794C}\Intel Bluetooth.msi

    Filesize

    1.1MB

    MD5

    b841dcbe67eb4ff313cd970c7e145cbd

    SHA1

    7905eef0f331ea9ccd83de1a7bf1568fb8368112

    SHA256

    2bf12eb32fc52e2f5ef7bb52d8c702cce1665fd2e000359dbb00cc2702db3045

    SHA512

    953894a75d7e8ebfb06c4aefce89fb5e26d614c87a5a6cda6ced1e79957c5eec2e15f223c8a890e7ac2a346935e1b8a0f176336a2b8949d8f99a1128386eefc3

  • C:\Windows\Temp\{F04803B8-3DBC-4A14-9701-198C9AFE794C}\WirelessSetup.exe

    Filesize

    3.5MB

    MD5

    3ad97c68b5ed5f60fb2f5b1668888f24

    SHA1

    89943fd49d7364048a92325c04bb20d1c4ec215b

    SHA256

    cf9e5f7d0e234021c542dd30aa65620a164def567fbf56254fe194d6614acf4f

    SHA512

    04ac197867456f77bfce7b446ec43012edf5f318360888a754a85e632fec88d4a7b5e024fd4141630d43feea6b34353eefd57453e5ec4849ee88178dc5a7ed6a

  • C:\Windows\Temp\{F04803B8-3DBC-4A14-9701-198C9AFE794C}\WirelessSetup.xml

    Filesize

    632B

    MD5

    495d22fb91b19d93e337be9cd92b78eb

    SHA1

    c1c7e948b0ad53568275385dd2c3324455bfbb64

    SHA256

    4e890388a0a0e8b6ff24fb1e2eb8cb7042ecfddf62419ca1b749f034bbeee483

    SHA512

    ee102c8acdb1732cee5fb92cca8fc1934e66b1892a6f93cfe64f70c54aea7eab3f89f4dd2154ee75104392cf0e28470149d5be447140e7c51b7743ea1d8c389b

  • C:\Windows\Temp\{F04803B8-3DBC-4A14-9701-198C9AFE794C}\lang\setupENU.dll

    Filesize

    1.4MB

    MD5

    73176d7e920a496f670e103156d8b572

    SHA1

    7f513573c67d1da78d960c252b64433818246f15

    SHA256

    445e53326dc3103e67c70d5637b1d46cc486f1806ea50f9ff4bdb806e8f6a3bb

    SHA512

    cbbc16c1a37519574a3f7b98e57c3214b9d5edbb156e057a04d279977abb7f4ba73e980c9a09715cace8febb97e27d2eb5020ba4a34734a44ef1700d44057905