Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 08:23
Behavioral task
behavioral1
Sample
74331fc1a01348185f62475ee5471472.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74331fc1a01348185f62475ee5471472.exe
Resource
win10v2004-20231215-en
General
-
Target
74331fc1a01348185f62475ee5471472.exe
-
Size
1.4MB
-
MD5
74331fc1a01348185f62475ee5471472
-
SHA1
9c03c6dfc9786dfb960e5d4b1bd6db4fe5a036b2
-
SHA256
d2c38cecf49e55b35607cb0407a427fc6c0003909038466c8242120703fc7202
-
SHA512
114069ecf6ba1ff2b101cc6c86de3a5a95ae9b0e7517fdabda057507fcf4ccf76e87516ba019666504f57abbfb011dad3bfa87382d88f74bb913eb81af63fa32
-
SSDEEP
24576:BzMhy7MCOI7QAJcJpItV8xjPhrmR4Y4ptRNEg2JUYnbuR656+3xCu8kjfaY:BBMCOIBWOtmxjPkyYElOUK6R6pou1fB
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" GBTR_SENTRA.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2536 GBTR_SENTRA.exe -
resource yara_rule behavioral1/memory/2204-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2204-14-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\GBTR_SENTRA = "C:\\GBTR_SENTRA.exe" GBTR_SENTRA.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" GBTR_SENTRA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2204 74331fc1a01348185f62475ee5471472.exe Token: SeBackupPrivilege 2204 74331fc1a01348185f62475ee5471472.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2536 2204 74331fc1a01348185f62475ee5471472.exe 20 PID 2204 wrote to memory of 2536 2204 74331fc1a01348185f62475ee5471472.exe 20 PID 2204 wrote to memory of 2536 2204 74331fc1a01348185f62475ee5471472.exe 20 PID 2204 wrote to memory of 2536 2204 74331fc1a01348185f62475ee5471472.exe 20 PID 2204 wrote to memory of 2536 2204 74331fc1a01348185f62475ee5471472.exe 20 PID 2204 wrote to memory of 2536 2204 74331fc1a01348185f62475ee5471472.exe 20 PID 2204 wrote to memory of 2536 2204 74331fc1a01348185f62475ee5471472.exe 20 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System GBTR_SENTRA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" GBTR_SENTRA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74331fc1a01348185f62475ee5471472.exe"C:\Users\Admin\AppData\Local\Temp\74331fc1a01348185f62475ee5471472.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\GBTR_SENTRA.exe"C:\GBTR_SENTRA.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- System policy modification
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
455KB
MD50a33e4e29028239d73eacff70bcab7e9
SHA170c2e1836acaab5d4b2c3a06822cd865ca4e077f
SHA256e48d42793e05f745a3513cf63a0be24cddcfbd1317baad75d75afd135f39a9d9
SHA512538c647eb7d69f02d81c65154b7f2bca2f416ca5daaefc60e401d06168950cfbcbf7ef439f6ff973b1678863378a0c32ac0ab85f8be755f48c7cd98b267d0bc5
-
Filesize
492KB
MD5e49531fc58972e4219ca478f8538d222
SHA1b81f0cdf0990a44cc0cf8a8ddd60b0c5b727f117
SHA256a71cde1f272296ea0e409fc5ced1d7b6289ac551ba2bedcac6116315c599baf2
SHA51258a63044bd960459d6edb9278f6d6c696d184e404f4b8bcec551792a11a9973e850255f55832ef80de38d2e12017176624754c72aacbde23f564a76adb7cdbb9
-
Filesize
403KB
MD57bb7f6f91467b518eeb3fcd2846e034b
SHA1d429c319be34693a8fead40638495dfbeadc3f16
SHA2561c01d850e3b16d97cb62df0aedfd2217221fd802ad14fc6a2640ca41a4c00781
SHA51238a7e8ece999162d42d50406aa7c066de5357fa1b8eff3e32dc791d8dba3c2c836758d29a400bf7c877db5d46fe97fd4253d67e894aef82b58e0332fc2015def
-
Filesize
398KB
MD5cf29b6a1fabaadbc484b18018bdceae8
SHA157b7b0cf95e0b45b244135cb47602939abe12b52
SHA25640693e09cb6df1aee721c9c74a8ead967cccf48dabeab7fa3a9ad3f930a152e2
SHA512761528beb7e447f38251d3001f696098d730cef0b557c8c7e187bfcff8c15800735ce7fbe41badb2bd0d33eaf896fcd32f59f1e2d89483d3b8636b89325ae8d7