Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
30129f55e0ddbc3c8b916f3f17a33bf4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
30129f55e0ddbc3c8b916f3f17a33bf4.exe
Resource
win10v2004-20240226-en
General
-
Target
30129f55e0ddbc3c8b916f3f17a33bf4.exe
-
Size
212KB
-
MD5
30129f55e0ddbc3c8b916f3f17a33bf4
-
SHA1
f32aa55c54a094b3bbf33438cd08910f375c56e0
-
SHA256
e07146ab2498fbdaaeb9371c506f12b88bffc216c0a6c541cb0f3d2e0e0dd704
-
SHA512
f4c8beca426443300dfa44db72229a32bff11056857391029171a1df1d00a28bca6c0d3dd93d5f900b23bf812cdcbb143fc899c786453830b31ac1e287d6394f
-
SSDEEP
6144:T21pbX5wvz8zE14KpxxbxDxxxx155nZxs1UoKn:Kdw6E14KxxbxDxxxx15VZxx
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1920 ptbtmmb.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ptbtmmb.exe 30129f55e0ddbc3c8b916f3f17a33bf4.exe File created C:\PROGRA~3\Mozilla\ygweoyg.dll ptbtmmb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30129f55e0ddbc3c8b916f3f17a33bf4.exe"C:\Users\Admin\AppData\Local\Temp\30129f55e0ddbc3c8b916f3f17a33bf4.exe"1⤵
- Drops file in Program Files directory
PID:1716
-
C:\PROGRA~3\Mozilla\ptbtmmb.exeC:\PROGRA~3\Mozilla\ptbtmmb.exe -merxlsn1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD500ae3ebd7023e9a8ca603724a355bf0c
SHA144eb8fc9f67e4845fae1b0b488347e391321d371
SHA2563be6e16f90c1df01d5f08335d104e92d1dc9e072a7265caa2703b20898de3d47
SHA5128487044c1118585ea4176cd0f8a4e3c3f593e416d5077a020111f0b84e94a7dafda54a55f5eb96fb07a9a1e074a32b9e5018bbd8a38d988a43ef7684ef3a8191