Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
063d80ff57a02d0ca1fcdc5277f03227.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
063d80ff57a02d0ca1fcdc5277f03227.exe
Resource
win10v2004-20240226-en
General
-
Target
063d80ff57a02d0ca1fcdc5277f03227.exe
-
Size
479KB
-
MD5
063d80ff57a02d0ca1fcdc5277f03227
-
SHA1
f7a25a5faac2ecbed14b6a14222caf3076cb5680
-
SHA256
5a45035a817c3f0ea754bbc64e504ddbe862f87dddfbfcf0dbb74438a6095eb1
-
SHA512
8e4ff9c6f3da3297e50a880c9ef29881b79cc4f917e2136b795b5ed41964d51c4bb794cab3c7693916ebbc406979862d63424d6b54ec4998729ce6f348ee2442
-
SSDEEP
12288:iAlc87eqqV5e+wBV6O+jIjAA95tQdSn4WLlt+x6ogM4zK:iASqqHeVBxj9KKtot4zK
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2996 bthuvert.exe 2092 ~43D4.tmp 2704 mshteown.exe -
Loads dropped DLL 3 IoCs
pid Process 2408 063d80ff57a02d0ca1fcdc5277f03227.exe 2408 063d80ff57a02d0ca1fcdc5277f03227.exe 2996 bthuvert.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\cttunatt = "C:\\Users\\Admin\\AppData\\Roaming\\charnger\\bthuvert.exe" 063d80ff57a02d0ca1fcdc5277f03227.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\mshteown.exe 063d80ff57a02d0ca1fcdc5277f03227.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2996 bthuvert.exe 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2996 bthuvert.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2996 2408 063d80ff57a02d0ca1fcdc5277f03227.exe 28 PID 2408 wrote to memory of 2996 2408 063d80ff57a02d0ca1fcdc5277f03227.exe 28 PID 2408 wrote to memory of 2996 2408 063d80ff57a02d0ca1fcdc5277f03227.exe 28 PID 2408 wrote to memory of 2996 2408 063d80ff57a02d0ca1fcdc5277f03227.exe 28 PID 2996 wrote to memory of 2092 2996 bthuvert.exe 29 PID 2996 wrote to memory of 2092 2996 bthuvert.exe 29 PID 2996 wrote to memory of 2092 2996 bthuvert.exe 29 PID 2996 wrote to memory of 2092 2996 bthuvert.exe 29 PID 2092 wrote to memory of 1208 2092 ~43D4.tmp 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\063d80ff57a02d0ca1fcdc5277f03227.exe"C:\Users\Admin\AppData\Local\Temp\063d80ff57a02d0ca1fcdc5277f03227.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Roaming\charnger\bthuvert.exe"C:\Users\Admin\AppData\Roaming\charnger"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\~43D4.tmp1208 490504 2996 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092
-
-
-
-
C:\Windows\SysWOW64\mshteown.exeC:\Windows\SysWOW64\mshteown.exe -s1⤵
- Executes dropped EXE
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
479KB
MD5da3bae71358df3b5eee76423bb288e2b
SHA14f046d355d914ee1dec122835edbab65cfbbba7f
SHA256e617524a6d8d88371bdf8c7d7293a15d8fb39cef5bb292fc13f8000d3af72023
SHA512e9b825e079e7d450ee1d8c01210c3a6b80503609dc702c487ee3d8e4ea6f0c7efdffdd1d5662dad4ecb15e5f1d09efb44c67b9a662d4f185495214b7f46a6507