Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
Delivery 07.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Delivery 07.exe
Resource
win10v2004-20240426-en
General
-
Target
Delivery 07.exe
-
Size
1.2MB
-
MD5
b94b6c27e410388cd4e7dfeb352b75ce
-
SHA1
57252799717e32bccfd57d674c6d44328a17b148
-
SHA256
26833834efb8d0ff6dfea4c7cd8a66b89fb8c04e5142a0a077e0ded715098232
-
SHA512
73c8011c9259e8141e1ba4955d251e314dc08d4332977ab0de661fe1fece205b68225ab3f1f0602899b150c93a7b5e72ba25f17f8125522886ca8df051bff97b
-
SSDEEP
24576:iAHnh+eWsN3skA4RV1Hom2KXMmHaOtBcxkHwFDu6T1D5:lh+ZkldoPK8YaOtOxkHCu8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4320 .exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023428-14.dat autoit_exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4320 set thread context of 4188 4320 .exe 82 PID 4188 set thread context of 3516 4188 svchost.exe 56 PID 4188 set thread context of 2132 4188 svchost.exe 91 PID 2132 set thread context of 3516 2132 netbtugc.exe 56 PID 2132 set thread context of 3592 2132 netbtugc.exe 92 -
description ioc Process Key created \Registry\User\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netbtugc.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 4188 svchost.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4320 .exe 4188 svchost.exe 3516 Explorer.EXE 3516 Explorer.EXE 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe 2132 netbtugc.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2636 Delivery 07.exe 2636 Delivery 07.exe 4320 .exe 4320 .exe 3516 Explorer.EXE 3516 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2636 Delivery 07.exe 2636 Delivery 07.exe 4320 .exe 4320 .exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2636 wrote to memory of 4320 2636 Delivery 07.exe 81 PID 2636 wrote to memory of 4320 2636 Delivery 07.exe 81 PID 2636 wrote to memory of 4320 2636 Delivery 07.exe 81 PID 4320 wrote to memory of 4188 4320 .exe 82 PID 4320 wrote to memory of 4188 4320 .exe 82 PID 4320 wrote to memory of 4188 4320 .exe 82 PID 4320 wrote to memory of 4188 4320 .exe 82 PID 3516 wrote to memory of 2132 3516 Explorer.EXE 91 PID 3516 wrote to memory of 2132 3516 Explorer.EXE 91 PID 3516 wrote to memory of 2132 3516 Explorer.EXE 91 PID 2132 wrote to memory of 3592 2132 netbtugc.exe 92 PID 2132 wrote to memory of 3592 2132 netbtugc.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\Delivery 07.exe"C:\Users\Admin\AppData\Local\Temp\Delivery 07.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\directory\.exe"C:\Users\Admin\AppData\Local\Temp\Delivery 07.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Delivery 07.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4188
-
-
-
-
C:\Windows\SysWOW64\netbtugc.exe"C:\Windows\SysWOW64\netbtugc.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5ceaa69cffce37a5a57e4879c0a1ac08c
SHA122927eda9158670266035e688a7d3a792d59cba9
SHA256a945b9fca774a0a18c17ccb0dd2c9a52b8cfc8692d42b80a6a299180df1027b4
SHA5125b48f9fd0086a5d5c2b4ea311bd35e03352c85b79bf96edc3a075973a7c2f0237726f32a25d24f5fe182329b883a15b120a51168774e0379cfb26eb7bf9c093f
-
Filesize
28KB
MD5cff16ad5f8a5182a27670f5bba0636e3
SHA1c91f67c6ebc45a1c1de9f6a39ec2b433847d27f8
SHA256189dd751ea209961ecf74277b4c26df9b0c032b10e5a33d578f685cfed0b5ddd
SHA512eab81410011723e2f0a68f26ac320a439bbc239df53e3da7806144fe4fee8a42c13d168b514c1791a3fcdfca81878b753e78d3702f1af7e7b1425623c8b8ef82
-
Filesize
1.2MB
MD5b94b6c27e410388cd4e7dfeb352b75ce
SHA157252799717e32bccfd57d674c6d44328a17b148
SHA25626833834efb8d0ff6dfea4c7cd8a66b89fb8c04e5142a0a077e0ded715098232
SHA51273c8011c9259e8141e1ba4955d251e314dc08d4332977ab0de661fe1fece205b68225ab3f1f0602899b150c93a7b5e72ba25f17f8125522886ca8df051bff97b