Resubmissions
15-07-2024 03:33
240715-d4kvnawdjr 1015-07-2024 03:33
240715-d38kbsyepg 1015-07-2024 03:32
240715-d3zx7awcrj 1015-07-2024 03:31
240715-d3acjawcnq 10Analysis
-
max time kernel
1s -
max time network
3s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15-07-2024 03:33
Behavioral task
behavioral1
Sample
Terbium.1.2.exe
Resource
win10-20240404-en
General
-
Target
Terbium.1.2.exe
-
Size
9.5MB
-
MD5
df00bc36e9b00874ff8f495a29d9f429
-
SHA1
3f3140a188943673e7b90b819005548042c9b675
-
SHA256
27e10c80006f2080f85b3b9aff0d165044d1954385ea16d6e48dabaa6a1ec5af
-
SHA512
c79ce66d9c73e64cc3060437bf9d2f9f3f17067b0e4ebb8b30d4863ec417ad1f95c315810168d34058f82804ca59a1d8f442d81c265e57dc330670025b152f88
-
SSDEEP
98304:YVMHJFAvLQWabWp2le10+9XTA8E6oMsaSk5e/UI:PFAvLCev10+9DA16oM1e/UI
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1260739914253991956/NKvC4KymlhPTNJNmbkQtDwm5AXdtAESkrV95KgMKN5kz9Z_06X949ZzR7jGGnoW0AnBX
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" Terbium.1.2.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 api.ipify.org 2 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 4296 Terbium.1.2.exe Token: SeIncreaseQuotaPrivilege 292 wmic.exe Token: SeSecurityPrivilege 292 wmic.exe Token: SeTakeOwnershipPrivilege 292 wmic.exe Token: SeLoadDriverPrivilege 292 wmic.exe Token: SeSystemProfilePrivilege 292 wmic.exe Token: SeSystemtimePrivilege 292 wmic.exe Token: SeProfSingleProcessPrivilege 292 wmic.exe Token: SeIncBasePriorityPrivilege 292 wmic.exe Token: SeCreatePagefilePrivilege 292 wmic.exe Token: SeBackupPrivilege 292 wmic.exe Token: SeRestorePrivilege 292 wmic.exe Token: SeShutdownPrivilege 292 wmic.exe Token: SeDebugPrivilege 292 wmic.exe Token: SeSystemEnvironmentPrivilege 292 wmic.exe Token: SeRemoteShutdownPrivilege 292 wmic.exe Token: SeUndockPrivilege 292 wmic.exe Token: SeManageVolumePrivilege 292 wmic.exe Token: 33 292 wmic.exe Token: 34 292 wmic.exe Token: 35 292 wmic.exe Token: 36 292 wmic.exe Token: SeIncreaseQuotaPrivilege 292 wmic.exe Token: SeSecurityPrivilege 292 wmic.exe Token: SeTakeOwnershipPrivilege 292 wmic.exe Token: SeLoadDriverPrivilege 292 wmic.exe Token: SeSystemProfilePrivilege 292 wmic.exe Token: SeSystemtimePrivilege 292 wmic.exe Token: SeProfSingleProcessPrivilege 292 wmic.exe Token: SeIncBasePriorityPrivilege 292 wmic.exe Token: SeCreatePagefilePrivilege 292 wmic.exe Token: SeBackupPrivilege 292 wmic.exe Token: SeRestorePrivilege 292 wmic.exe Token: SeShutdownPrivilege 292 wmic.exe Token: SeDebugPrivilege 292 wmic.exe Token: SeSystemEnvironmentPrivilege 292 wmic.exe Token: SeRemoteShutdownPrivilege 292 wmic.exe Token: SeUndockPrivilege 292 wmic.exe Token: SeManageVolumePrivilege 292 wmic.exe Token: 33 292 wmic.exe Token: 34 292 wmic.exe Token: 35 292 wmic.exe Token: 36 292 wmic.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4296 wrote to memory of 3236 4296 Terbium.1.2.exe 74 PID 4296 wrote to memory of 3236 4296 Terbium.1.2.exe 74 PID 4296 wrote to memory of 1656 4296 Terbium.1.2.exe 75 PID 4296 wrote to memory of 1656 4296 Terbium.1.2.exe 75 PID 4296 wrote to memory of 292 4296 Terbium.1.2.exe 76 PID 4296 wrote to memory of 292 4296 Terbium.1.2.exe 76 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3236 attrib.exe 1656 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Terbium.1.2.exe"C:\Users\Admin\AppData\Local\Temp\Terbium.1.2.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\Terbium.1.2.exe2⤵
- Views/modifies file attributes
PID:3236
-
-
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe2⤵
- Views/modifies file attributes
PID:1656
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID2⤵
- Suspicious use of AdjustPrivilegeToken
PID:292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.5MB
MD5df00bc36e9b00874ff8f495a29d9f429
SHA13f3140a188943673e7b90b819005548042c9b675
SHA25627e10c80006f2080f85b3b9aff0d165044d1954385ea16d6e48dabaa6a1ec5af
SHA512c79ce66d9c73e64cc3060437bf9d2f9f3f17067b0e4ebb8b30d4863ec417ad1f95c315810168d34058f82804ca59a1d8f442d81c265e57dc330670025b152f88