Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 16:50
Static task
static1
Behavioral task
behavioral1
Sample
c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21.exe
Resource
win7-20240705-en
General
-
Target
c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21.exe
-
Size
281KB
-
MD5
a131f7c0c6109b3d701767b24a1ec9b8
-
SHA1
2d42e6211039255898af5606ce8f7c60b31782de
-
SHA256
c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21
-
SHA512
a7724856692645bf37c3504771895cda1d75e9d09a9b15d923e0bd5aa323c9949ff5fe790724eb89b4cdeb3631688b5d07edb2d2bdbb2ef6462ac72cebd001fd
-
SSDEEP
6144:8oTJaMlWeC/iKbHiiq1YmNin91Izx2KQcVWMo4:8uzlWeC/iKbfeSnox7
Malware Config
Extracted
arkei
Default
coin-file-file-19.com/tratata.php
Signatures
-
resource yara_rule behavioral1/files/0x00080000000120fd-3.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2416 brTOGrD.exe -
Loads dropped DLL 2 IoCs
pid Process 2688 c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21.exe 2688 c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe brTOGrD.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe brTOGrD.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe brTOGrD.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe brTOGrD.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe brTOGrD.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe brTOGrD.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe brTOGrD.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe brTOGrD.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE brTOGrD.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE brTOGrD.exe File opened for modification C:\Program Files\7-Zip\7z.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe brTOGrD.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE brTOGrD.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe brTOGrD.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe brTOGrD.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe brTOGrD.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe brTOGrD.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{DDB7E7A7-D625-45EC-93C8-C15199469555}\chrome_installer.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe brTOGrD.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe brTOGrD.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE brTOGrD.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe brTOGrD.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe brTOGrD.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe brTOGrD.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE brTOGrD.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe brTOGrD.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe brTOGrD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brTOGrD.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2416 2688 c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21.exe 30 PID 2688 wrote to memory of 2416 2688 c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21.exe 30 PID 2688 wrote to memory of 2416 2688 c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21.exe 30 PID 2688 wrote to memory of 2416 2688 c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21.exe 30 PID 2416 wrote to memory of 3044 2416 brTOGrD.exe 32 PID 2416 wrote to memory of 3044 2416 brTOGrD.exe 32 PID 2416 wrote to memory of 3044 2416 brTOGrD.exe 32 PID 2416 wrote to memory of 3044 2416 brTOGrD.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21.exe"C:\Users\Admin\AppData\Local\Temp\c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\brTOGrD.exeC:\Users\Admin\AppData\Local\Temp\brTOGrD.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\541e7aca.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189B
MD560fef086cc620aafd40a8998b98fca42
SHA1e8df1dfea6ea7fed49a87e35b57d0c2d5de5eae0
SHA2560409af030d0b725fdee40d48893e95106fa9521d1cbcc7544af3e39dad22d23c
SHA512728bdd5247200bd25e860da873dcfed9ebc3bdbb7fcb596f6d200a15d9a3f7b490656d2fb74615b6618095fa0d7c34c8bf7192adb9277812a67a7ea2d3389a14
-
Filesize
15KB
MD5f7d21de5c4e81341eccd280c11ddcc9a
SHA1d4e9ef10d7685d491583c6fa93ae5d9105d815bd
SHA2564485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794
SHA512e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3