Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe
Resource
win10v2004-20240709-en
General
-
Target
d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe
-
Size
484KB
-
MD5
7a075d0b2c92fd6ba552e818e1ab9c9d
-
SHA1
a2dae3f9b5529e663ac7e43cad281ef550760a6a
-
SHA256
d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0
-
SHA512
f30a1e77eeedfbdf08787f2422afb28a54d195dd429b36c54a6cc62ab7a1b8204010442a84483d65317b0fa10dfffead7a9a1fe8cb605f409b9b7d5da9a269b8
-
SSDEEP
12288:GLPkCDt1EG2XVekhdeTlKKbob6MwE/X+Iwyr:GLPkQ1bqAdxMw+hwY
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2712 dcomubst.exe 2768 ~754F.tmp 2336 calcetsh.exe -
Loads dropped DLL 3 IoCs
pid Process 2932 d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe 2932 d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe 2712 dcomubst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\AtBrokup = "C:\\Users\\Admin\\AppData\\Roaming\\RMAcerpt\\dcomubst.exe" d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\calcetsh.exe d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1936 2932 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcomubst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calcetsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2712 dcomubst.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE 2336 calcetsh.exe 1236 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2712 dcomubst.exe Token: SeShutdownPrivilege 1236 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2712 2932 d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe 30 PID 2932 wrote to memory of 2712 2932 d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe 30 PID 2932 wrote to memory of 2712 2932 d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe 30 PID 2932 wrote to memory of 2712 2932 d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe 30 PID 2712 wrote to memory of 2768 2712 dcomubst.exe 31 PID 2712 wrote to memory of 2768 2712 dcomubst.exe 31 PID 2712 wrote to memory of 2768 2712 dcomubst.exe 31 PID 2712 wrote to memory of 2768 2712 dcomubst.exe 31 PID 2768 wrote to memory of 1236 2768 ~754F.tmp 21 PID 2932 wrote to memory of 1936 2932 d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe 33 PID 2932 wrote to memory of 1936 2932 d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe 33 PID 2932 wrote to memory of 1936 2932 d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe 33 PID 2932 wrote to memory of 1936 2932 d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe"C:\Users\Admin\AppData\Local\Temp\d4e8cb8331e8473a3918ac51534ae8c5ecd9c28534e8bd9c8eb96f76162cf2d0.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\RMAcerpt\dcomubst.exe"C:\Users\Admin\AppData\Roaming\RMAcerpt"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\~754F.tmp1236 496136 2712 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 2523⤵
- Program crash
PID:1936
-
-
-
C:\Windows\SysWOW64\calcetsh.exeC:\Windows\SysWOW64\calcetsh.exe -s1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5aac3165ece2959f39ff98334618d10d9
SHA1020a191bfdc70c1fbd3bf74cd7479258bd197f51
SHA25696fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974
SHA5129eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf
-
Filesize
484KB
MD57bbe89c16d0b6a9b6b1d02cf8d6de585
SHA1b57d66c533d56cdb141ffa9edf2580fd3eb9a557
SHA256db8bf6f534feb3044c5aa99d2fec5dc45befcbcb59df4a9cd33e05c888a45aee
SHA512d85b1c77c473f552702317bbddda9120187751f05b48658c91698ddd33422f5e0ba4003afeca92877cd11886c44189a090fc041f9fb896dfbd7ba57551477447