Resubmissions

26/07/2024, 17:17

240726-vt4y8ascmp 7

Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 17:17

General

  • Target

    Patch JB 2023.x.x.exe

  • Size

    9.8MB

  • MD5

    2225a9180e142415ae27486fc2631809

  • SHA1

    e55621177d23583d5cfb1d0a012c06e73a7c1331

  • SHA256

    78dea6ce89d0ef782aaeddc45abbf492f6b272e8804d9f1528e3fea7aa81b6c6

  • SHA512

    4501aa9878f88ad2665f272c63b46781fc8e6ee64f6406aceeb309399dcbce9aafdf724d6c6d3a9b4c0a6ead89ee49aa148cae710b2c68815ba07e6a1bc72251

  • SSDEEP

    196608:zfYJw5b8ev5zAp9uwi//sSsTUTIZjnX3uAx3N3rgiq3VzO6s3rr7jC:zwJXnp9ul/0UMRnu+3OFFzO13rrfC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Patch JB 2023.x.x.exe
    "C:\Users\Admin\AppData\Local\Temp\Patch JB 2023.x.x.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Windows\system32\cmd.exe
      cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\40TY7PRO.bat" "C:\Users\Admin\AppData\Local\Temp\Patch JB 2023.x.x.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Users\Admin\AppData\Local\Temp\qbF76CC15.02\7z2201.exe
        "C:\Users\Admin\AppData\Local\Temp\qbF76CC15.02\7z2201.exe" /S
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        PID:2408
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Program successfully licensed! "
        3⤵
          PID:1200
        • C:\Windows\system32\msg.exe
          msg *
          3⤵
            PID:2564
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c wmic path win32_LocalTime Get Day,Month,Year /value
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1912
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic path win32_LocalTime Get Day,Month,Year /value
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2572
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c tasklist /fi "imagename eq SbieSvc.exe" /fo csv /nh
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:300
            • C:\Windows\system32\tasklist.exe
              tasklist /fi "imagename eq SbieSvc.exe" /fo csv /nh
              4⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:2236
          • C:\Windows\system32\reg.exe
            reg query "HKLM\SOFTWARE\Microsoft\Alu" /s /reg:32
            3⤵
              PID:2192
            • C:\Windows\system32\reg.exe
              reg Add "HKLM\SOFTWARE\Microsoft\Alu" /f /reg:32
              3⤵
                PID:3000
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SystemInformation" /v "SystemProductName"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1744
                • C:\Windows\system32\reg.exe
                  reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SystemInformation" /v "SystemProductName"
                  4⤵
                    PID:2244
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\Current" /v "SystemProductName"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:304
                  • C:\Windows\system32\reg.exe
                    reg query "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\Current" /v "SystemProductName"
                    4⤵
                      PID:1076

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\40TY7PRO.bat

                Filesize

                52KB

                MD5

                dc730f24799df72d573c61fbe2cfe19f

                SHA1

                ed32a6451d826210590cd935c059db207d2c89ae

                SHA256

                3ad7d102e167a040188c725dfcb789e31e11d11acfd6f395246275744497e320

                SHA512

                7c880e148507b83bba6f4d2fcd787715e20ce36f974c1f02a2725a7e411df0b541b38dce9c19ae9837bfebb3f28f0a533efac4eb5604dfa3ebb3ecc910db6cba

              • C:\Users\Admin\AppData\Local\Temp\qbF76CC15.02\7z2201.exe

                Filesize

                1.2MB

                MD5

                734e95cdbe04f53fe7c28eeaaaad7327

                SHA1

                e49a4d750f83bc81d79f1c4c3f3648a817c7d3da

                SHA256

                8c8fbcf80f0484b48a07bd20e512b103969992dbf81b6588832b08205e3a1b43

                SHA512

                16b02001c35248f18095ba341b08523db327d7aa93a55bcee95aebb22235a71eae21a5a8d19019b10cac3e7764a59d78cf730110bae80acc2ff249bbc7861ad7

              • C:\Users\Admin\AppData\Local\Temp\qbF76CC15.02\cnf

                Filesize

                50B

                MD5

                35e1bb2031151679c925845801adefbe

                SHA1

                c07e1003257cf02ca7b672ac0db075489531729c

                SHA256

                5f62ef0df8a6b126356145b88954c150e2d56c4ee2312de011a36949719a9849

                SHA512

                630f69f51b09f1b33adb88154c5da63f7d4b7f3f7b714a4adac23b0db3e8d66bb4ba1df68b6324ccc8b9498275fe224155d77a9c5e85a7a4c2ae5b33f013d4c5

              • C:\Users\Admin\AppData\Local\Temp\qbF76CC15.02\jb.7z

                Filesize

                67KB

                MD5

                3056453b2ea9a7987180a0f7c6e0601d

                SHA1

                069178ea6b242cd326a2ca2b983816c412ea9307

                SHA256

                b572e1b4af12863e3444049875bc5fdfcf5b126f29938d4d1a46d3a473554c49

                SHA512

                8f86ec1ac4f6190c057816914648a448531f402a7b91dc956ec975a951bc95e52f3228984a5d3b1f609924f40fabe8d8f55f4ecf58db44f0ef94f42e95b0b425

              • C:\Users\Admin\AppData\Local\Temp\qbF76CC15.02\jbk.7z

                Filesize

                7KB

                MD5

                e4e67d6f10c69cb29c4815a2ecda209f

                SHA1

                92eef38f4e992bc00df9d15ad13b244e8c0c407e

                SHA256

                52b7e3123089a575490bbd81342a10ad6aba22fc54c2a7d5e6d1fc421e99f60d

                SHA512

                92f08578a0998370f974ee90925f4f943eb7c039cf4d9ee7c9474a52ee9b1deebd3a8c792de1228f667b0b0cb13871dcfe19a81fa227e60d6efff788330a2d54

              • C:\Users\Admin\AppData\Local\Temp\qbF76CC15.02\jbl.7z

                Filesize

                8.0MB

                MD5

                65a51eeedd7c1924e035b74347b4e484

                SHA1

                3a5afa74bd5eaddb19e6b48b892a91f2fd7665ea

                SHA256

                f5e5de757f9009921df4d15f692ce4331787c276e48999fa09d367829621e43e

                SHA512

                ad41cf2c8a06efb858826191bf8e4ae66d6ea67d7ba7ebeba9f3db13d2999127692640a94357b5a1bc35814e107d306c4d73752d2a999a447fa15455304eef21

              • \Program Files (x86)\7-Zip\7zFM.exe

                Filesize

                574KB

                MD5

                bbb2667d9b2fd922e52883a63e8cd948

                SHA1

                d4238ac5e2eb3ec7236e5e098ee3b31d26efebee

                SHA256

                69392e292a0e7195e0c96bbbfe989949d044b63dbce2e5324f1bb99aa2560e3f

                SHA512

                2f801ae372ca3fc4cd858b6d1783977c8357e5616f45311ffff70b3eee20490f2c6e34a12139a6c0b9faaaf6e59985fabc1cae22510e6b632bae425a58793681

              • memory/1828-252-0x0000000000400000-0x0000000000494000-memory.dmp

                Filesize

                592KB

              • memory/2396-132-0x0000000002310000-0x0000000002311000-memory.dmp

                Filesize

                4KB