Overview
overview
10Static
static
10ae1c457e49...10.exe
windows7-x64
10ae1c457e49...10.exe
windows10-2004-x64
10$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...S3.dll
windows7-x64
3$PLUGINSDI...S3.dll
windows10-2004-x64
3$PLUGINSDI...T3.dll
windows7-x64
3$PLUGINSDI...T3.dll
windows10-2004-x64
3$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ce.dll
windows7-x64
3$PLUGINSDI...ce.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$TEMP/Temp...BU.exe
windows7-x64
6$TEMP/Temp...BU.exe
windows10-2004-x64
7$TEMP/Temp...ce.exe
windows7-x64
3$TEMP/Temp...ce.exe
windows10-2004-x64
3$TEMP/Temp...SE.exe
windows7-x64
3$TEMP/Temp...SE.exe
windows10-2004-x64
3$TEMP/Temp...ng.dll
windows7-x64
1$TEMP/Temp...ng.dll
windows10-2004-x64
1$TEMP/Temp...HI.dll
windows7-x64
1$TEMP/Temp...HI.dll
windows10-2004-x64
1$TEMP/Temp...ZE.dll
windows7-x64
1$TEMP/Temp...ZE.dll
windows10-2004-x64
1Analysis
-
max time kernel
34s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 23:09
Behavioral task
behavioral1
Sample
ae1c457e4968758551c0e99ce62cb87c02b6c134afda6d1d700da3b37a2d7610.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ae1c457e4968758551c0e99ce62cb87c02b6c134afda6d1d700da3b37a2d7610.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/MyLangDLLS3.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/MyLangDLLS3.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/MyLangDLLT3.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/MyLangDLLT3.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/NSIS_SkinCrafter_Plugin.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/NSIS_SkinCrafter_Plugin.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/Plugin.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/Plugin.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/cService.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/cService.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$TEMP/TemporaryComodoProduct/CBU.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$TEMP/TemporaryComodoProduct/CBU.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$TEMP/TemporaryComodoProduct/COSService.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$TEMP/TemporaryComodoProduct/COSService.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$TEMP/TemporaryComodoProduct/CSE.exe
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
$TEMP/TemporaryComodoProduct/CSE.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$TEMP/TemporaryComodoProduct/GUIlang.dll
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
$TEMP/TemporaryComodoProduct/GUIlang.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$TEMP/TemporaryComodoProduct/GUIlang_CHI.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
$TEMP/TemporaryComodoProduct/GUIlang_CHI.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
$TEMP/TemporaryComodoProduct/GUIlang_CZE.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
$TEMP/TemporaryComodoProduct/GUIlang_CZE.dll
Resource
win10v2004-20240709-en
General
-
Target
$TEMP/TemporaryComodoProduct/CBU.exe
-
Size
11.6MB
-
MD5
2c6d19e7d5f91b5ef322df2f30e6ad53
-
SHA1
2acd52bbe67614ea784899e9a96898bb2d5908ff
-
SHA256
442f3b1a6a282dedaf4e39de36af4bcce2c0b0c145d8895c7f236bc8576c84b6
-
SHA512
d5db241a31693128199bbe588c9091c503c81b55bfdf5cb380a83f4a00a783aff3cbca25e03d3f1763f057b6f056c805d0ee093c6022baf08584f5ee3c85ec6f
-
SSDEEP
98304:GN8nfosYu8Ok2ZPtHGuVGSjk3pH9NOi/59xF:GN8nf9udSelKinxF
Malware Config
Signatures
-
pid Process 2840 cmd.exe 2692 ARP.EXE 3044 cmd.exe 3012 ARP.EXE 2416 cmd.exe 1280 ARP.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1672 2436 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CBU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARP.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9F1C8520-4C89-4688-8560-5839AAB4D46B} CBU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9F1C8520-4C89-4688-8560-5839AAB4D46B}\UserID = "3EB4397E05264d70AEA9669CD4E22B65" CBU.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 CBU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 CBU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 CBU.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2436 CBU.exe 2436 CBU.exe 2436 CBU.exe 2436 CBU.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2840 2436 CBU.exe 29 PID 2436 wrote to memory of 2840 2436 CBU.exe 29 PID 2436 wrote to memory of 2840 2436 CBU.exe 29 PID 2436 wrote to memory of 2840 2436 CBU.exe 29 PID 2840 wrote to memory of 2692 2840 cmd.exe 31 PID 2840 wrote to memory of 2692 2840 cmd.exe 31 PID 2840 wrote to memory of 2692 2840 cmd.exe 31 PID 2840 wrote to memory of 2692 2840 cmd.exe 31 PID 2436 wrote to memory of 3044 2436 CBU.exe 32 PID 2436 wrote to memory of 3044 2436 CBU.exe 32 PID 2436 wrote to memory of 3044 2436 CBU.exe 32 PID 2436 wrote to memory of 3044 2436 CBU.exe 32 PID 3044 wrote to memory of 3012 3044 cmd.exe 34 PID 3044 wrote to memory of 3012 3044 cmd.exe 34 PID 3044 wrote to memory of 3012 3044 cmd.exe 34 PID 3044 wrote to memory of 3012 3044 cmd.exe 34 PID 2436 wrote to memory of 2416 2436 CBU.exe 35 PID 2436 wrote to memory of 2416 2436 CBU.exe 35 PID 2436 wrote to memory of 2416 2436 CBU.exe 35 PID 2436 wrote to memory of 2416 2436 CBU.exe 35 PID 2416 wrote to memory of 1280 2416 cmd.exe 37 PID 2416 wrote to memory of 1280 2416 cmd.exe 37 PID 2416 wrote to memory of 1280 2416 cmd.exe 37 PID 2416 wrote to memory of 1280 2416 cmd.exe 37 PID 2436 wrote to memory of 1672 2436 CBU.exe 39 PID 2436 wrote to memory of 1672 2436 CBU.exe 39 PID 2436 wrote to memory of 1672 2436 CBU.exe 39 PID 2436 wrote to memory of 1672 2436 CBU.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\TemporaryComodoProduct\CBU.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\TemporaryComodoProduct\CBU.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c arp -a > C:\Users\Admin\AppData\Local\Temp\iplist.txt2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\ARP.EXEarp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c arp -a > C:\Users\Admin\AppData\Local\Temp\iplist.txt2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\ARP.EXEarp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c arp -a > C:\Users\Admin\AppData\Local\Temp\iplist.txt2⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\ARP.EXEarp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1280
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 27762⤵
- Program crash
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5112ad29e9cc05affe0b9b47aea0f4cf6
SHA16a70b46220690773171b15847a932ef6f660e112
SHA2569190255fe3bd5f7f50253fd2b82f120e23b931cd6ccf7bf79584dfcb6d7736ca
SHA51221e17c9a8d3757f05454ea8884e09e4286adcbf5fbc339974aba49121ddaf7bde9302ff2f51fcad36a06b1b38a68932ba37d7391a8fe0f38708878fbad524cb2
-
Filesize
5KB
MD57f406ccc80d8f5e3f8eb0e0497b8bf3c
SHA1941f4576cb9eb43be9ce97c9e8679aadbc7b1801
SHA256e2157cbe7cf37926228f564dce5039e979adb34f66e016a9e6decfe16710ca73
SHA512efb855be2a7a50b882226664b74390506a1b4f147ca6108afd48d6fe17e12fa7d30d75a5129820e7a8f9e8264fe0645233e0167317e524871d091f76e2bf35b8
-
Filesize
104B
MD57d5931d6d33c2e264d05d1850be2a39f
SHA16708d90cd7368d355c101ab1f5903b79eccc3c4a
SHA2562afcca818a534e4f75cf61dc5552400d75406e11830aa7a8a5fd841fe571a723
SHA51283a5de9562b1a9212d20f310f93a23c4e75ea764dcd634af04e8e114e2ff783993ad079aca2e4ee4676cd013c06f3657a9f6a54b7dd72a30836c4fc8e8f91628
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
551B
MD52bdc63cd4a210a962574907e0c408e2a
SHA1d483145110cc6edc2f06ed977573a89024084ecc
SHA256b2cabe016b39c5fccd87b89d1fe598f2e5338ba73c2c1e8b38c0b8c1512b06be
SHA512dfaf0bffa9037d1f244b9ea111996571c580e9e1c325d45be86e729c239f01549cfbd49654827e83bb34f4729a212731dd3c619ce15f5f412e0fe8973506bfa7