Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
bfa871fe293c641b79ec90cae247b480N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bfa871fe293c641b79ec90cae247b480N.exe
Resource
win10v2004-20240802-en
General
-
Target
bfa871fe293c641b79ec90cae247b480N.exe
-
Size
525KB
-
MD5
bfa871fe293c641b79ec90cae247b480
-
SHA1
c9f3cef1c9ccdf0e32ad876487a5ad9eb03e53fe
-
SHA256
300862b06f28e828f7ad342aefa3e5e4b9ff94a95031f95d112b470bf7647c7d
-
SHA512
ca01c3d7c46af0e58ca9c13707078dbeced5d510a68cd5e309563ac9635162f1e1acb4923ae95a7caf3144bdf11999f2320f5e0db815cd78ac8bf8de6888f95b
-
SSDEEP
3072:rtwizQTj8CSUYf8W3nSjen++Bj88OZS0/Qe2HdOLlqw1aQS0Tm2TdwnN0gUydt2J:huj8NDF3OR9/Qe2HdklrSqZghdt8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2240 LiveMessageCenter.exe -
Loads dropped DLL 2 IoCs
pid Process 2420 casino_extensions.exe 2420 casino_extensions.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File created C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Internet Explorer\casino_extensions.exe LiveMessageCenter.exe File created C:\Program Files (x86)\Internet Explorer\$$202803s.bat casino_extensions.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfa871fe293c641b79ec90cae247b480N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language casino_extensions.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LiveMessageCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language casino_extensions.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2240 LiveMessageCenter.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1208 bfa871fe293c641b79ec90cae247b480N.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2420 1208 bfa871fe293c641b79ec90cae247b480N.exe 31 PID 1208 wrote to memory of 2420 1208 bfa871fe293c641b79ec90cae247b480N.exe 31 PID 1208 wrote to memory of 2420 1208 bfa871fe293c641b79ec90cae247b480N.exe 31 PID 1208 wrote to memory of 2420 1208 bfa871fe293c641b79ec90cae247b480N.exe 31 PID 2420 wrote to memory of 2240 2420 casino_extensions.exe 32 PID 2420 wrote to memory of 2240 2420 casino_extensions.exe 32 PID 2420 wrote to memory of 2240 2420 casino_extensions.exe 32 PID 2420 wrote to memory of 2240 2420 casino_extensions.exe 32 PID 2240 wrote to memory of 2188 2240 LiveMessageCenter.exe 33 PID 2240 wrote to memory of 2188 2240 LiveMessageCenter.exe 33 PID 2240 wrote to memory of 2188 2240 LiveMessageCenter.exe 33 PID 2240 wrote to memory of 2188 2240 LiveMessageCenter.exe 33 PID 2188 wrote to memory of 2748 2188 casino_extensions.exe 34 PID 2188 wrote to memory of 2748 2188 casino_extensions.exe 34 PID 2188 wrote to memory of 2748 2188 casino_extensions.exe 34 PID 2188 wrote to memory of 2748 2188 casino_extensions.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfa871fe293c641b79ec90cae247b480N.exe"C:\Users\Admin\AppData\Local\Temp\bfa871fe293c641b79ec90cae247b480N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\LiveMessageCenter.exeC:\Windows\system32\LiveMessageCenter.exe /part23⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"4⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.execmd /c $$2028~1.BAT5⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81B
MD54777bf695815d870d27ed4a38a8f0840
SHA1565412b5182bca7a221448dba78369c42d1c4a0c
SHA256c08018226d9a45ab277a01ca35f519ff7ea1cb450d080e24b0f590739654241d
SHA51287e792d326c5a9d2d92984ec4c34d2af9d616a4676a7d69df73b09975fd077d96077ae2528b6fc05752110eb4e406c3e9d94d49d0a74eeaba6bc6a48bca8ac1d
-
Filesize
542KB
MD5a719677d075e0c306d22a45d40820120
SHA11ffe3cfc0e132683aedcec2b696a6c08a396c887
SHA25690511236f5731078c988cb3e941fca89a47218574ded187d29ee85e7dfd82675
SHA51248ded05f83356183dd1e7c24ea537f777a6d25fa3608977e74da06a4c32fd11e2e697e5d3625ff8671c2fff5e2c52a5d7c628807109f4cb73b31578072b699cb
-
Filesize
533KB
MD5f39a19f956e5a4a55072a05f7086adc8
SHA17b6e020b22645aa3858ecfeb9f5fafa2f6cdde71
SHA25614d62e400c6534307ffb08a4d0ef4c0824c8ef953b69345eb349c427544aa1d8
SHA512f5031fa5364f0cc5b92603c55df1dd50ea79336ea3b99a15849c8fee0511ea06f037bea7def562272903a5fb737fc5633b4941b9d68a1d51618e0832c0fe9d64