Analysis
-
max time kernel
119s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
c191911a232d43ab779b28c6a7e13f30N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c191911a232d43ab779b28c6a7e13f30N.exe
Resource
win10v2004-20240802-en
General
-
Target
c191911a232d43ab779b28c6a7e13f30N.exe
-
Size
234KB
-
MD5
c191911a232d43ab779b28c6a7e13f30
-
SHA1
c15bc1cb9f9dc05aede8c4a02e0ec48932e8a88b
-
SHA256
bde6546f5f33d96f749597647efb09ed715fd1626847a4987191312d728e66e0
-
SHA512
3e4856f0c0e723a0b576a20bcb8a05408373c8f6093d79269cf549c643757cd8ca4c407b01f29ec61f16b722058ab34654174be198dd279ac135baddf9cd4875
-
SSDEEP
6144:c73qQ51robXqxHJ72jFNpIqoH4GCAJVkRzQTf0X:c73R1rg6xHJ7+FN6L/LQzQs
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 760 mshtdt32.exe 3044 ~B1D2.tmp 2860 fltMKEYs.exe -
Loads dropped DLL 3 IoCs
pid Process 2376 c191911a232d43ab779b28c6a7e13f30N.exe 2376 c191911a232d43ab779b28c6a7e13f30N.exe 760 mshtdt32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\ddodINFO = "C:\\Users\\Admin\\AppData\\Roaming\\bitsutil\\mshtdt32.exe" c191911a232d43ab779b28c6a7e13f30N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\fltMKEYs.exe c191911a232d43ab779b28c6a7e13f30N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c191911a232d43ab779b28c6a7e13f30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshtdt32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMKEYs.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 760 mshtdt32.exe 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE 1188 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 760 mshtdt32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2376 wrote to memory of 760 2376 c191911a232d43ab779b28c6a7e13f30N.exe 30 PID 2376 wrote to memory of 760 2376 c191911a232d43ab779b28c6a7e13f30N.exe 30 PID 2376 wrote to memory of 760 2376 c191911a232d43ab779b28c6a7e13f30N.exe 30 PID 2376 wrote to memory of 760 2376 c191911a232d43ab779b28c6a7e13f30N.exe 30 PID 760 wrote to memory of 3044 760 mshtdt32.exe 31 PID 760 wrote to memory of 3044 760 mshtdt32.exe 31 PID 760 wrote to memory of 3044 760 mshtdt32.exe 31 PID 760 wrote to memory of 3044 760 mshtdt32.exe 31 PID 3044 wrote to memory of 1188 3044 ~B1D2.tmp 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\c191911a232d43ab779b28c6a7e13f30N.exe"C:\Users\Admin\AppData\Local\Temp\c191911a232d43ab779b28c6a7e13f30N.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Roaming\bitsutil\mshtdt32.exe"C:\Users\Admin\AppData\Roaming\bitsutil"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\~B1D2.tmp1188 239624 760 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044
-
-
-
-
C:\Windows\SysWOW64\fltMKEYs.exeC:\Windows\SysWOW64\fltMKEYs.exe -s1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
234KB
MD5543d4916c42ed034927a224fe312e72d
SHA17be1f5d11b7367accde40921b17ebf836dec039f
SHA256955006f91909155022443d3919f429d3dd2fd246c494a186873df5e3d02b29ef
SHA512230b5d35b137e1febf53da57ce7238513151c59012cbbcd27c6680a722d2e5be19ea23bb822e83864a14343fc8aa034a7904c913e32b52c3b1a868796b3165d8