Analysis
-
max time kernel
129s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 15:40
Static task
static1
Behavioral task
behavioral1
Sample
Cbmefxrmnv.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Cbmefxrmnv.exe
Resource
win10v2004-20240802-en
General
-
Target
Cbmefxrmnv.exe
-
Size
2.0MB
-
MD5
170fb4fa36de83de39a9e228f17b0060
-
SHA1
4a9ee216442b6fc98152fe9e80e763d95caede6c
-
SHA256
145dbb397089105d6d06a861d62b48be9fd2527fb7d023b114cf05b723cd3858
-
SHA512
168f389ce7dd0a7feacf6505c1a52a6743900974dd11af86b2e07998817b2021f62dec0b00daffbc212fd51337500fa9ff1d669d708103de2337195db936ee8f
-
SSDEEP
24576:qM7wJrWiSgXXHgdjvYiKs7KHxGoz8oVWtnq4cPgv07ZNAqbJBO+kLQL3cOEKFHt:r7wJVSoFL3cYFH
Malware Config
Extracted
systembc
claywyaeropumps.com
185.43.220.45
-
dns
5.132.191.104
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
gjob.exegjob.exegjob.exegjob.exegjob.exepid process 5856 gjob.exe 5584 gjob.exe 5668 gjob.exe 5916 gjob.exe 2896 gjob.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Cbmefxrmnv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\VolumeInfo = "C:\\Users\\Admin\\AppData\\Roaming\\VolumeInfo.exe" Cbmefxrmnv.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Cbmefxrmnv.exegjob.exegjob.exedescription pid process target process PID 3056 set thread context of 5700 3056 Cbmefxrmnv.exe Cbmefxrmnv.exe PID 5856 set thread context of 5584 5856 gjob.exe gjob.exe PID 5856 set thread context of 5668 5856 gjob.exe gjob.exe PID 5916 set thread context of 2896 5916 gjob.exe gjob.exe -
Drops file in Windows directory 1 IoCs
Processes:
Cbmefxrmnv.exedescription ioc process File created C:\Windows\Tasks\Test Task17.job Cbmefxrmnv.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Cbmefxrmnv.exeCbmefxrmnv.exegjob.exegjob.exegjob.exegjob.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbmefxrmnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbmefxrmnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gjob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gjob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gjob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gjob.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
gjob.exepid process 5856 gjob.exe 5856 gjob.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Cbmefxrmnv.exegjob.exegjob.exedescription pid process Token: SeDebugPrivilege 3056 Cbmefxrmnv.exe Token: SeDebugPrivilege 3056 Cbmefxrmnv.exe Token: SeDebugPrivilege 5856 gjob.exe Token: SeDebugPrivilege 5856 gjob.exe Token: SeDebugPrivilege 5916 gjob.exe Token: SeDebugPrivilege 5916 gjob.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
Cbmefxrmnv.exetaskeng.exegjob.exegjob.exedescription pid process target process PID 3056 wrote to memory of 5700 3056 Cbmefxrmnv.exe Cbmefxrmnv.exe PID 3056 wrote to memory of 5700 3056 Cbmefxrmnv.exe Cbmefxrmnv.exe PID 3056 wrote to memory of 5700 3056 Cbmefxrmnv.exe Cbmefxrmnv.exe PID 3056 wrote to memory of 5700 3056 Cbmefxrmnv.exe Cbmefxrmnv.exe PID 3056 wrote to memory of 5700 3056 Cbmefxrmnv.exe Cbmefxrmnv.exe PID 3056 wrote to memory of 5700 3056 Cbmefxrmnv.exe Cbmefxrmnv.exe PID 3056 wrote to memory of 5700 3056 Cbmefxrmnv.exe Cbmefxrmnv.exe PID 3056 wrote to memory of 5700 3056 Cbmefxrmnv.exe Cbmefxrmnv.exe PID 3056 wrote to memory of 5700 3056 Cbmefxrmnv.exe Cbmefxrmnv.exe PID 5820 wrote to memory of 5856 5820 taskeng.exe gjob.exe PID 5820 wrote to memory of 5856 5820 taskeng.exe gjob.exe PID 5820 wrote to memory of 5856 5820 taskeng.exe gjob.exe PID 5820 wrote to memory of 5856 5820 taskeng.exe gjob.exe PID 5856 wrote to memory of 5584 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5584 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5584 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5584 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5584 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5584 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5584 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5584 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5584 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5668 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5668 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5668 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5668 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5668 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5668 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5668 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5668 5856 gjob.exe gjob.exe PID 5856 wrote to memory of 5668 5856 gjob.exe gjob.exe PID 5820 wrote to memory of 5916 5820 taskeng.exe gjob.exe PID 5820 wrote to memory of 5916 5820 taskeng.exe gjob.exe PID 5820 wrote to memory of 5916 5820 taskeng.exe gjob.exe PID 5820 wrote to memory of 5916 5820 taskeng.exe gjob.exe PID 5916 wrote to memory of 2896 5916 gjob.exe gjob.exe PID 5916 wrote to memory of 2896 5916 gjob.exe gjob.exe PID 5916 wrote to memory of 2896 5916 gjob.exe gjob.exe PID 5916 wrote to memory of 2896 5916 gjob.exe gjob.exe PID 5916 wrote to memory of 2896 5916 gjob.exe gjob.exe PID 5916 wrote to memory of 2896 5916 gjob.exe gjob.exe PID 5916 wrote to memory of 2896 5916 gjob.exe gjob.exe PID 5916 wrote to memory of 2896 5916 gjob.exe gjob.exe PID 5916 wrote to memory of 2896 5916 gjob.exe gjob.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cbmefxrmnv.exe"C:\Users\Admin\AppData\Local\Temp\Cbmefxrmnv.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Cbmefxrmnv.exe"C:\Users\Admin\AppData\Local\Temp\Cbmefxrmnv.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5700
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B33076F5-452A-4302-AD9F-A7EA1124E9A0} S-1-5-21-3450744190-3404161390-554719085-1000:PDIZKVQX\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:5820 -
C:\ProgramData\pbma\gjob.exeC:\ProgramData\pbma\gjob.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5856 -
C:\ProgramData\pbma\gjob.exe"C:\ProgramData\pbma\gjob.exe"3⤵
- Executes dropped EXE
PID:5584
-
-
C:\ProgramData\pbma\gjob.exe"C:\ProgramData\pbma\gjob.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5668
-
-
-
C:\ProgramData\pbma\gjob.exeC:\ProgramData\pbma\gjob.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5916 -
C:\ProgramData\pbma\gjob.exe"C:\ProgramData\pbma\gjob.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5170fb4fa36de83de39a9e228f17b0060
SHA14a9ee216442b6fc98152fe9e80e763d95caede6c
SHA256145dbb397089105d6d06a861d62b48be9fd2527fb7d023b114cf05b723cd3858
SHA512168f389ce7dd0a7feacf6505c1a52a6743900974dd11af86b2e07998817b2021f62dec0b00daffbc212fd51337500fa9ff1d669d708103de2337195db936ee8f
-
Filesize
212B
MD552b10d8474e4d0d75fbd6a91b5fbc053
SHA1babbcadccbf0c94a9fe0b3f15f2c49a39c76ddd0
SHA2569ef40b23dc494303ef86e5251e44ebc6a09ae39ec1bb09fb6a2438d2467ed724
SHA512b7f5186c3246ede17d8cd6f6edb9664bc9e7d88792ba102e6f0f1d2454f5ebb5a318334d64fe648b87efe8cf92dd8f2c86136112676a9a9106e7e3e51d6708ce