Overview
overview
3Static
static
1certbash.zip
windows7-x64
1certbash.zip
windows10-2004-x64
1.bash_history
windows7-x64
3.bash_history
windows10-2004-x64
3.bash_logout
windows7-x64
3.bash_logout
windows10-2004-x64
3.bashrc
windows7-x64
3.bashrc
windows10-2004-x64
3.profile
windows7-x64
3.profile
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 17:13
Static task
static1
Behavioral task
behavioral1
Sample
certbash.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
certbash.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
.bash_history
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
.bash_history
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
.bash_logout
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
.bash_logout
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
.bashrc
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
.bashrc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
.profile
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
.profile
Resource
win10v2004-20240802-en
General
-
Target
.bashrc
-
Size
3KB
-
MD5
1f98b8f3f3c8f8927eca945d59dcc1c6
-
SHA1
c4d853993e323432cb84359de2c319b9a767b729
-
SHA256
342099da4dd28c394d3f8782d90d7465cb2eaa611193f8f378d6918261cb9bb8
-
SHA512
33bb97936e54fe797b5046ece9c04313306fdc1470c959593f5cc2c641066372f2aee759db3a1bf45470b10c98ca964388172ded77eacaf2500e428d4f00331f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4018b83500fbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31128320" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31128320" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31128320" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "892671366" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "896577796" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4089ba3500fbda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{60C0B645-66F3-11EF-84CD-D2EB330F3545} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "892671366" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009f792707ad2f014a935b50bc1110c16d00000000020000000000106600000001000020000000481636cb708d5f7cdc63a1758c4b44d85aa6c84be3f997d94a8846ac82f402fe000000000e8000000002000020000000a6f493e5f4636c49311ab1acc14c633ca27bf203f897778ad30996d32e8e655b2000000010dd1abf9c891d7e6959f32acfbe0630a151f81f27e4d1735c9d57f53a1ea4f6400000009185ccc1b8ff120d4edf9f99f712d73ff25d9df99a0819260ab0ab02ae6d29fb8fab96e429801acec52990e6263eeca722391affc5b66728a21b2f8d12e713d3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009f792707ad2f014a935b50bc1110c16d00000000020000000000106600000001000020000000760143346accca8a3cc905ee610063dff6b734f80c213af3f070bac825338ffc000000000e80000000020000200000002143ecc45727fdc466c99e0ffdda096fb3e502886e2ab1e3b2a0b0a211a723492000000096c241c90ccec0a5f3010d1fe518a7c01207bea52b96c2c295361ff6b4de5f984000000021a54753e290789ae923f0b027474f5658476358855b7ad17df522e7303bae87ff61f1f1aef4180fd0241894bbc93c3d6eff623d17afd5a461bf23949d655575 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid Process 4460 iexplore.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
OpenWith.exeiexplore.exeIEXPLORE.EXEpid Process 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4460 iexplore.exe 4460 iexplore.exe 3428 IEXPLORE.EXE 3428 IEXPLORE.EXE 3428 IEXPLORE.EXE 3428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
OpenWith.exeiexplore.exedescription pid Process procid_target PID 4992 wrote to memory of 4460 4992 OpenWith.exe 109 PID 4992 wrote to memory of 4460 4992 OpenWith.exe 109 PID 4460 wrote to memory of 3428 4460 iexplore.exe 111 PID 4460 wrote to memory of 3428 4460 iexplore.exe 111 PID 4460 wrote to memory of 3428 4460 iexplore.exe 111
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\.bashrc1⤵
- Modifies registry class
PID:3788
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.bashrc2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4460 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3428
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD57df4410dddbe5651a1b9598a52b5d0cd
SHA1dd463cb26e529070a56791e836e1fee3aa3800ae
SHA25627c2ee5e00969700834ae5ae1f7484a0b3c88d0853307626fe926327cc54cc16
SHA51249b8fda8f9a3a6ddf8e16ef2ee732f9b9e919e521d06b83dcfce121183d58daf5476decaa506c84346740d3fafe1b883ff033807ff7ab5cfb3f6ae63bdab88a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD517e21349203d69418ffcf6794c11e432
SHA1e57314f4b3dac8aed09a0e2c84675eb8250745c4
SHA2567956f72e9fa1bc4921bef489a680c8289e22705eedf5597e37011eebd3e87476
SHA512b8791daeeb405755cbf501c0c486f83e8c4cf96cd42c0f05c3555f1942fa2a08821f2c26121d772863b8ccd090dc104a400b0e59dae1f8cc2b02f92ee02d201f