Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
2badf31ca47a04db62ddc88bd451f87bf1526ac639fcbd988b3139fa47e81fe6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2badf31ca47a04db62ddc88bd451f87bf1526ac639fcbd988b3139fa47e81fe6.exe
Resource
win10v2004-20240802-en
General
-
Target
2badf31ca47a04db62ddc88bd451f87bf1526ac639fcbd988b3139fa47e81fe6.exe
-
Size
536KB
-
MD5
a33a920d6816318d07aaa6c0618b6eda
-
SHA1
07b9c2019f2768acdf4a8dfa2db75f6e5fc21914
-
SHA256
2badf31ca47a04db62ddc88bd451f87bf1526ac639fcbd988b3139fa47e81fe6
-
SHA512
4a0b4e8ced72baa481de50f3ee8ec8b1a3d47c0035256d11d1518c7dc79b3b325ca35d5ac1d6ca7bb90df92ffe1334fa623cfbd954f296166193328dd4b6962f
-
SSDEEP
3072:ktwizQTj8CSUYf8W3nSjen++Bj88OZS0/Qe2HdOLlqw1aQnj74y0+xuZGe54bDaC:kuj8NDF3OR9/Qe2Hdklrn4Kd3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 casino_extensions.exe -
Loads dropped DLL 2 IoCs
pid Process 2712 casino_extensions.exe 2712 casino_extensions.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File created C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File created C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Internet Explorer\casino_extensions.exe casino_extensions.exe File created C:\Program Files (x86)\Internet Explorer\$$202803s.bat casino_extensions.exe File created C:\Program Files (x86)\Internet Explorer\$$202803s.bat casino_extensions.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2164 2712 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2badf31ca47a04db62ddc88bd451f87bf1526ac639fcbd988b3139fa47e81fe6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language casino_extensions.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language casino_extensions.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language casino_extensions.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2676 2badf31ca47a04db62ddc88bd451f87bf1526ac639fcbd988b3139fa47e81fe6.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2712 2676 2badf31ca47a04db62ddc88bd451f87bf1526ac639fcbd988b3139fa47e81fe6.exe 30 PID 2676 wrote to memory of 2712 2676 2badf31ca47a04db62ddc88bd451f87bf1526ac639fcbd988b3139fa47e81fe6.exe 30 PID 2676 wrote to memory of 2712 2676 2badf31ca47a04db62ddc88bd451f87bf1526ac639fcbd988b3139fa47e81fe6.exe 30 PID 2676 wrote to memory of 2712 2676 2badf31ca47a04db62ddc88bd451f87bf1526ac639fcbd988b3139fa47e81fe6.exe 30 PID 2712 wrote to memory of 2796 2712 casino_extensions.exe 31 PID 2712 wrote to memory of 2796 2712 casino_extensions.exe 31 PID 2712 wrote to memory of 2796 2712 casino_extensions.exe 31 PID 2712 wrote to memory of 2796 2712 casino_extensions.exe 31 PID 2796 wrote to memory of 2716 2796 casino_extensions.exe 32 PID 2796 wrote to memory of 2716 2796 casino_extensions.exe 32 PID 2796 wrote to memory of 2716 2796 casino_extensions.exe 32 PID 2796 wrote to memory of 2716 2796 casino_extensions.exe 32 PID 2716 wrote to memory of 2764 2716 casino_extensions.exe 33 PID 2716 wrote to memory of 2764 2716 casino_extensions.exe 33 PID 2716 wrote to memory of 2764 2716 casino_extensions.exe 33 PID 2716 wrote to memory of 2764 2716 casino_extensions.exe 33 PID 2712 wrote to memory of 2164 2712 casino_extensions.exe 34 PID 2712 wrote to memory of 2164 2712 casino_extensions.exe 34 PID 2712 wrote to memory of 2164 2712 casino_extensions.exe 34 PID 2712 wrote to memory of 2164 2712 casino_extensions.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2badf31ca47a04db62ddc88bd451f87bf1526ac639fcbd988b3139fa47e81fe6.exe"C:\Users\Admin\AppData\Local\Temp\2badf31ca47a04db62ddc88bd451f87bf1526ac639fcbd988b3139fa47e81fe6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\casino_extensions.exeC:\Windows\system32\casino_extensions.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"4⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c $$2028~1.BAT5⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 2363⤵
- Program crash
PID:2164
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81B
MD54777bf695815d870d27ed4a38a8f0840
SHA1565412b5182bca7a221448dba78369c42d1c4a0c
SHA256c08018226d9a45ab277a01ca35f519ff7ea1cb450d080e24b0f590739654241d
SHA51287e792d326c5a9d2d92984ec4c34d2af9d616a4676a7d69df73b09975fd077d96077ae2528b6fc05752110eb4e406c3e9d94d49d0a74eeaba6bc6a48bca8ac1d
-
Filesize
545KB
MD566b6cb90af16d460f6215109daddb156
SHA1867fe435eeea69bda11cff78a81e2a6a26b128b9
SHA256cbea38a2c6b408668dba95e8faaa0c73c15b38263c55ef6c9a7cac032c7fab88
SHA5123236785a9bfe7adc2a743a0410224e6b00dc618a98c24ec928c84c4f7e9febeec97e888369e79d050cb84a8f1e13dc2601a7904e685e84361b7d6d8cd734cf14
-
Filesize
546KB
MD5dd8ebfdfdc8cab226e6a42d6dc5a9697
SHA1f3ef399d86f30a7f374b2a0386c8ce76b7b5f42a
SHA256200fed48857b27e633e42329fd827674070a5e584480e1fec09ee3b9a830b00a
SHA512376fc11f82de138827e5e760594cbae33213fe7c8f000a171eca9b49153424abc6f3a97d6e153e1a91aca47cab14e33db54a0d9875ecd04520edaba3f67daee6