Analysis
-
max time kernel
121s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 15:31
Behavioral task
behavioral1
Sample
ErisimEngeli/BTKInternetAgi.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ErisimEngeli/BTKInternetAgi.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ErisimEngeli/Guna.UI2.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ErisimEngeli/Guna.UI2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ErisimEngeli/NDP481-Web.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ErisimEngeli/NDP481-Web.exe
Resource
win10v2004-20240802-en
General
-
Target
ErisimEngeli/BTKInternetAgi.exe
-
Size
797KB
-
MD5
5299a07f38ca573f1d4bfb998229f0d6
-
SHA1
7b37be31b784e41a98c9f84755f3b9bda37a11cc
-
SHA256
899cdce451f9793046356eaeff97468d477b7ca141ba7d67649e60dbd17550d6
-
SHA512
2a4617566e164d2d3dec5240114f744ce138786830d8f72de63a112192a7a4cc1598f1051c8fae1b8b433b8b69fd5937b5ca2083316b4e99dd5aa016873b6870
-
SSDEEP
6144:ynBCfpm7azL4wRxS7TXT4lhHEZgwKC1ascGqTkzBOtoGte6GIhb7U:MBcSnclhkZg0ascjTkoL46Dq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BTKInternetAgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000b4fd993f44a5ee0e9852e51603e970a190401b4c143d8f53f8b2fd7ca1314463000000000e8000000002000020000000f6ae68975d433e20245def8dbcf1473e243b57a8ba7396e01ddf6115f49538e620000000f544af2d0d3e7a15bcfb532f10a24d08e74f1e00bb641151e412a9685fd8a4d440000000e823fa264339ba821c5482ea6e569b512714036a77dd6e748c8853ac836753e40424eb8e3015c360fb4639b901ef8a19337a98d45f179766b0c01f97fcf90cfd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431884954" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36AE8181-6D2E-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ad26103b01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2052 1788 BTKInternetAgi.exe 30 PID 1788 wrote to memory of 2052 1788 BTKInternetAgi.exe 30 PID 1788 wrote to memory of 2052 1788 BTKInternetAgi.exe 30 PID 1788 wrote to memory of 2052 1788 BTKInternetAgi.exe 30 PID 2052 wrote to memory of 2336 2052 iexplore.exe 31 PID 2052 wrote to memory of 2336 2052 iexplore.exe 31 PID 2052 wrote to memory of 2336 2052 iexplore.exe 31 PID 2052 wrote to memory of 2336 2052 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ErisimEngeli\BTKInternetAgi.exe"C:\Users\Admin\AppData\Local\Temp\ErisimEngeli\BTKInternetAgi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=BTKInternetAgi.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e19cf023b590681644d1a3a4e308d29
SHA1ac827d671a28439715342a71bd2a53b9bc4da9a3
SHA2564abce9613c1aac7844031ac8b57407d0e3b4e4573a4b2f4e924d370681d78fff
SHA512a7c87e96a8524643738bae2960b401aeefe789f5c15e5acb068478ae291872050198e1bd1c0700e44e4d41152e00729f07cd2d52b8da79bbe63e86eac451265f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512376560a12d758905ba2abe7eb535e2
SHA1e28cc18df37a0179e875423796f626a562d90ffe
SHA256b5a418e94da4f7fa426da8dd90f4f442c528244159853aaa08d910a11e014fba
SHA5120add2725909386c584e3ef234e446be072f3641b47aee9d743217d35d4ca5c04462af388352eeff208a0512e0b596ddda369f918bb6bdf1b34b3ebaae45241fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c3925f4312db6f2e4fbaf8eaacae257
SHA1e9bcbe0e996552922856dba3ff0230a58d60f1ea
SHA256f7c99a05015490b4a571ac067aa9d6aa35a12ca3cfc01f92a43731b745769eed
SHA5125d59ae4d54507672402edacf3399764e9b964d21183a04d8e86d968a76479cbd71c7d955b9896d0faad693fc20f6e133a8ccc2e1436f4e9b770fecbb360acbe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed1e5ef657189000e6a04776a3147f0
SHA16d412e643fe72e708c7ba16c863aed68d792552c
SHA256775b7f352965842e290dcef7e27e7f7666496c0a8f22ad79519656477676573b
SHA5126686d4eee4b0124e6fb593d9a552378d44032296f045ee702e46e503e36ebaa5805d67ee4361c66912b485efd473750cd28e02f3c196abaf5bb126c68b68d5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675d732bbb7065c671b7441fda9386d9
SHA18c1cb4abc8950a10516d0277f9c798dd9e9fd0da
SHA256862bfa2ee652770eab9751626e330066424c9afa1d046528cef253cbb1e5f7d8
SHA5126c8b41a3cfcb1fcb207262eb3ec05327468246f956ef7c5c09941715ae3f50595ad58b3cc15a3aa5f8670f1e4a64698d4674d070d9e4f998e82f1c8a2c622cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc911717068ce9ab630bef888fdc4196
SHA14e8fe235f0e92b4703eea5917b7718bd3476fb70
SHA2566ddce58f35dacd16eee242cd30c80dd5a39be59d0f3636ca22e6b7002803606d
SHA512c66da51275bf23f0cd5232cd09b997b9b095fb61bde93e8a25f7b4ea16cf278fb80f0d4f1f56325199c555b667be6c116a0970d720471572a473d88ca027e9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea9be21f9a5cc4a6af4d45d99f94877
SHA1155a338c95692b0626899d8609c2b449ba9fb01a
SHA256ed215ea14a5fe48fa9a01e854713b95f93abf1fb417766e303a1489ddb7134d7
SHA51201f8661161b5dce870be4d61230a3d0910265e7726ab2c1e034b2ca88453a43001282db0489dfb1f5f00c114cc98666e01c670a1965c28d912d5ea3f18672cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80596e510f325a9fdd4d72f1116900c
SHA11365ba8e27441a04295cc9826162abd9dcdeb639
SHA256a9f63d020b2aec973963b56765383c7816216180aa206413538b398ac9a1c472
SHA51226717aeea0af3429b39b57ef1c8d7ad2a2f046edeb463f001d04fb1ed504c304eded02ac609f1cb3602e6c3c391c42366e15b5345f9869d62f3291dbf49e767b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d90f90aa346d8616180f84c83404b3a
SHA1690a50b0826cde827df08ad42976a802c8bf6686
SHA2563adcd6eddea4d306000fdd627fcddd6cd31d68094e5958bc5e9f3a267c78bcb3
SHA512856320955cc475ee4e3953598b5771d1f452153aa64fb1a100a90db59c2cd1cf8d60462c23a4ca10cc00a219b09c459e4225b6703ae346bb8c8066574992e2c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63d33bae7bf09c9f156ea62a0cc7165
SHA1cc20f4701300d2c103658b8df33f9c2502e9f1ca
SHA2562c479af2c06b08574c6fe01a96f442ea141439fb121f42b13e0ee37da59d1624
SHA5120e4311949dce5a72cd55fde14c142f7574946d1a9ad2bac2eaafb0cdf4d23e5088f557c7dec68bbb5f60f754d4310ae7f33907924126f8e96143fa2a8df347ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b