Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 10:42

General

  • Target

    TORMENTOR_h47-zQ1.exe

  • Size

    13.8MB

  • MD5

    af45bc08a07f1ba16abe59f29072ebcc

  • SHA1

    66edea40ba7b38a45bd856e6889bba12384c458f

  • SHA256

    e555c06879ed4eda6277e1fa8a4985590e70d8fa81421103048803e386daaf28

  • SHA512

    a4c63d95b2ce3ed6590617e18f18d78a530deb7958fcb4e1ed1b9ab415c4c370e907d2eccc63becb7f2d7dcb7b603125809008d38f450f3462d9b8d61b7f1d97

  • SSDEEP

    393216:bBBTeN30LpEiSCC9XSpIFwah3RuINhkUOgs:dtwkLps9Xhrhhuahk5D

Malware Config

Signatures

  • Checks for any installed AV software in registry 1 TTPs 9 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 16 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TORMENTOR_h47-zQ1.exe
    "C:\Users\Admin\AppData\Local\Temp\TORMENTOR_h47-zQ1.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\is-RC0KD.tmp\TORMENTOR_h47-zQ1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-RC0KD.tmp\TORMENTOR_h47-zQ1.tmp" /SL5="$40026,13566766,780800,C:\Users\Admin\AppData\Local\Temp\TORMENTOR_h47-zQ1.exe"
      2⤵
      • Checks for any installed AV software in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Windows\SysWOW64\netsh.exe
        "netsh" firewall add allowedprogramC:\Users\Admin\AppData\Local\Temp\is-E56LI.tmp\qbittorrent.exe "qBittorrent" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:1840
      • C:\Users\Admin\AppData\Local\Temp\is-E56LI.tmp\qbittorrent.exe
        "C:\Users\Admin\AppData\Local\Temp\is-E56LI.tmp\qbittorrent.exe" magnet:?xt=urn:btih:5D80A267968A627ACAA7780E52F79E76C7819DC2
        3⤵
        • Enumerates connected drives
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2040
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6c85cb1f5f073cb8ea8a8b7d7d429c10

      SHA1

      cf221bacc83907b52421b90fb84db8df91ba470f

      SHA256

      54d8b99dee6427b5511e597b9a5740261e60e66036a1525ef4ef3609cf3a2021

      SHA512

      96d5d84d637bf4a46fbc488892223def408505c7987d6a18da23ec77631862ac2294e4d02511b12cb781992bed9bfba1289b7267861a521e0899e90c5123eaf2

    • C:\Users\Admin\AppData\Local\Temp\CabC0A3.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarC0C5.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\is-E56LI.tmp\AVG_AV.png

      Filesize

      51KB

      MD5

      aee8e80b35dcb3cf2a5733ba99231560

      SHA1

      7bcf9feb3094b7d79d080597b56a18da5144ca7b

      SHA256

      35bbd8f390865173d65ba2f38320a04755541a0783e9f825fdb9862f80d97aa9

      SHA512

      dcd84221571bf809107f7aeaf94bab2f494ea0431b9dadb97feed63074322d1cf0446dbd52429a70186d3ecd631fb409102afcf7e11713e9c1041caacdb8b976

    • C:\Users\Admin\AppData\Local\Temp\is-E56LI.tmp\AVG_BRW.png

      Filesize

      29KB

      MD5

      0b4fa89d69051df475b75ca654752ef6

      SHA1

      81bf857a2af9e3c3e4632cbb88cd71e40a831a73

      SHA256

      60a9085cea2e072d4b65748cc71f616d3137c1f0b7eed4f77e1b6c9e3aa78b7e

      SHA512

      8106a4974f3453a1e894fec8939038a9692fd87096f716e5aa5895aa14ee1c187a9a9760c0d4aec7c1e0cc7614b4a2dbf9b6c297cc0f7a38ba47837bede3b296

    • C:\Users\Admin\AppData\Local\Temp\is-E56LI.tmp\WeatherZero.png

      Filesize

      29KB

      MD5

      9ac6287111cb2b272561781786c46cdd

      SHA1

      6b02f2307ec17d9325523af1d27a6cb386c8f543

      SHA256

      ab99cdb7d798cb7b7d8517584d546aa4ed54eca1b808de6d076710c8a400c8c4

      SHA512

      f998a4e0ce14b3898a72e0b8a3f7154fc87d2070badcfa98582e3b570ca83a562d5a0c95f999a4b396619db42ab6269a2bac47702597c5a2c37177441723d837

    • C:\Users\Admin\AppData\Roaming\qBittorrent\qBittorrent.ini

      Filesize

      1KB

      MD5

      3d97fe98a5e7416eb20922436f544f63

      SHA1

      bd59ee17e8047c0bc2bc558c035554b7f2ac74b6

      SHA256

      b5a3b21d557ebbc07943694ade684ac396517a28acf12b9660f327e0875a91be

      SHA512

      2c09617536af9bee46593d55fddd8320962b1edef06b7f063710f88c6876917ed177aa4c4178384ee05b0b9fb4ecf375367afedba11976a7d253237ae8a27f9e

    • C:\Users\Admin\AppData\Roaming\qBittorrent\watched_folders.json

      Filesize

      4B

      MD5

      5b76b0eef9af8a2300673e0553f609f9

      SHA1

      0b56d40c0630a74abec5398e01c6cd83263feddc

      SHA256

      d914176fd50bd7f565700006a31aa97b79d3ad17cee20c8e5ff2061d5cb74817

      SHA512

      cf06a50de1bf63b7052c19ad53766fa0d99a4d88db76a7cbc672e33276e3d423e4c5f5cb4a8ae188c5c0e17d93bb740eaab6f25753f0d26501c5f84aeded075d

    • \Users\Admin\AppData\Local\Temp\is-E56LI.tmp\qbittorrent.exe

      Filesize

      22.8MB

      MD5

      22a34900ada67ead7e634eb693bd3095

      SHA1

      2913c78bcaaa6f4ee22b0977be72333d2077191d

      SHA256

      3cec1e40e8116a35aac6df3da0356864e5d14bc7687c502c7936ee9b7c1b9c58

      SHA512

      88d90646f047f86adf3d9fc5c04d97649b0e01bac3c973b2477bb0e9a02e97f56665b7ede1800b68edd87115aed6559412c48a79942a8c2a656dfae519e2c36f

    • \Users\Admin\AppData\Local\Temp\is-E56LI.tmp\zbShieldUtils.dll

      Filesize

      2.0MB

      MD5

      59d3c3a9180ba792ae2dad18b6903cde

      SHA1

      c8cd105d3a0e99a54d1d16f0d1f60000fa3dca8a

      SHA256

      dd01edbd4368ef227693723c5e427a48b264cb57bbd07d81210d6e633e0b1b2e

      SHA512

      d6b6358e5108654931fcb3b7920df65c4ae65d48f9ea012c3f821bb571f821e815d86feab85cd55a8ce767f2f7342a512e55d03ee4041ac0baf4ff13ad238699

    • \Users\Admin\AppData\Local\Temp\is-RC0KD.tmp\TORMENTOR_h47-zQ1.tmp

      Filesize

      2.9MB

      MD5

      49312c19fa9b298ca2ae71e14f07ccf3

      SHA1

      0150f9d27733ba2d0647da03453e1b1b6535861d

      SHA256

      74c20b61d428450e2c0b3974381684190d8bbd2aef3d573c86a3a954598319a5

      SHA512

      a1c4cbca2974277c52b2689a43a6d13f88884e1e8be3b42a1c23e615a226e8d7c0fdca2591ee4e8c39f439cb0ff0bce3898676c95d3addc8d7f0c5000b0ea092

    • memory/1520-0-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/1520-2-0x0000000000401000-0x00000000004B7000-memory.dmp

      Filesize

      728KB

    • memory/1520-143-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/1520-166-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/2040-176-0x0000000000150000-0x000000000015A000-memory.dmp

      Filesize

      40KB

    • memory/2040-159-0x0000000000150000-0x000000000015A000-memory.dmp

      Filesize

      40KB

    • memory/2040-160-0x0000000000150000-0x000000000015A000-memory.dmp

      Filesize

      40KB

    • memory/2084-153-0x00000000078B0000-0x00000000079F0000-memory.dmp

      Filesize

      1.2MB

    • memory/2084-138-0x00000000078B0000-0x00000000079F0000-memory.dmp

      Filesize

      1.2MB

    • memory/2084-149-0x00000000078B0000-0x00000000079F0000-memory.dmp

      Filesize

      1.2MB

    • memory/2084-164-0x0000000000400000-0x00000000006EE000-memory.dmp

      Filesize

      2.9MB

    • memory/2084-8-0x0000000000400000-0x00000000006EE000-memory.dmp

      Filesize

      2.9MB

    • memory/2084-145-0x0000000000400000-0x00000000006EE000-memory.dmp

      Filesize

      2.9MB

    • memory/2084-144-0x0000000000400000-0x00000000006EE000-memory.dmp

      Filesize

      2.9MB

    • memory/2084-142-0x00000000078B0000-0x00000000079F0000-memory.dmp

      Filesize

      1.2MB