Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
Biglietto.Pdf______________________________________________________________.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Biglietto.Pdf______________________________________________________________.exe
Resource
win10v2004-20240802-en
General
-
Target
Biglietto.Pdf______________________________________________________________.exe
-
Size
307KB
-
MD5
707e2d2adceaf57299390d385b8b3edc
-
SHA1
4da7f44ef2c76ab241620ed6b19dcf15db83862b
-
SHA256
0adc0d71672eae85fe5124ef7c4f76e004086eb4b83a072a64368993d3e8a613
-
SHA512
3113cf59fb823e5a68b61f679f2d39d20c2c76ebf2f668fddcc48206ab42a2413b32325bdac5327edc0464cbddcbf6275d2d847ec76aa24b75198c33edbd63c1
-
SSDEEP
6144:HkSzdT72Y0SAzinYKTY1SQshfRPVQe1MZkIYSccr7wbstOcFPECYeixlYGic5v:Hkqx7SSDYsY1UMqMZJYSN7wbstOcF8fb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2656 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 busugi.exe -
Loads dropped DLL 1 IoCs
pid Process 2516 Biglietto.Pdf______________________________________________________________.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D3EA3BE8-3C80-AD4F-223E-C0310034E32C} = "C:\\Users\\Admin\\AppData\\Roaming\\Nyenaj\\busugi.exe" busugi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2516 set thread context of 2656 2516 Biglietto.Pdf______________________________________________________________.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Biglietto.Pdf______________________________________________________________.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language busugi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Privacy Biglietto.Pdf______________________________________________________________.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" Biglietto.Pdf______________________________________________________________.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe 2316 busugi.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2316 2516 Biglietto.Pdf______________________________________________________________.exe 30 PID 2516 wrote to memory of 2316 2516 Biglietto.Pdf______________________________________________________________.exe 30 PID 2516 wrote to memory of 2316 2516 Biglietto.Pdf______________________________________________________________.exe 30 PID 2516 wrote to memory of 2316 2516 Biglietto.Pdf______________________________________________________________.exe 30 PID 2316 wrote to memory of 1112 2316 busugi.exe 19 PID 2316 wrote to memory of 1112 2316 busugi.exe 19 PID 2316 wrote to memory of 1112 2316 busugi.exe 19 PID 2316 wrote to memory of 1112 2316 busugi.exe 19 PID 2316 wrote to memory of 1112 2316 busugi.exe 19 PID 2316 wrote to memory of 1168 2316 busugi.exe 20 PID 2316 wrote to memory of 1168 2316 busugi.exe 20 PID 2316 wrote to memory of 1168 2316 busugi.exe 20 PID 2316 wrote to memory of 1168 2316 busugi.exe 20 PID 2316 wrote to memory of 1168 2316 busugi.exe 20 PID 2316 wrote to memory of 1216 2316 busugi.exe 21 PID 2316 wrote to memory of 1216 2316 busugi.exe 21 PID 2316 wrote to memory of 1216 2316 busugi.exe 21 PID 2316 wrote to memory of 1216 2316 busugi.exe 21 PID 2316 wrote to memory of 1216 2316 busugi.exe 21 PID 2316 wrote to memory of 1068 2316 busugi.exe 25 PID 2316 wrote to memory of 1068 2316 busugi.exe 25 PID 2316 wrote to memory of 1068 2316 busugi.exe 25 PID 2316 wrote to memory of 1068 2316 busugi.exe 25 PID 2316 wrote to memory of 1068 2316 busugi.exe 25 PID 2316 wrote to memory of 2516 2316 busugi.exe 29 PID 2316 wrote to memory of 2516 2316 busugi.exe 29 PID 2316 wrote to memory of 2516 2316 busugi.exe 29 PID 2316 wrote to memory of 2516 2316 busugi.exe 29 PID 2316 wrote to memory of 2516 2316 busugi.exe 29 PID 2516 wrote to memory of 2656 2516 Biglietto.Pdf______________________________________________________________.exe 31 PID 2516 wrote to memory of 2656 2516 Biglietto.Pdf______________________________________________________________.exe 31 PID 2516 wrote to memory of 2656 2516 Biglietto.Pdf______________________________________________________________.exe 31 PID 2516 wrote to memory of 2656 2516 Biglietto.Pdf______________________________________________________________.exe 31 PID 2516 wrote to memory of 2656 2516 Biglietto.Pdf______________________________________________________________.exe 31 PID 2516 wrote to memory of 2656 2516 Biglietto.Pdf______________________________________________________________.exe 31 PID 2516 wrote to memory of 2656 2516 Biglietto.Pdf______________________________________________________________.exe 31 PID 2516 wrote to memory of 2656 2516 Biglietto.Pdf______________________________________________________________.exe 31 PID 2516 wrote to memory of 2656 2516 Biglietto.Pdf______________________________________________________________.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Biglietto.Pdf______________________________________________________________.exe"C:\Users\Admin\AppData\Local\Temp\Biglietto.Pdf______________________________________________________________.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Roaming\Nyenaj\busugi.exe"C:\Users\Admin\AppData\Roaming\Nyenaj\busugi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp1f88ed2a.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
329B
MD5195a91546ae74b358d2b51e9525c9439
SHA1261fbc5a6f04e17d6d7476ac2bfd1e4c55eac6ac
SHA2568d2931eb21c2066f3afcb7ba93788fc5b7ee134d871e0fb142a64001b4a5bd95
SHA51297c5e6a47e0e3bdf101ae374f96216df0f71208ae39059d6f44216a0e858bfd37640529c4febb156612e614892cd0863ff736fa51b1e59aaefb154fe2674c2ca
-
Filesize
307KB
MD554d34314bde99f4cdc97aa4ab701248c
SHA15f9bc93913b344741498350aa971f24d34fc8651
SHA256024741e7694b57fbdbb7753381c6287c7126f2e3db488cfd54bd97fca46d8bec
SHA51222aeb50d28088fa520b72ddd72babf35e11fa919bafced31e6ded3eb37921044bb05f30484119105c432c4957a371fd0d4b4d1be67f651119223d2adbb183244