Overview
overview
7Static
static
7C60DOSX.dll
windows7-x64
3C60DOSX.dll
windows10-2004-x64
3C60OLEX.dll
windows7-x64
3C60OLEX.dll
windows10-2004-x64
3C60RUNX.dll
windows7-x64
3C60RUNX.dll
windows10-2004-x64
3C60TPSX.dll
windows7-x64
3C60TPSX.dll
windows10-2004-x64
3gb_ems.ps1
windows7-x64
3gb_ems.ps1
windows10-2004-x64
3gb_ems.exe
windows7-x64
7gb_ems.exe
windows10-2004-x64
7iQxml.dll
windows7-x64
3iQxml.dll
windows10-2004-x64
3license.rtf
windows7-x64
4license.rtf
windows10-2004-x64
1sender.ps1
windows7-x64
3sender.ps1
windows10-2004-x64
3sender.exe
windows7-x64
7sender.exe
windows10-2004-x64
7tracker.exe
windows7-x64
7tracker.exe
windows10-2004-x64
7Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 21:06
Behavioral task
behavioral1
Sample
C60DOSX.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
C60DOSX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
C60OLEX.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
C60OLEX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
C60RUNX.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
C60RUNX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
C60TPSX.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
C60TPSX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
gb_ems.ps1
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
gb_ems.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
gb_ems.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
gb_ems.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
iQxml.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
iQxml.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
license.rtf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
license.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
sender.ps1
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
sender.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
sender.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
sender.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
tracker.exe
Resource
win7-20240903-en
General
-
Target
gb_ems.exe
-
Size
341KB
-
MD5
73297cb9d103702a1dd20bc6e2c324ca
-
SHA1
a84609a02bb075e4fec338532cfd60b7f3e9ac86
-
SHA256
a918a9bc2ba0ea9fe444a8ed97de3552aec55554f20bb7a5b253de36aca96d6c
-
SHA512
ac701cb2b3d32f7c3d1d4a8676fd8d5012f84a2599d94510a0e1efe120ff870771232fc5c50a4be878dc09de60a7a2a6577871c01e0ea889296d42814d99aa8b
-
SSDEEP
6144:Q1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe59kIlbf3F8+Kw:QjkArEN249AyE/rbaMct4bO2/VVbvS+V
Malware Config
Signatures
-
resource yara_rule behavioral11/memory/2668-0-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral11/memory/2668-6-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral11/memory/2668-6-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gb_ems.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1854F4E1-7214-11EF-B729-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 009eceee2006db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000007e6b07e81d4cc35fca5434621906f8ca3fcf2acf5fe7b3b224bdd7e48239d386000000000e8000000002000020000000d4357ffdc43ecaab30cc658b9b47358992ee390df378761e82ad2ba7f5fb82ec20000000c16bc7249604afa258fa8a871958548c7e8754e1e125d5d517cd7c7a85fd3ddb400000001670e96cd630d46f1d97112c662710756d15873617d624fcd30409c405037c817293fa0aa2080608d46cd744663b42c96639d8fd3cc1a15e7324cc7b68bde091 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2668 gb_ems.exe 2668 gb_ems.exe 2536 iexplore.exe 2668 gb_ems.exe 2668 gb_ems.exe 2668 gb_ems.exe 2668 gb_ems.exe 2668 gb_ems.exe 2668 gb_ems.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2668 gb_ems.exe 2668 gb_ems.exe 2668 gb_ems.exe 2668 gb_ems.exe 2668 gb_ems.exe 2668 gb_ems.exe 2668 gb_ems.exe 2668 gb_ems.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2372 2536 iexplore.exe 31 PID 2536 wrote to memory of 2372 2536 iexplore.exe 31 PID 2536 wrote to memory of 2372 2536 iexplore.exe 31 PID 2536 wrote to memory of 2372 2536 iexplore.exe 31 PID 2536 wrote to memory of 1768 2536 iexplore.exe 34 PID 2536 wrote to memory of 1768 2536 iexplore.exe 34 PID 2536 wrote to memory of 1768 2536 iexplore.exe 34 PID 2536 wrote to memory of 1768 2536 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\gb_ems.exe"C:\Users\Admin\AppData\Local\Temp\gb_ems.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2668
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:734213 /prefetch:22⤵PID:1768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a374c13aba8d4cff1ca36cd9bfa3ef0c
SHA140423c2a4733cd106d6a0ff158230e0b962b745e
SHA256d692b1de086ac6af230458ef9e3f4e918de70f1821e0a0d9b47d9493f84a6ced
SHA5121105b060cad8b7d58ff096d65b31c706a8501ea203ca991e0321bbcbcf0fb0c4bea929fe39b7d9015b36552f5b4b0d42d5f165fe68da45d5e9ac94a7284b5a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e2bdaf5210ae35b4b575738e9a4db6b
SHA183630cba90aa76cc9212f6fc4b46875819cd4a5a
SHA2568f32539ca58beed7bf5d48bb0d6b2744c57fbdbd8cc269718e05007362c4f075
SHA5123a08b4fa64b6a1acc7ab4bfffeb765b6fc36a695ed9e30eae4d75ed663cb68cc51132197e80934f3af9a6f64eb2fc2d04d0c5a8aca4e71a66ad4f548dae4c163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c70e8b9a2a0023ee6957445f10e9ef
SHA1abbc3bd738accf07820fdec6914b836a9327d6d3
SHA2568fff4b6c94dcd01ce19586c60c291c747480989ff08ef9f8b917559e8561a3e6
SHA512c2011f75333d0f6f5eb5666e26a5181aaed6c3ef10544507d8d41ca65bb99b20be27feec0eb0d5e50805171ba7d5fc66f0ce27c3ef8565baeeb8687dfc30dfb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5309f174768ede8a6101d024f0252b746
SHA16a39768386ca54a2fa37f49681dc49900a1fe54f
SHA256ab0b7139e28ca40390cda830973b3e98ff321a7e10017f2a7b9c50dca33cf0af
SHA512ea083daac47c5111b7e04fb5248d6050142037c1e2bf7fd33cd7c141bbac6700d351717373099c257e6e66481afaa7da906a751c318bcb4e651da3e70c1c7cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c5f1e674aff27220caa474f244e924
SHA196178dba87092515417db0b92feb7fa0ae0b0862
SHA256e9e169aec490b55ccdd72be7bfb2e271714510d906c829a9e2cbf59cd870d4ce
SHA512925bbe50718d73878e82dddca182b61bf57c92baab4cd53cb993f35a4ff13a28658714b6c7e8103af5150153c0637388d464b528b9133b9d18a33245bf16bc00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552fbe4347fbe05cdee488d3e03819b0
SHA178867ab061831ae7a0a963a3d349bcb10d38d75c
SHA256c80dc7dee7d80b7f6295f7e667849b8b4ec660e552fda478b9ab4cb314730772
SHA51232fc9174f92b9e8046f902e3eb2561b55f9d9b2ebb04c342674324825180a46ef99aa5fae739665d97c9905bc4c993d06a31004a86c5ea655961de66addd8c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad27783eab02259f26db3bf48062f14
SHA108a16349e74667cd15dfbb318b4286761164c424
SHA256a04aaeb3365ff71a24c3ec9453e0cf0849ee1da3a31208d7be116a1432e326fc
SHA5120844eb318493bcab21d1195f48699156f7690b35208c5b411c03fda1e678c6dd17bf1dd76b34f564e12fec50e57e39f6e799e10e0227328bdaf1f3b1378ac3a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a6be2655704a8a889009dc3bec0226
SHA1d2fee3aa3e4b28ef731d21e4522fdcef094a10fc
SHA256b7ad3402bf5f107c9c03fabb4a856f7af474ef3aee52b269b8089415fcda7a05
SHA512c569b7766a1271f4c312bfebde776baaced5359b098bba0671dc7cb40d4ab25c7feaa523d4727c27f99250c43b331ff600ff16b2c358a066a765343484a7b983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcb3b98ecde68874ada97cd3471bf1b4
SHA112127715c34b3711dc7ceb09438437488adb25ce
SHA25641175d194005fbe16f536ea00cf07dc3e7e8bb41debbea51ec53939ffa42348e
SHA51217e7b07dee11a0965816955002692254cba5ed12bd4e3f61fbbff5ca32ba863db4831aa95aba5e38e78bb5112861ff709b8a20b01d1b3cfbfa3be9a61c0554bb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b