Overview
overview
7Static
static
7C60DOSX.dll
windows7-x64
3C60DOSX.dll
windows10-2004-x64
3C60OLEX.dll
windows7-x64
3C60OLEX.dll
windows10-2004-x64
3C60RUNX.dll
windows7-x64
3C60RUNX.dll
windows10-2004-x64
3C60TPSX.dll
windows7-x64
3C60TPSX.dll
windows10-2004-x64
3gb_ems.ps1
windows7-x64
3gb_ems.ps1
windows10-2004-x64
3gb_ems.exe
windows7-x64
7gb_ems.exe
windows10-2004-x64
7iQxml.dll
windows7-x64
3iQxml.dll
windows10-2004-x64
3license.rtf
windows7-x64
4license.rtf
windows10-2004-x64
1sender.ps1
windows7-x64
3sender.ps1
windows10-2004-x64
3sender.exe
windows7-x64
7sender.exe
windows10-2004-x64
7tracker.exe
windows7-x64
7tracker.exe
windows10-2004-x64
7Analysis
-
max time kernel
94s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 21:06
Behavioral task
behavioral1
Sample
C60DOSX.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
C60DOSX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
C60OLEX.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
C60OLEX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
C60RUNX.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
C60RUNX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
C60TPSX.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
C60TPSX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
gb_ems.ps1
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
gb_ems.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
gb_ems.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
gb_ems.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
iQxml.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
iQxml.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
license.rtf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
license.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
sender.ps1
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
sender.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
sender.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
sender.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
tracker.exe
Resource
win7-20240903-en
General
-
Target
gb_ems.exe
-
Size
341KB
-
MD5
73297cb9d103702a1dd20bc6e2c324ca
-
SHA1
a84609a02bb075e4fec338532cfd60b7f3e9ac86
-
SHA256
a918a9bc2ba0ea9fe444a8ed97de3552aec55554f20bb7a5b253de36aca96d6c
-
SHA512
ac701cb2b3d32f7c3d1d4a8676fd8d5012f84a2599d94510a0e1efe120ff870771232fc5c50a4be878dc09de60a7a2a6577871c01e0ea889296d42814d99aa8b
-
SSDEEP
6144:Q1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe59kIlbf3F8+Kw:QjkArEN249AyE/rbaMct4bO2/VVbvS+V
Malware Config
Signatures
-
resource yara_rule behavioral12/memory/760-0-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral12/memory/760-92-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral12/memory/760-92-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gb_ems.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009f792707ad2f014a935b50bc1110c16d00000000020000000000106600000001000020000000a1f1951ed1a44705e31c77abcceb97e3c030f8a4ba6fa9bc7374aa1a7e0bf3f6000000000e8000000002000020000000542b8d8a3268d983d97d4c4098c3abadda362d7fe41c89d5a792bc80ab32569c2000000064b194a62d3b0c8279186ccc3120b18cece3f5ab32bb1b8e01a338c44b304b7340000000bb04cc12e5a2b61bf06918b4c066f0df7b95fb27f859f9253cefce90292c0665163cbfb408e21eb3552df77d2ea0e358536b6576bf5f2103176ad5a27d628ee7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31131168" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1A3B4758-7214-11EF-84CD-C63D5579F9B2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31131168" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009f792707ad2f014a935b50bc1110c16d00000000020000000000106600000001000020000000aee617f671aece0e51cf7d129368b98adf5b15ba51f309f97c90a5e6aaad4974000000000e8000000002000020000000ef352e3ad09472ffa492122ccf03114419d6c0a2060f2ab0aac069050fa7c379200000009c292121cc8b620a48394cbf270cea2eb7acf772ca3e9cd3076ac5caedafbd95400000003a72fec61f80557f4e95a974d7eae04a5467e325558b92f3409d4a7ecba6d0d9e808fcbeb42d30e0da615e6aba665044c95cdf91823d326c4b705aca22904ab8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 706667f02006db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708462f02006db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4004404154" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4004404154" iexplore.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 760 gb_ems.exe 760 gb_ems.exe 3124 iexplore.exe 760 gb_ems.exe 760 gb_ems.exe 760 gb_ems.exe 760 gb_ems.exe 760 gb_ems.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 760 gb_ems.exe 760 gb_ems.exe 760 gb_ems.exe 760 gb_ems.exe 760 gb_ems.exe 760 gb_ems.exe 760 gb_ems.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3124 iexplore.exe 3124 iexplore.exe 4896 IEXPLORE.EXE 4896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3124 wrote to memory of 4896 3124 iexplore.exe 87 PID 3124 wrote to memory of 4896 3124 iexplore.exe 87 PID 3124 wrote to memory of 4896 3124 iexplore.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\gb_ems.exe"C:\Users\Admin\AppData\Local\Temp\gb_ems.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:760
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:4064
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3124 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4896
-