Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 16:13
Static task
static1
Behavioral task
behavioral1
Sample
tg_proX64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
tg_proX64.exe
Resource
win10v2004-20240802-en
General
-
Target
tg_proX64.exe
-
Size
70.9MB
-
MD5
a15fe81c0d0661a089e2d3d78213d52c
-
SHA1
049d9028f66a46d2f5127c1ce44feac95f6581a7
-
SHA256
d51d112f071390cb95010575572bdf3e0ad0a25b6b4bf83b41d6c59086cfedf7
-
SHA512
9bb25d15214ee6d897293bdd8c6e88deb2f8a2d2cf8d74abd4855c56049b09af41016d2d8f827fe072be36e3a1d6e2b19e4b36adc839e3a43e306b688cfcbf47
-
SSDEEP
1572864:T8VnWS8+lvp0kdu8RojQ5qATl2iUUeC/oIH4ecuiAxBtg:T8JyM6XjomiReMoIH4eoga
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2712 tg_proX64.tmp 2544 svcorenos.exe -
Loads dropped DLL 11 IoCs
pid Process 2676 tg_proX64.exe 2712 tg_proX64.tmp 1232 Process not Found 1232 Process not Found 1232 Process not Found 2544 svcorenos.exe 2544 svcorenos.exe 2544 svcorenos.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tg_proX64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tg_proX64.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2712 tg_proX64.tmp 2712 tg_proX64.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 tg_proX64.tmp -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2712 2676 tg_proX64.exe 30 PID 2676 wrote to memory of 2712 2676 tg_proX64.exe 30 PID 2676 wrote to memory of 2712 2676 tg_proX64.exe 30 PID 2676 wrote to memory of 2712 2676 tg_proX64.exe 30 PID 2676 wrote to memory of 2712 2676 tg_proX64.exe 30 PID 2676 wrote to memory of 2712 2676 tg_proX64.exe 30 PID 2676 wrote to memory of 2712 2676 tg_proX64.exe 30 PID 2712 wrote to memory of 2544 2712 tg_proX64.tmp 32 PID 2712 wrote to memory of 2544 2712 tg_proX64.tmp 32 PID 2712 wrote to memory of 2544 2712 tg_proX64.tmp 32 PID 2712 wrote to memory of 2544 2712 tg_proX64.tmp 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\tg_proX64.exe"C:\Users\Admin\AppData\Local\Temp\tg_proX64.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\is-9312V.tmp\tg_proX64.tmp"C:\Users\Admin\AppData\Local\Temp\is-9312V.tmp\tg_proX64.tmp" /SL5="$30120,73296718,797696,C:\Users\Admin\AppData\Local\Temp\tg_proX64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Programs\TGprozhver\svcorenos.exe"C:\Users\Admin\AppData\Local\Programs\TGprozhver\svcorenos.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18.4MB
MD53de39b89ac8560ca121fec31ef952bc4
SHA1771ba8254037708a91d714689d08eeaa64eb6570
SHA2562fee036810339596c2b690977bcec0c1d9fe2079f1260de80b18057eb35f0ce2
SHA51292d38671ec1f1a49d256d085f3ee0155615c8b86a6f5ee4a6d0da8772db2b893edf769d2017fdc21627773133da2c4255ded2b1b63b7d1e54745b57ce6cb2f4f
-
Filesize
556KB
MD56b2548cc404f3dd55634efa291fa98d0
SHA1a076a60d99d70fd8aa7664a2534445a502febe27
SHA2567ae384b8695d7a9c2b6640927cb6ac592229aef9ebeeb80b91d556777c6dfb5d
SHA51214068e9e7d5f7e4494ffa75d369068234cdb050286d3356298e0387cf13d7681c0d68b57b6b299958c86ee3ae1dc3e54adc4c376e7b869d7d76fc2e91ed95009
-
Filesize
2.2MB
MD56cf29dbf1fa710cccf6ba1c4c01f6b85
SHA1a1debdb076c8c655e3d78c6ae82f1beba386a2ba
SHA256f85ce4492e1354f8310027c5f70ef73aae654fcd8fd9a58034e4f82a41a9826b
SHA512ebcc6599c33a80bb3e5c627a5f861fc9742d8558c4551544109288f80155885791a3f701af1aa7a4513cc5d121b77678a4cd46ca38a7bdd3cf7288e58e01f4f5
-
Filesize
6.2MB
MD59c34ad9143eae99e157961a41f43b9d1
SHA163d1d2798eccafc5ba6e308d1200eef620d65a8d
SHA2561f9dc739a9e45fe5b8fa43bfea41c3d45212df95f21b952c7f969dbc0b57d389
SHA5120229041ae0b8ebc44d313cc81a5d12a6e4d55123eec346652f9bf09df60537194cb34d0f2f39a7ecafd18e8678016b924d8f686d46a73da5f64ac00c7ae165c0
-
Filesize
3.2MB
MD53f8d4835277b10465e0747b3d1c61fc7
SHA190561bc4041a447dff572401666680975943661d
SHA2567b207e9fc0e6e7410b61c79534f3675945acd163e861a63649b7c3ad331c7ca4
SHA512eea8e64f5a2c88c237b70a23d1025d2740dc2898ae6d77e63f898748273ff72d0c5564744729faec1d544ae10af2f5cab84643ae9bcd87ca7e1df1769feacdcc