Overview
overview
8Static
static
1Cert.zip
windows7-x64
1Cert.zip
windows10-2004-x64
1Cert/.bash_history
windows7-x64
3Cert/.bash_history
windows10-2004-x64
3Cert/.bash_logout
windows7-x64
3Cert/.bash_logout
windows10-2004-x64
3Cert/.bashrc
windows7-x64
3Cert/.bashrc
windows10-2004-x64
3Cert/.profile
windows7-x64
3Cert/.profile
windows10-2004-x64
3Cert/AAA C...es.crt
windows7-x64
1Cert/AAA C...es.crt
windows10-2004-x64
1Cert/AC RA...OS.crt
windows7-x64
1Cert/AC RA...OS.crt
windows10-2004-x64
1Cert/AC RA...CM.crt
windows7-x64
1Cert/AC RA...CM.crt
windows10-2004-x64
1Cert/ACCVRAIZ1.crt
windows7-x64
8Cert/ACCVRAIZ1.crt
windows10-2004-x64
8Cert/ANF S...CA.crt
windows7-x64
1Cert/ANF S...CA.crt
windows10-2004-x64
1Cert/Actal...CA.crt
windows7-x64
1Cert/Actal...CA.crt
windows10-2004-x64
1Cert/Affir...al.crt
windows7-x64
1Cert/Affir...al.crt
windows10-2004-x64
1Cert/Affir...ng.crt
windows7-x64
1Cert/Affir...ng.crt
windows10-2004-x64
1Cert/Affir...CC.crt
windows7-x64
1Cert/Affir...CC.crt
windows10-2004-x64
1Cert/Affir...um.crt
windows7-x64
1Cert/Affir...um.crt
windows10-2004-x64
1Cert/Amazo... 1.crt
windows7-x64
1Cert/Amazo... 1.crt
windows10-2004-x64
1Resubmissions
20-09-2024 04:02
240920-els9raxhrn 120-09-2024 03:58
240920-ejgsyaxgql 120-09-2024 03:52
240920-efgc1axbng 820-09-2024 03:48
240920-ec8m3sxejn 820-09-2024 03:44
240920-eaks8swhke 8Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 03:44
Static task
static1
Behavioral task
behavioral1
Sample
Cert.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Cert.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Cert/.bash_history
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Cert/.bash_history
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Cert/.bash_logout
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Cert/.bash_logout
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Cert/.bashrc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Cert/.bashrc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Cert/.profile
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Cert/.profile
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Cert/AAA Certificate Services.crt
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Cert/AAA Certificate Services.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Cert/AC RAIZ FNMT-RCM SERVIDORES SEGUROS.crt
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Cert/AC RAIZ FNMT-RCM SERVIDORES SEGUROS.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Cert/AC RAIZ FNMT-RCM.crt
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Cert/AC RAIZ FNMT-RCM.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Cert/ACCVRAIZ1.crt
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Cert/ACCVRAIZ1.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Cert/ANF Secure Server Root CA.crt
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Cert/ANF Secure Server Root CA.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Cert/Actalis Authentication Root CA.crt
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Cert/Actalis Authentication Root CA.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Cert/AffirmTrust Commercial.crt
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Cert/AffirmTrust Commercial.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Cert/AffirmTrust Networking.crt
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Cert/AffirmTrust Networking.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Cert/AffirmTrust Premium ECC.crt
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Cert/AffirmTrust Premium ECC.crt
Resource
win10v2004-20240910-en
Behavioral task
behavioral29
Sample
Cert/AffirmTrust Premium.crt
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Cert/AffirmTrust Premium.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Cert/Amazon Root CA 1.crt
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Cert/Amazon Root CA 1.crt
Resource
win10v2004-20240802-en
General
-
Target
Cert/.profile
-
Size
807B
-
MD5
f4e81ade7d6f9fb342541152d08e7a97
-
SHA1
2b9ee6d446f8f9ffccaab42b6df5649f749a9a07
-
SHA256
28b4a453b68dde64f814e94bab14ee651f4f162e15dd9920490aa1d49f05d2a4
-
SHA512
26544e0b85ca6d7cca3b8ace7d01f712e24020f07b6a6ad54a6942909040221f09bf922a4d0da555ce64ceebb4934b28719a23a0e6401337a69d4a0170bd8e4c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132431" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a7978e0f0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2383870992" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000068fd66d6220e584abe447a4e1268eb5100000000020000000000106600000001000020000000049674aa10c1a27496b90e73f58edc42ac48c062b11f538f9e8d44d0f0321b9a000000000e80000000020000200000007864666f88be7b9a183256f5e6f54c5e622f6b97263bab4e2a426db72df306c620000000cf22b96b98ceb182bfbd8aef1d1f543180a6a510436dd720141759a9673f548f40000000ed6976ca94eeb72407dd92221acce7340c7849a65253b5bf52593b943f282c9140c3bb268e99431381dbf5aa52366c4995e00e53725343ad36898c5d9e052bb2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2383870992" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2387464770" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000068fd66d6220e584abe447a4e1268eb510000000002000000000010660000000100002000000046b0470fb4bbe6eac344782e19bd663fb79ddd67ed64c43e0b4dea500387052b000000000e8000000002000020000000007e701c5d6357dd7ef4125817d1ca0f8c735a07e0bd5cfc35d5f9fdd69deb442000000069a002b09a749c5512e7fc4055c356daa8c3c182f8b464788d6fcd39a510429d40000000fc62787b1fb9248d4a5632976ec9bebe0bdd767cf7a563e272fbaeaed555c92f342df79225464b79c96b96f9b1b6064c00c5f4228d953c2488668fd70d34cf37 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132431" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433568880" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B9998339-7702-11EF-B1C5-5E50324ADEFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31132431" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ec928e0f0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE -
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid Process 3568 iexplore.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
OpenWith.exeiexplore.exeIEXPLORE.EXEpid Process 2548 OpenWith.exe 2548 OpenWith.exe 2548 OpenWith.exe 2548 OpenWith.exe 2548 OpenWith.exe 2548 OpenWith.exe 2548 OpenWith.exe 3568 iexplore.exe 3568 iexplore.exe 4864 IEXPLORE.EXE 4864 IEXPLORE.EXE 4864 IEXPLORE.EXE 4864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
OpenWith.exeiexplore.exedescription pid Process procid_target PID 2548 wrote to memory of 3568 2548 OpenWith.exe 92 PID 2548 wrote to memory of 3568 2548 OpenWith.exe 92 PID 3568 wrote to memory of 4864 3568 iexplore.exe 94 PID 3568 wrote to memory of 4864 3568 iexplore.exe 94 PID 3568 wrote to memory of 4864 3568 iexplore.exe 94
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Cert\.profile1⤵
- Modifies registry class
PID:4540
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Cert\.profile2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3568 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5d05db975cf07282910d2eeaf4d1d6e0a
SHA1ee43161120259ffd9a634c71ad97a786a228c559
SHA2563198a8f5168605583124b415310f2b135b6233cd3ff9d3bec9b064d609f86e5e
SHA512c0aeba576a2b4baa4c38b4b4176137c3c72a426e222cf16424e333cbeb16e559499fa9c70d200adcd71bb012c35e65478772879071c80f7f9a2b945c9f6c0f3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD580646b15b1a9f7aa331a5a51e5cd5cdd
SHA16f192b768669480599d655bb1f87466bdbc0f7a1
SHA25653c702bd19ab19be4c3f1404cd3b153c08c1c2d6448aeca263cdf0be114787c9
SHA5124a5ddfdbe6fc653cff9412fd639228e916ba77b187213b222c7edc45690fa03a7e03d7a06e2c435a43c5e2c9dcb57b5723c16e7100f53af3eaa6682a14700477
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee