Overview
overview
8Static
static
1Cert.zip
windows7-x64
1Cert.zip
windows10-2004-x64
1Cert/.bash_history
windows7-x64
3Cert/.bash_history
windows10-2004-x64
3Cert/.bash_logout
windows7-x64
3Cert/.bash_logout
windows10-2004-x64
3Cert/.bashrc
windows7-x64
3Cert/.bashrc
windows10-2004-x64
3Cert/.profile
windows7-x64
3Cert/.profile
windows10-2004-x64
3Cert/AAA C...es.crt
windows7-x64
1Cert/AAA C...es.crt
windows10-2004-x64
1Cert/AC RA...OS.crt
windows7-x64
1Cert/AC RA...OS.crt
windows10-2004-x64
1Cert/AC RA...CM.crt
windows7-x64
1Cert/AC RA...CM.crt
windows10-2004-x64
1Cert/ACCVRAIZ1.crt
windows7-x64
8Cert/ACCVRAIZ1.crt
windows10-2004-x64
8Cert/ANF S...CA.crt
windows7-x64
1Cert/ANF S...CA.crt
windows10-2004-x64
1Cert/Actal...CA.crt
windows7-x64
1Cert/Actal...CA.crt
windows10-2004-x64
1Cert/Affir...al.crt
windows7-x64
1Cert/Affir...al.crt
windows10-2004-x64
1Cert/Affir...ng.crt
windows7-x64
1Cert/Affir...ng.crt
windows10-2004-x64
1Cert/Affir...CC.crt
windows7-x64
1Cert/Affir...CC.crt
windows10-2004-x64
1Cert/Affir...um.crt
windows7-x64
1Cert/Affir...um.crt
windows10-2004-x64
1Cert/Amazo... 1.crt
windows7-x64
1Cert/Amazo... 1.crt
windows10-2004-x64
1Resubmissions
20-09-2024 04:02
240920-els9raxhrn 120-09-2024 03:58
240920-ejgsyaxgql 120-09-2024 03:52
240920-efgc1axbng 820-09-2024 03:48
240920-ec8m3sxejn 820-09-2024 03:44
240920-eaks8swhke 8Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 03:44
Static task
static1
Behavioral task
behavioral1
Sample
Cert.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Cert.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Cert/.bash_history
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Cert/.bash_history
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Cert/.bash_logout
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Cert/.bash_logout
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Cert/.bashrc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Cert/.bashrc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Cert/.profile
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Cert/.profile
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Cert/AAA Certificate Services.crt
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Cert/AAA Certificate Services.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Cert/AC RAIZ FNMT-RCM SERVIDORES SEGUROS.crt
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Cert/AC RAIZ FNMT-RCM SERVIDORES SEGUROS.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Cert/AC RAIZ FNMT-RCM.crt
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Cert/AC RAIZ FNMT-RCM.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Cert/ACCVRAIZ1.crt
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Cert/ACCVRAIZ1.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Cert/ANF Secure Server Root CA.crt
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Cert/ANF Secure Server Root CA.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Cert/Actalis Authentication Root CA.crt
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Cert/Actalis Authentication Root CA.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Cert/AffirmTrust Commercial.crt
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Cert/AffirmTrust Commercial.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Cert/AffirmTrust Networking.crt
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Cert/AffirmTrust Networking.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Cert/AffirmTrust Premium ECC.crt
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Cert/AffirmTrust Premium ECC.crt
Resource
win10v2004-20240910-en
Behavioral task
behavioral29
Sample
Cert/AffirmTrust Premium.crt
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Cert/AffirmTrust Premium.crt
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Cert/Amazon Root CA 1.crt
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Cert/Amazon Root CA 1.crt
Resource
win10v2004-20240802-en
General
-
Target
Cert/.bash_logout
-
Size
220B
-
MD5
22bfb8c1dd94b5f3813a2b25da67463f
-
SHA1
dc216ac4a4c232815731979db6e494f315b507dd
-
SHA256
26882b79471c25f945c970f8233d8ce29d54e9d5eedcd2884f88affa84a18f56
-
SHA512
c3d739f4934824d81f561c9b626b494e3c256b5a97642667882632db030fc1a8c7d23eb1ae5db7e9f63ae46ee84dbee69d15130dd1482a2c1e8aade1dfc545a2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CC7F1B5F-7702-11EF-8D5B-F60A6DD2E828} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08587a10f0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000262c84e5c2a8b24db398d3ff1cc7357000000000020000000000106600000001000020000000b94a52ae2d3a0391988b94da8d54937a67d1c7e9c0c60c9a0caee090547127c6000000000e800000000200002000000010ae090bb457fb74370195e6c6d3522d1ba2b355a2c8ab494e60e1af6888d1f92000000039b0817c5532a92d13e30e090457e33dbe12c8491c958fad3daf2901d96d74b04000000019c393a5ac52b0b80e3f2b18225c8bbc8beb777b519d2460bffd58287534b050f7c54b480c26b3831d9805e25a293237963300beb093c374cce4965196ef0f70 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000262c84e5c2a8b24db398d3ff1cc73570000000000200000000001066000000010000200000001ee2296a251d90dfa585b4496b964dbeca29004b8baee8d00f7ced2ae21cce70000000000e800000000200002000000047206cc25b3a36ea890959edf727da88a7ededb91af1559e7338bd5d237e7d892000000091a4c01616a3c59028d441102d8965673c9cb6afc749cd6f5434c431257365284000000088f0e5171ed4813f300a081a45346d68547ebba2b5a7e47db6e4d3a347d4672d5ba6dc9f06e7c1e8dd67665a6cfb736be57b2029339b3b5d07dd7a9c7854c22b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2700492307" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132431" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132431" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2704554443" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108180a10f0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31132431" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2700492307" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433568912" iexplore.exe -
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid Process 672 iexplore.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
OpenWith.exeiexplore.exeIEXPLORE.EXEpid Process 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 672 iexplore.exe 672 iexplore.exe 3288 IEXPLORE.EXE 3288 IEXPLORE.EXE 3288 IEXPLORE.EXE 3288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
OpenWith.exeiexplore.exedescription pid Process procid_target PID 3352 wrote to memory of 672 3352 OpenWith.exe 94 PID 3352 wrote to memory of 672 3352 OpenWith.exe 94 PID 672 wrote to memory of 3288 672 iexplore.exe 96 PID 672 wrote to memory of 3288 672 iexplore.exe 96 PID 672 wrote to memory of 3288 672 iexplore.exe 96
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Cert\.bash_logout1⤵
- Modifies registry class
PID:1444
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Cert\.bash_logout2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:672 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5d05db975cf07282910d2eeaf4d1d6e0a
SHA1ee43161120259ffd9a634c71ad97a786a228c559
SHA2563198a8f5168605583124b415310f2b135b6233cd3ff9d3bec9b064d609f86e5e
SHA512c0aeba576a2b4baa4c38b4b4176137c3c72a426e222cf16424e333cbeb16e559499fa9c70d200adcd71bb012c35e65478772879071c80f7f9a2b945c9f6c0f3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5873b8ecf750cb39c519bfc8bbc8821de
SHA117712a37d340d7cdf30f230c3aadb6f1c0d2fd83
SHA2564c44fba15762b3a994b6ac0a91c1a5b258ad3db67351d098a87f59e08f130039
SHA51298e48a258117b4bdc4e29add8387c7be610cdd460bddd3291af5c65f12118069d2064c4d58c559211c19d65da0df11290faa5f9831cace4590dbce9b8705af6b
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee