Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 18:30

General

  • Target

    14c871e6ccc8a30ea319bbc777e65bfd567601faada533478d5cdfb62466ae8b.exe

  • Size

    53KB

  • MD5

    c81e06fc828b11d4d8950f7257a5d150

  • SHA1

    37a4d7e5cf5d96e42242f8df96bc35557a08b9a0

  • SHA256

    14c871e6ccc8a30ea319bbc777e65bfd567601faada533478d5cdfb62466ae8b

  • SHA512

    dfb677d1b7c1671bfd65254ca804d48dc6370204281b73dbfe8745aa3506fdf6dc240f319a694b2bfff652057c3da83c5e583d3d3eb7aa2d4711d4590c13a75a

  • SSDEEP

    1536:5l9nw/hT31GCSI6WB3IMeCn7EI50ru9nw/hT31G2:25T3BF6sYMF725T3x

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 16 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
  • Adds policy Run key to start application 2 TTPs 18 IoCs
  • Disables RegEdit via registry modification 8 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 16 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 34 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Discovers systems in the same network 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14c871e6ccc8a30ea319bbc777e65bfd567601faada533478d5cdfb62466ae8b.exe
    "C:\Users\Admin\AppData\Local\Temp\14c871e6ccc8a30ea319bbc777e65bfd567601faada533478d5cdfb62466ae8b.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\SysWOW64\s4827\smss.exe
      "C:\Windows\system32\s4827\smss.exe" ~Brontok~Log~
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Windows\SysWOW64\s4827\winlogon.exe
        "C:\Windows\system32\s4827\winlogon.exe" ~Brontok~Is~The~Best~
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2296
        • C:\Windows\SysWOW64\s4827\services.exe
          "C:\Windows\system32\s4827\services.exe" ~Brontok~Serv~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          PID:2056
        • C:\Windows\SysWOW64\s4827\csrss.exe
          "C:\Windows\system32\s4827\csrss.exe" ~Brontok~SpreadMail~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          PID:2904
        • C:\Windows\SysWOW64\s4827\lsass.exe
          "C:\Windows\system32\s4827\lsass.exe" ~Brontok~Network~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Enumerates connected drives
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1260
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c net view /domain > "C:\Windows\system32\s4827\domlist.txt"
            5⤵
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1552
            • C:\Windows\SysWOW64\net.exe
              net view /domain
              6⤵
              • System Location Discovery: System Language Discovery
              • Discovers systems in the same network
              PID:2204
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Windows\system32\s4827\brdom.bat" "
            5⤵
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2972
            • C:\Windows\SysWOW64\net.exe
              net view /domain:WORKGROUP
              6⤵
              • System Location Discovery: System Language Discovery
              • Discovers systems in the same network
              PID:2300
        • C:\Windows\Ad10218\qm4623.exe
          "C:\Windows\Ad10218\qm4623.exe" ~Brontok~Back~Log~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          PID:2980
        • C:\Windows\SysWOW64\s4827\m4623.exe
          "C:\Windows\system32\s4827\m4623.exe" ~Brontok~Back~Log~
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          PID:2260
        • C:\Windows\SysWOW64\at.exe
          "C:\Windows\System32\at.exe" /delete /y
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2484
        • C:\Windows\SysWOW64\at.exe
          "C:\Windows\System32\at.exe" 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Local\jalak-93927015-bali.com"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2028
        • C:\Windows\SysWOW64\at.exe
          "C:\Windows\System32\at.exe" 11:03 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Local\jalak-93927015-bali.com"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Ad10218\qm4623.exe

    Filesize

    53KB

    MD5

    a96b7134e54291febde8fecc731e58bb

    SHA1

    e4594567a15bb4d143022652abf806477770d631

    SHA256

    33490e3fe6ffd1bbf346f576ef7fc5d7ca7ba25a3cb29d928366e2dfc777ba94

    SHA512

    e54e4a5b982f66dc54f1564d6671c45d05ba456c077d354d3aa2735364813636ea39cae0d1e0fdad3a66ef87f4ffde107baf311a433d2e7ee0884bc80fec6e79

  • C:\Windows\SysWOW64\c_29712k.com

    Filesize

    53KB

    MD5

    c81e06fc828b11d4d8950f7257a5d150

    SHA1

    37a4d7e5cf5d96e42242f8df96bc35557a08b9a0

    SHA256

    14c871e6ccc8a30ea319bbc777e65bfd567601faada533478d5cdfb62466ae8b

    SHA512

    dfb677d1b7c1671bfd65254ca804d48dc6370204281b73dbfe8745aa3506fdf6dc240f319a694b2bfff652057c3da83c5e583d3d3eb7aa2d4711d4590c13a75a

  • C:\Windows\SysWOW64\s4827\brdom.bat

    Filesize

    73B

    MD5

    6fc63a266767a5de3cc18f2b7ac5a703

    SHA1

    d23d7f8b213e9a311e37d058499502bd207c448e

    SHA256

    3d08ce4422af041981e6e9b0c55bceeaac098940c5e37f459fa22eb472390812

    SHA512

    ee6b97e09d1a1de916771143235e545cccfab6d22d2355d5c7994a0c9aafcfd640bf78cbd19570dace378e4c1b8b784278c41c80d45a62ac60c75e944110976c

  • C:\Windows\SysWOW64\s4827\lsass.exe

    Filesize

    53KB

    MD5

    e81d466363206a12b47434454bd5fee2

    SHA1

    db5e2634948f4aa77d916e8a5e58f2f595abbb92

    SHA256

    39ee8faec63be9e05c5ef8ca93b75ea3a69183c3395190b772b85a001192a4d2

    SHA512

    29e08a206f3bec03141fb6ad2f5bc2c5c2ed796db07078723b7ed60d01cbaa3014510f996a35b7e1735876102b034cd614c07f377737e953e6a9ee116d996236

  • C:\Windows\SysWOW64\s4827\m4623.exe

    Filesize

    53KB

    MD5

    ce3e386f22f1dbbbd6d8da9d768fa4a7

    SHA1

    3585a2524e834b3f95c5c24b6acf345431377eec

    SHA256

    7f6203f39ad69ed2c3849598080d1ff6a6d3f77f275d4c468b5f0398384a69dc

    SHA512

    03b5eb940dac3ca6f33ed252e218eff8b4e7b7cb2d0eeb65eb0036d483c5fff2de4cd1f3b7d51968c07ad9dfa3c3be2eb5b411ebf25e687c3acb24a1e5a0bbd5

  • C:\Windows\SysWOW64\s4827\winlogon.exe

    Filesize

    53KB

    MD5

    81ef26f856c42e9551a6ed40f4652654

    SHA1

    81a50eb35cdef8c5696185aefe0a5a50fbad7bf7

    SHA256

    6573aa16999b7399f7e470d8dbf37b97a3a919c1716604767ffa166593e7e7b9

    SHA512

    ff697eaa388ec36801c598a49b4f68fb95beb03f84983b6e9c574fcbf50184ccba9a34c7cc1de633d073666b4a7b83d7d976129731372f70a9c01a3ead4dabbb

  • memory/1260-125-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/1260-266-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2056-1009-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2056-872-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2056-539-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2056-937-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2056-226-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2056-785-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2056-645-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2056-1080-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2056-710-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2260-148-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2260-649-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2260-726-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2260-308-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2260-564-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2260-806-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2260-876-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2260-941-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2260-470-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2260-385-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2260-309-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2260-1013-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-141-0x0000000000510000-0x000000000052D000-memory.dmp

    Filesize

    116KB

  • memory/2296-709-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-282-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-1054-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-995-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-265-0x0000000000510000-0x000000000052D000-memory.dmp

    Filesize

    116KB

  • memory/2296-380-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-57-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-936-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-452-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-871-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-225-0x0000000000310000-0x000000000032D000-memory.dmp

    Filesize

    116KB

  • memory/2296-525-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-81-0x0000000000310000-0x000000000032D000-memory.dmp

    Filesize

    116KB

  • memory/2296-138-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-771-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-124-0x0000000000510000-0x000000000052D000-memory.dmp

    Filesize

    116KB

  • memory/2296-644-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2296-267-0x0000000000510000-0x000000000052D000-memory.dmp

    Filesize

    116KB

  • memory/2688-0-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2688-15-0x00000000031C0000-0x00000000031CE000-memory.dmp

    Filesize

    56KB

  • memory/2688-18-0x00000000031C0000-0x00000000031DD000-memory.dmp

    Filesize

    116KB

  • memory/2688-26-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2688-24-0x00000000031C0000-0x00000000031DD000-memory.dmp

    Filesize

    116KB

  • memory/2904-264-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2960-56-0x0000000002210000-0x000000000222D000-memory.dmp

    Filesize

    116KB

  • memory/2960-126-0x0000000002210000-0x000000000222D000-memory.dmp

    Filesize

    116KB

  • memory/2960-137-0x0000000002210000-0x000000000222D000-memory.dmp

    Filesize

    116KB

  • memory/2960-123-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2960-207-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2960-55-0x0000000002210000-0x000000000222D000-memory.dmp

    Filesize

    116KB

  • memory/2980-875-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2980-648-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2980-469-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2980-384-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2980-940-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2980-805-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2980-268-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2980-563-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2980-1012-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2980-725-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2980-307-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB

  • memory/2980-146-0x0000000000400000-0x000000000041C040-memory.dmp

    Filesize

    112KB