Analysis
-
max time kernel
83s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe
Resource
win10v2004-20240802-en
General
-
Target
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe
-
Size
98KB
-
MD5
e93b8f5dc41f87a69fcf19115e985860
-
SHA1
51c55e7ee1d68c26918c1d6e5082dd60f08cde6d
-
SHA256
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2
-
SHA512
787bfdc8fad1d9cdf52f58d07ce91fab86f5b9a77891523722e1e71fb1087ee43fa07d1557158ce4b6fb982d30c2a208103c0d032b7bd6a3cec1254ff0c1b081
-
SSDEEP
1536:DOoZ86iHPT3qqj7XHLLvXArePDNlv9AEQKzcVsN9+GUROW3zC1hDaMrAJg7Ub+SJ:DdjsnvXtNlebocVsnUROMzC1NAJQO
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2924 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
pbtcajo.exepbtcajo.exepid process 2160 pbtcajo.exe 2352 pbtcajo.exe -
Loads dropped DLL 2 IoCs
Processes:
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exepbtcajo.exepid process 2576 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe 2160 pbtcajo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\pbtcajo.exe\" /r" ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exepbtcajo.exepbtcajo.exedescription pid process target process PID 1744 set thread context of 2576 1744 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 2160 set thread context of 2352 2160 pbtcajo.exe pbtcajo.exe PID 2352 set thread context of 2796 2352 pbtcajo.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exeab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exepbtcajo.exepbtcajo.exesvchost.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbtcajo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbtcajo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exeab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exepbtcajo.exepbtcajo.exedescription pid process target process PID 1744 wrote to memory of 2576 1744 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 1744 wrote to memory of 2576 1744 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 1744 wrote to memory of 2576 1744 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 1744 wrote to memory of 2576 1744 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 1744 wrote to memory of 2576 1744 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 1744 wrote to memory of 2576 1744 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 1744 wrote to memory of 2576 1744 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 1744 wrote to memory of 2576 1744 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 1744 wrote to memory of 2576 1744 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe PID 2576 wrote to memory of 2160 2576 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe pbtcajo.exe PID 2576 wrote to memory of 2160 2576 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe pbtcajo.exe PID 2576 wrote to memory of 2160 2576 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe pbtcajo.exe PID 2576 wrote to memory of 2160 2576 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe pbtcajo.exe PID 2160 wrote to memory of 2352 2160 pbtcajo.exe pbtcajo.exe PID 2160 wrote to memory of 2352 2160 pbtcajo.exe pbtcajo.exe PID 2160 wrote to memory of 2352 2160 pbtcajo.exe pbtcajo.exe PID 2160 wrote to memory of 2352 2160 pbtcajo.exe pbtcajo.exe PID 2160 wrote to memory of 2352 2160 pbtcajo.exe pbtcajo.exe PID 2160 wrote to memory of 2352 2160 pbtcajo.exe pbtcajo.exe PID 2160 wrote to memory of 2352 2160 pbtcajo.exe pbtcajo.exe PID 2160 wrote to memory of 2352 2160 pbtcajo.exe pbtcajo.exe PID 2160 wrote to memory of 2352 2160 pbtcajo.exe pbtcajo.exe PID 2352 wrote to memory of 2796 2352 pbtcajo.exe svchost.exe PID 2352 wrote to memory of 2796 2352 pbtcajo.exe svchost.exe PID 2352 wrote to memory of 2796 2352 pbtcajo.exe svchost.exe PID 2352 wrote to memory of 2796 2352 pbtcajo.exe svchost.exe PID 2352 wrote to memory of 2796 2352 pbtcajo.exe svchost.exe PID 2352 wrote to memory of 2796 2352 pbtcajo.exe svchost.exe PID 2576 wrote to memory of 2924 2576 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe cmd.exe PID 2576 wrote to memory of 2924 2576 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe cmd.exe PID 2576 wrote to memory of 2924 2576 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe cmd.exe PID 2576 wrote to memory of 2924 2576 ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe"C:\Users\Admin\AppData\Local\Temp\ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe"C:\Users\Admin\AppData\Local\Temp\ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2N.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\pbtcajo.exe"C:\Users\Admin\pbtcajo.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\pbtcajo.exe"C:\Users\Admin\pbtcajo.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\0057.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD5919f401f1e310780e191647bc128985d
SHA1a91e781971b889d1f625ed8c2a3c7a2effcabca6
SHA2565a0edabc7e792df9004faeda0755e02459beccb031ea07ef8213e2e8b7073953
SHA51276e975ca11f1fdd1e20ccd92fb108dd6219714fdcb06cfdc688514722142a49180eeec8dbae34c1b30757c12b617887153fa5cebef85bcf4addcb9814f11eb1b
-
Filesize
98KB
MD5e93b8f5dc41f87a69fcf19115e985860
SHA151c55e7ee1d68c26918c1d6e5082dd60f08cde6d
SHA256ab2b8fecd3eabfd9fb63c8fc11b4fb1dd1c439517a1290853af9897d313536e2
SHA512787bfdc8fad1d9cdf52f58d07ce91fab86f5b9a77891523722e1e71fb1087ee43fa07d1557158ce4b6fb982d30c2a208103c0d032b7bd6a3cec1254ff0c1b081