Overview
overview
7Static
static
3Tone2_KeyGen.exe
windows7-x64
7Tone2_KeyGen.exe
windows10-2004-x64
7$TEMP/BASSMOD.dll
windows7-x64
3$TEMP/BASSMOD.dll
windows10-2004-x64
3$TEMP/R2RGLD2KG.dll
windows7-x64
3$TEMP/R2RGLD2KG.dll
windows10-2004-x64
3$TEMP/keygen.exe
windows7-x64
3$TEMP/keygen.exe
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
Tone2_KeyGen.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Tone2_KeyGen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$TEMP/BASSMOD.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$TEMP/BASSMOD.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/R2RGLD2KG.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/R2RGLD2KG.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/keygen.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$TEMP/keygen.exe
Resource
win10v2004-20240802-en
General
-
Target
Tone2_KeyGen.exe
-
Size
541KB
-
MD5
23b8db6e59d1b5742d662c2e9aadf960
-
SHA1
c23959e602c0c5091a869d58f0e559e57482e233
-
SHA256
b0ebec322ce578522d3187e902c962968e9af4805f0d3eefae549f99a9c7d391
-
SHA512
a9ef60ed4393b410b665454371918aeb5f66d82a9444a301668e03c9d093ae29876d89e0818473c2e157ec6d61f8183c7b72f57f853e5de1896735ad15fc746e
-
SSDEEP
12288:XYkc9t2Sll/T/ohkU3xg63nsGDxIVhxdKxoSZvj:XYkcL5T/50nSxor
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4232 keygen.exe -
Loads dropped DLL 3 IoCs
pid Process 4232 keygen.exe 4232 keygen.exe 4232 keygen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tone2_KeyGen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4168 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4168 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4232 3144 Tone2_KeyGen.exe 82 PID 3144 wrote to memory of 4232 3144 Tone2_KeyGen.exe 82 PID 3144 wrote to memory of 4232 3144 Tone2_KeyGen.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tone2_KeyGen.exe"C:\Users\Admin\AppData\Local\Temp\Tone2_KeyGen.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\keygen.exeC:\Users\Admin\AppData\Local\Temp\keygen.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4232
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4e8 0x4fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822
-
Filesize
5KB
MD5501ae6ccc10518430bd0d6e1ccea179f
SHA1ed72512d15bdf16b0fce37235843cf6eae576743
SHA256fa1b6a3dfb396a6f2925f2f8d5d89885c5cbb7e9108d04158262d9af25dcd71b
SHA512735e972b9aa6e28f669192eaf8c4281ee76453fd17accd9be48c145e4bdb63231adfc6a8c489c7dd4e1e925d034177e986a6a25630987ad95714e74d6c2776e7
-
Filesize
388KB
MD52dc3ec3f50214a13388932155baf3724
SHA1deb34a6de5c98f4d954a9eb3857694401a5e06a3
SHA25698c69e7f59231970dcb7858791ab5e229bb310ac7e196ddfc3203b46f2d043b6
SHA512b3e9114e005506381d8ce58dadb4f59e9cde2999b170ec021c195d3594a2d8bc535fce6ae7463d70f72f1208ac302a89dcd30436fced727dc14e949831aa546d
-
Filesize
492KB
MD515f2d430bc32b3e4d95f2d915f9f7d83
SHA1f60f5a8f968f1b36d689aabeaff62d43f205d614
SHA256a2204caa5d2f178a68ab0a803af9df1145c19ee66dccc72282e048482dbff7fa
SHA51242dfebe4ea7016e862681db2f4231846dabe5c891eaa604ef1e32606c6014a9b7f14b5adb816b6283c85e0a26d3ec06be74c9110a27e5ff8b6f1a9826c57dfc4