Analysis

  • max time kernel
    148s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 19:08

General

  • Target

    ETS666 Tool.exe

  • Size

    133.1MB

  • MD5

    6cd28e270b4e87d09e8ce3e309ba5543

  • SHA1

    0c92f3e1dcab59c3e4b1879dfa3cd26b41cb72c4

  • SHA256

    b25adda4535c6f08cc6ef3756d69c6f8eee89a8c268914fb128b83bf6bf6137f

  • SHA512

    7c367362069bf251ef0e34146d14a2b23c7e30655bdaccc328c091c0617f0b82f9379c68b8045f6c8af346f41ee0f9f648109c80af1a6ffff3d215d6e0ee4fbf

  • SSDEEP

    786432:bdWnQaBaRvHGYJKQSXPz9T/G2nXpf/EtBfamfrpcvFBJFoF2PScuNWqW:RxTRvHF8QS/z9zGud/ET3fcCWq

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ETS666 Tool.exe
    "C:\Users\Admin\AppData\Local\Temp\ETS666 Tool.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Users\Admin\AppData\Local\Temp\ETS666 Tool.exe
      "C:\Users\Admin\AppData\Local\Temp\ETS666 Tool.exe" --type=gpu-process --field-trial-handle=1560,14049931751003551927,8392824442521963230,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --user-data-dir="C:\Users\Admin\AppData\Roaming\ets666" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 /prefetch:2
      2⤵
        PID:5136
      • C:\Users\Admin\AppData\Local\Temp\ETS666 Tool.exe
        "C:\Users\Admin\AppData\Local\Temp\ETS666 Tool.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1560,14049931751003551927,8392824442521963230,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\ets666" --mojo-platform-channel-handle=2024 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:5044
      • C:\Users\Admin\AppData\Local\Temp\ETS666 Tool.exe
        "C:\Users\Admin\AppData\Local\Temp\ETS666 Tool.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ets666" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --field-trial-handle=1560,14049931751003551927,8392824442521963230,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2240 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:1020
      • C:\Users\Admin\AppData\Local\Temp\ETS666 Tool.exe
        "C:\Users\Admin\AppData\Local\Temp\ETS666 Tool.exe" --type=gpu-process --field-trial-handle=1560,14049931751003551927,8392824442521963230,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\ets666" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAIAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2960
    • C:\Windows\System32\CompPkgSrv.exe
      C:\Windows\System32\CompPkgSrv.exe -Embedding
      1⤵
        PID:4188

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Roaming\ets666\Network Persistent State

        Filesize

        552B

        MD5

        adbb64b747cd408a54a130e4c21cbc9d

        SHA1

        4182cee9cd614d555d2e4c23e2e7f34102f13fc7

        SHA256

        3e09738fc8634782ff271d42de579b2355a7c4ca66214e2a43d90cfc0ac4a726

        SHA512

        f504b855a51d32f91fd7ae9017e6c47b7a86b0876cb53dd3ce51619913b0c0c4083cb0f10472bc25968ffb8bff8f20de66a6c0f85ea97b580d8d59276372d894

      • C:\Users\Admin\AppData\Roaming\ets666\Network Persistent State~RFe594c80.TMP

        Filesize

        59B

        MD5

        2800881c775077e1c4b6e06bf4676de4

        SHA1

        2873631068c8b3b9495638c865915be822442c8b

        SHA256

        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

        SHA512

        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

      • C:\Users\Admin\AppData\Roaming\ets666\config.json

        Filesize

        28B

        MD5

        dd8824bad7974b4d74b973b86e26ab5a

        SHA1

        5ebcc7ef9fe2566f913a6857c38bcab4d449f34c

        SHA256

        63749b0008077336880c40f653d35f539046f30a342e12caf952420418ea2de0

        SHA512

        14636668baf3639170049792d01e32aed90b0c18e541b62697ebcf1bcf077abef91eed5baab23a896484e1fd20d15ea0ff1e112a36105ae98bb412d81c419567

      • C:\Users\Admin\AppData\Roaming\ets666\config.json

        Filesize

        92B

        MD5

        a2eb087ff1147f90e5c32cba42fdea56

        SHA1

        5ad22caebefef4d24e519e0161defe0f0309f9ea

        SHA256

        fd9bd2a6b3df78544d7b0b41e88ceec8abff5114ef4d6d721795b8bf522e63d5

        SHA512

        dbf159afc0a8fab9e79e00d5f4eda0ebaa61d066366976cf246acf0758251e6a0194e45bf1962d5819bbba7a635c2e89f71cf02e0d7ee9982517978fce927d34

      • C:\Users\Admin\AppData\Roaming\ets666\config.json

        Filesize

        119B

        MD5

        39ac4c5216c15a5cc8d0a40279380426

        SHA1

        1a2fba86d084f4ea4c773f5fed4d5a2476eece02

        SHA256

        528e3b08bc390aad1c016f4aa81942d68d14a417e20e705e54a50aceca48a1f8

        SHA512

        7ed89e854d9378c42a1ad4c765d4c91738adc00cd233d9b606ea67793c51d86aa20e2b15ec0659bf1ca3a79ccf148049fe459cf5957d53bf7a419a22f0c82b68

      • C:\Users\Admin\AppData\Roaming\ets666\config.json

        Filesize

        186B

        MD5

        791baeb1abfef61af3c9e2cc870e08f4

        SHA1

        29ea9a83546bf5b23d237bacf5b3835dd9aeb99a

        SHA256

        8364d439d08a61816fce3d8240a44af40554373607d81872cc390f7df5f82509

        SHA512

        f5cd4f52712648b5c34acdbe3ecbbde47c9e53172c2b5d001962e89feb4e4b4dc268d068d12c369c428dfa72fce1c4f17abe70c2d2fa728c642f966f689506eb

      • C:\Users\Admin\AppData\Roaming\ets666\config.json.tmp-7809839395d5c84f

        Filesize

        207B

        MD5

        c0a191ea2fc7c7c8668b538afe53eb29

        SHA1

        eaadef3269090f0ee6d93791ccdf280ee3bc1dfc

        SHA256

        64cb997566cbbe95c41b4d7f0d2e0b3423ca67bcde3791a411b3406f03ebda80

        SHA512

        7779d02a714bc2e15c5a2a47d594bf265697f189ac5f89434256837e6ed058f3a7425ae2082613d8d9cc3be2ee874ca68562f4cdb9375185d4ad8f6e53d62b2e

      • memory/2960-610-0x000001DBC65A0000-0x000001DBC65A1000-memory.dmp

        Filesize

        4KB

      • memory/2960-609-0x000001DBC65A0000-0x000001DBC65A1000-memory.dmp

        Filesize

        4KB

      • memory/2960-611-0x000001DBC65A0000-0x000001DBC65A1000-memory.dmp

        Filesize

        4KB

      • memory/2960-615-0x000001DBC65A0000-0x000001DBC65A1000-memory.dmp

        Filesize

        4KB

      • memory/2960-616-0x000001DBC65A0000-0x000001DBC65A1000-memory.dmp

        Filesize

        4KB

      • memory/2960-621-0x000001DBC65A0000-0x000001DBC65A1000-memory.dmp

        Filesize

        4KB

      • memory/2960-620-0x000001DBC65A0000-0x000001DBC65A1000-memory.dmp

        Filesize

        4KB

      • memory/2960-619-0x000001DBC65A0000-0x000001DBC65A1000-memory.dmp

        Filesize

        4KB

      • memory/2960-618-0x000001DBC65A0000-0x000001DBC65A1000-memory.dmp

        Filesize

        4KB

      • memory/2960-617-0x000001DBC65A0000-0x000001DBC65A1000-memory.dmp

        Filesize

        4KB

      • memory/5136-21-0x00007FFAAEB30000-0x00007FFAAEB31000-memory.dmp

        Filesize

        4KB