Analysis

  • max time kernel
    35s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 03:20

General

  • Target

    Cableguys.Nicky.Romero.Kickstart.2.v2.0.6-TeamCubeadooby.exe

  • Size

    4.6MB

  • MD5

    f57303ea0592088dc7efc67469008966

  • SHA1

    8d922cc263730b21f44f85d12579e9241ff651e1

  • SHA256

    d6b7d9152fb33488f4618cd609d61d53b30d9608d9fafbeabd98bc7f31dcc0e9

  • SHA512

    a3c0caf864f8ddeb3206a5ea9e815bddb63996372a409c2ab8ecf5293b03bf3c99bb9e3be439c6f189f82b127ab46f20c38bd6ba226d5ae9a016145874f88e96

  • SSDEEP

    98304:xkLQThyHj51/hngst7GFlO/tZmCfJPJDJk5NSsxWxc0Ry8C1c7P1ESGoHMpBVbhy:i6hyHf/xpGstZmCBPbMZxEfRPl9TzyXy

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cableguys.Nicky.Romero.Kickstart.2.v2.0.6-TeamCubeadooby.exe
    "C:\Users\Admin\AppData\Local\Temp\Cableguys.Nicky.Romero.Kickstart.2.v2.0.6-TeamCubeadooby.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\is-RR3TJ.tmp\Cableguys.Nicky.Romero.Kickstart.2.v2.0.6-TeamCubeadooby.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-RR3TJ.tmp\Cableguys.Nicky.Romero.Kickstart.2.v2.0.6-TeamCubeadooby.tmp" /SL5="$40112,3740709,808448,C:\Users\Admin\AppData\Local\Temp\Cableguys.Nicky.Romero.Kickstart.2.v2.0.6-TeamCubeadooby.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Cableguys\Kickstart2\Plugin.ico

    Filesize

    31KB

    MD5

    d2db8c23f67f42e0784bcd393fed5aff

    SHA1

    464bc68cde14868b9e3ea779c5a30d6774fba368

    SHA256

    2336a52a3c35a472045a20d38fb9978c90b665dad77184f4fe59a3287a6be3cd

    SHA512

    c4aa9ae07e20f5d9c8edbd4850deacf81817e295ff2eddc2a4590f1e844c82278cbc3684dfe0c2d5746b218450f2f42b029b780fd4b47f34b4dc52ba075edda9

  • C:\Program Files\Common Files\Avid\Audio\Plug-Ins\Cableguys\desktop.ini

    Filesize

    46B

    MD5

    92872f8ac2aed2db0b07e0bd2a2cc207

    SHA1

    6f7560add23274d6e0482754c186b59518269112

    SHA256

    524c4940611c5338397e0bbdd9f23c030da1e5387f772a38b1599b467be78732

    SHA512

    17b4a82fe65178e7701c61239d951155929a1b950c1ad35cd214286fa05032b10f1300bb01ef25910d4685e67dcd511da5f13de531e2210fc413ad77528969df

  • C:\Program Files\Common Files\VST3\Cableguys\Plugin.ico

    Filesize

    20KB

    MD5

    02684ed2859a72684fe37a4b9a2ed8c1

    SHA1

    9bc396ec9b8855a4179cb0ffa94a1560cd28ab15

    SHA256

    32e6e5fa0b708996560b229f8a20b56b4fcdd3a74982c660b834f61db327ce60

    SHA512

    041d45c5f4b65000a5d3581df6ec681fd3374f5602c1a7e3a686d603e87bcf4b054830ba3a28c15bd893efe9b9ed597b711d9a8384c7dd09cbf282bd4320fe62

  • \Program Files\Cableguys\Kickstart2\unins000.exe

    Filesize

    3.0MB

    MD5

    1bbb462e421ce7074142cf1ae564f10f

    SHA1

    8cc71075faf70cf372109f03ac4814a3549929f9

    SHA256

    ed1403ca6af3ec8d0662b65c46e1f0e32d442565e046717b2f11a220e0c1437a

    SHA512

    e0aec67200b0ce8c546335d29eae5a7679c750d9c9b00574cf695ebeeef522d45b9df26549525bc02f3c29d756d6c91952a8ae3165bbc3e812a9edc3f563c58a

  • \Users\Admin\AppData\Local\Temp\is-RR3TJ.tmp\Cableguys.Nicky.Romero.Kickstart.2.v2.0.6-TeamCubeadooby.tmp

    Filesize

    3.0MB

    MD5

    2ac9f67bcf969baca37ad2485709d999

    SHA1

    9ad72faa583059023db7e50d5aa237b3c180ae9c

    SHA256

    d2e1308870a8f00775c43504a0d2d2e77deac507d9893489ebc0d15cef7f864e

    SHA512

    e3c3a824d41631f0b07212d325ac8875355db98434f0902bf9ca234d4988ef012f58e6508147c0b475317adbbe5a4a1b873beac3710878a4825477191e5906a0

  • memory/2012-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/2012-0-0x0000000000400000-0x00000000004D3000-memory.dmp

    Filesize

    844KB

  • memory/2012-75-0x0000000000400000-0x00000000004D3000-memory.dmp

    Filesize

    844KB

  • memory/2012-10-0x0000000000400000-0x00000000004D3000-memory.dmp

    Filesize

    844KB

  • memory/2336-8-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/2336-15-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/2336-13-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/2336-74-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/2336-11-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB