Overview
overview
7Static
static
3rebuilder.exe
windows10-1703-x64
3tool/core.jar
windows10-1703-x64
7tool/cyggcc_s-1.dll
windows10-1703-x64
3tool/cygwin1.dll
windows10-1703-x64
3tool/cygz.dll
windows10-1703-x64
3tool/dklic...or.exe
windows10-1703-x64
1tool/klic_...er.exe
windows10-1703-x64
1tool/rap2rifkey.exe
windows10-1703-x64
3tool/scetool.exe
windows10-1703-x64
3tool/sfk.exe
windows10-1703-x64
3Analysis
-
max time kernel
1790s -
max time network
1576s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
12-10-2024 11:53
Static task
static1
Behavioral task
behavioral1
Sample
rebuilder.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
tool/core.jar
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
tool/cyggcc_s-1.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
tool/cygwin1.dll
Resource
win10-20240611-en
Behavioral task
behavioral5
Sample
tool/cygz.dll
Resource
win10-20240611-en
Behavioral task
behavioral6
Sample
tool/dklic_validator.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
tool/klic_bruteforcer.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
tool/rap2rifkey.exe
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
tool/scetool.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
tool/sfk.exe
Resource
win10-20240404-en
General
-
Target
rebuilder.exe
-
Size
114KB
-
MD5
03d31114dbdd3dd49e6d374930989114
-
SHA1
a485474bddbe34504d726787f082d40058d26af6
-
SHA256
4baec23db026d032791adfb7a36f34b3db43adac328bff1365742bcde4b13007
-
SHA512
72ee30a8204fcf2b651da4771ee40c20113020cbcabd295abebf0fbaaaa4be64fef77c12663080ee5ab9facf86f26c3265db80be93dbdbca5d95e9d611515ea8
-
SSDEEP
3072:odJyqnWGeiR/llxsIsYMEpOqFHtWIftBKo:odJB9jvOQ/HKo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rebuilder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4144 wrote to memory of 308 4144 rebuilder.exe 74 PID 4144 wrote to memory of 308 4144 rebuilder.exe 74 PID 4144 wrote to memory of 308 4144 rebuilder.exe 74 PID 308 wrote to memory of 200 308 cmd.exe 75 PID 308 wrote to memory of 200 308 cmd.exe 75 PID 308 wrote to memory of 200 308 cmd.exe 75 PID 308 wrote to memory of 32 308 cmd.exe 76 PID 308 wrote to memory of 32 308 cmd.exe 76 PID 308 wrote to memory of 32 308 cmd.exe 76 PID 308 wrote to memory of 2232 308 cmd.exe 77 PID 308 wrote to memory of 2232 308 cmd.exe 77 PID 308 wrote to memory of 2232 308 cmd.exe 77 PID 308 wrote to memory of 3452 308 cmd.exe 78 PID 308 wrote to memory of 3452 308 cmd.exe 78 PID 308 wrote to memory of 3452 308 cmd.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\rebuilder.exe"C:\Users\Admin\AppData\Local\Temp\rebuilder.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4144H40K.bat" "C:\Users\Admin\AppData\Local\Temp\rebuilder.exe""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\mode.commode con:lines=323⤵
- System Location Discovery: System Language Discovery
PID:200
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Runtime Environment"3⤵
- System Location Discovery: System Language Discovery
PID:32
-
-
C:\Users\Admin\AppData\Local\Temp\tool\sfk.exetool\sfk list -size temp\javachk.txt3⤵
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\JavaSoft\Java Runtime Environment"3⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD544e509d6f9afa7d4efd610fa627d2d54
SHA1808ad3988b5bdde017f5a1ace2ef4c937ef8b2f1
SHA256f32f2168301fde3d7a18482a04cb05c9e0ae52e9e02fd3a8aeca45345dabfb92
SHA51244aa5f00f6c7eacc44ad8ba9589cd88c58e8d3b11bd181d455de029e312ef76e6c59f3037ecc1b1e20b04e076394aeb0de703739c2b2999882770eca2d8a7e8d