Resubmissions
14/10/2024, 20:34
241014-zcvfnsygrr 614/10/2024, 18:30
241014-w5sk1azcmh 614/10/2024, 15:58
241014-tewtmaxcjp 614/10/2024, 14:34
241014-rxwkgatfrn 614/10/2024, 14:26
241014-rr7esatejq 614/10/2024, 13:27
241014-qp5bzasajl 614/10/2024, 13:17
241014-qjty2sxbra 614/10/2024, 13:00
241014-p8z1xswfqd 614/10/2024, 12:16
241014-pfqa1svdna 614/10/2024, 12:11
241014-pck7wsvdjc 6Analysis
-
max time kernel
1625s -
max time network
1808s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
Uthnarak, Nercrotic master.json
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Uthnarak, Nercrotic master.json
Resource
win10v2004-20241007-en
General
-
Target
Uthnarak, Nercrotic master.json
-
Size
56KB
-
MD5
9e309898a7fcbd956e7abe34d640e839
-
SHA1
2078318c5a6bae82c40a9c605433df578527debb
-
SHA256
001142778ad86798294c311a2e5d870a0606fe39a4e5474ef7fe47f37e90a27f
-
SHA512
085334f98013047b320bf253c0d291c543723b8bd85272e4474e8ffefef549bb3b9740233b4f4617d43c3a7017583d3021ff4dd4bf8b1fbd84471a1d6cd147bb
-
SSDEEP
1536:lfjoYIGqY6og/IaNa94he47GK9qQHwHdqFPv9ot:loXnsgRNa94he47GK9vw94Pvat
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 95 discord.com 110 discord.com 135 discord.com 18 discord.com 19 discord.com 85 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2948 3008 cmd.exe 39 PID 3008 wrote to memory of 2948 3008 cmd.exe 39 PID 3008 wrote to memory of 2948 3008 cmd.exe 39
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Uthnarak, Nercrotic master.json"1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Uthnarak, Nercrotic master.json2⤵
- Modifies registry class
PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1392 --field-trial-handle=1020,i,9480108585670056737,16449419605127400930,131072 /prefetch:21⤵PID:2376
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --mojo-platform-channel-handle=1296 --field-trial-handle=1020,i,9480108585670056737,16449419605127400930,131072 /prefetch:11⤵PID:2444
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3448 --field-trial-handle=1020,i,9480108585670056737,16449419605127400930,131072 /prefetch:81⤵PID:1328
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3568 --field-trial-handle=1020,i,9480108585670056737,16449419605127400930,131072 /prefetch:81⤵PID:3044
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3828 --field-trial-handle=1020,i,9480108585670056737,16449419605127400930,131072 /prefetch:81⤵PID:2516
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=3908 --field-trial-handle=1020,i,9480108585670056737,16449419605127400930,131072 /prefetch:11⤵PID:2136
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=3432 --field-trial-handle=1020,i,9480108585670056737,16449419605127400930,131072 /prefetch:11⤵PID:1872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2476 --field-trial-handle=1020,i,9480108585670056737,16449419605127400930,131072 /prefetch:81⤵PID:620
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=996 --field-trial-handle=1020,i,9480108585670056737,16449419605127400930,131072 /prefetch:81⤵PID:1572
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=696 --field-trial-handle=1020,i,9480108585670056737,16449419605127400930,131072 /prefetch:81⤵PID:2572