Overview
overview
10Static
static
10EXMPremium...ty.exe
windows7-x64
7EXMPremium...ty.exe
windows10-2004-x64
8EXMPremium...ty.exe
windows7-x64
7EXMPremium...ty.exe
windows10-2004-x64
8System.Management.dll
windows7-x64
1System.Management.dll
windows10-2004-x64
1batchcolle...ver.py
windows7-x64
3batchcolle...ver.py
windows10-2004-x64
3batchcolle...a3.ps1
windows7-x64
3batchcolle...a3.ps1
windows10-2004-x64
3batchcolle...a5.ps1
windows7-x64
3batchcolle...a5.ps1
windows10-2004-x64
3batchcolle...d8.ps1
windows7-x64
3batchcolle...d8.ps1
windows10-2004-x64
3batchcolle...c3.ps1
windows7-x64
3batchcolle...c3.ps1
windows10-2004-x64
3mongocrypt.dll
windows7-x64
1mongocrypt.dll
windows10-2004-x64
1setup.bat
windows7-x64
1setup.bat
windows10-2004-x64
1start.bat
windows7-x64
1start.bat
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 08:04
Behavioral task
behavioral1
Sample
EXMPremiumTweakingUtility.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
EXMPremiumTweakingUtility.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
EXMPremiumTweakingUtility.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
EXMPremiumTweakingUtility.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
System.Management.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
System.Management.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
batchcollect/1server.py
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
batchcollect/1server.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
batchcollect/66633ccafefd3f809284c7a3.ps1
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
batchcollect/66633ccafefd3f809284c7a3.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
batchcollect/66633ccafefd3f809284c7a5.ps1
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
batchcollect/66633ccafefd3f809284c7a5.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
batchcollect/667184c50fa995fe2d9c7dd8.ps1
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
batchcollect/667184c50fa995fe2d9c7dd8.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
batchcollect/67101017e4be43ad7e545dc3.ps1
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
batchcollect/67101017e4be43ad7e545dc3.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
mongocrypt.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
mongocrypt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
setup.bat
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
setup.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
start.bat
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
start.bat
Resource
win10v2004-20241007-en
General
-
Target
batchcollect/1server.py
-
Size
1KB
-
MD5
7ecc4517bf649059b43af820a60fe87a
-
SHA1
7b42b1ead4c95a0a358083e8e3792c6d58d14a81
-
SHA256
4a475bc4076aa108386e67e85616bb0d43d1151939badc51a45f861cd33ca034
-
SHA512
f100b2a7725055c6208e0ff70d3c60d29bbe29b058506640231baa158e54481ca8f32b4774de57c9d7d67b7fc9558d0a77e6efd995a97665b70b5713c79ea9c1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2932 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2932 AcroRd32.exe 2932 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1016 wrote to memory of 1912 1016 cmd.exe 29 PID 1016 wrote to memory of 1912 1016 cmd.exe 29 PID 1016 wrote to memory of 1912 1016 cmd.exe 29 PID 1912 wrote to memory of 2932 1912 rundll32.exe 30 PID 1912 wrote to memory of 2932 1912 rundll32.exe 30 PID 1912 wrote to memory of 2932 1912 rundll32.exe 30 PID 1912 wrote to memory of 2932 1912 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\batchcollect\1server.py1⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\batchcollect\1server.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\batchcollect\1server.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fd47165765f2475f4bb1e3eecd73c013
SHA1a5709a9c16e646519712618b969b326eba669754
SHA25666686112579c135fc0e62c91d06bbd61205138b279e8d35b9862121827824943
SHA512cbce7886110af3a199ad165969af41a1d80b6a7d7d97790909cd4a4b873e1e804bab3a289b3c4d8956a304ade70837772e3693884ace8d045005785c33f45f05