Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 14:53
Static task
static1
Behavioral task
behavioral1
Sample
6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe
Resource
win7-20240903-en
General
-
Target
6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe
-
Size
1.0MB
-
MD5
5097fe796d4bca99a3d79998c27116cd
-
SHA1
2e78d6968f547a5d70e5795ce89cbd51a06a90fa
-
SHA256
6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f
-
SHA512
d5c8c470c6496e4bc0fc1781f59cbd19f7a96d8cc98d3a5a5956123761bac1f7a635db3b908050652cb42a7ee2f0cd924cb5809239291d5ac3b5c2d723389180
-
SSDEEP
24576:hN/BUBb+tYjBFHNhz6FI9Dh7WinTX1zJ54D+q0lPBzkFy:jpUlRhPzna4X1zJ5w+JPBAy
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
gbkusncub.pptRegSvcs.exeRegSvcs.exepid Process 2588 gbkusncub.ppt 2912 RegSvcs.exe 2940 RegSvcs.exe -
Loads dropped DLL 3 IoCs
Processes:
cmd.exegbkusncub.pptpid Process 2624 cmd.exe 2588 gbkusncub.ppt 2588 gbkusncub.ppt -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
gbkusncub.pptdescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\llkd\\GBKUSN~1.EXE C:\\Users\\Admin\\llkd\\hcmdvu.msc" gbkusncub.ppt -
Suspicious use of SetThreadContext 1 IoCs
Processes:
gbkusncub.pptdescription pid Process procid_target PID 2588 set thread context of 2912 2588 gbkusncub.ppt 42 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ipconfig.exe6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exeWScript.execmd.execmd.exeipconfig.exegbkusncub.pptcmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gbkusncub.ppt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid Process 2580 ipconfig.exe 1188 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
gbkusncub.pptpid Process 2588 gbkusncub.ppt 2588 gbkusncub.ppt 2588 gbkusncub.ppt 2588 gbkusncub.ppt 2588 gbkusncub.ppt 2588 gbkusncub.ppt 2588 gbkusncub.ppt 2588 gbkusncub.ppt -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exeWScript.execmd.execmd.execmd.exegbkusncub.pptdescription pid Process procid_target PID 264 wrote to memory of 2716 264 6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe 31 PID 264 wrote to memory of 2716 264 6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe 31 PID 264 wrote to memory of 2716 264 6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe 31 PID 264 wrote to memory of 2716 264 6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe 31 PID 2716 wrote to memory of 2836 2716 WScript.exe 32 PID 2716 wrote to memory of 2836 2716 WScript.exe 32 PID 2716 wrote to memory of 2836 2716 WScript.exe 32 PID 2716 wrote to memory of 2836 2716 WScript.exe 32 PID 2716 wrote to memory of 2624 2716 WScript.exe 34 PID 2716 wrote to memory of 2624 2716 WScript.exe 34 PID 2716 wrote to memory of 2624 2716 WScript.exe 34 PID 2716 wrote to memory of 2624 2716 WScript.exe 34 PID 2836 wrote to memory of 2580 2836 cmd.exe 36 PID 2836 wrote to memory of 2580 2836 cmd.exe 36 PID 2836 wrote to memory of 2580 2836 cmd.exe 36 PID 2836 wrote to memory of 2580 2836 cmd.exe 36 PID 2624 wrote to memory of 2588 2624 cmd.exe 37 PID 2624 wrote to memory of 2588 2624 cmd.exe 37 PID 2624 wrote to memory of 2588 2624 cmd.exe 37 PID 2624 wrote to memory of 2588 2624 cmd.exe 37 PID 2716 wrote to memory of 1852 2716 WScript.exe 38 PID 2716 wrote to memory of 1852 2716 WScript.exe 38 PID 2716 wrote to memory of 1852 2716 WScript.exe 38 PID 2716 wrote to memory of 1852 2716 WScript.exe 38 PID 1852 wrote to memory of 1188 1852 cmd.exe 40 PID 1852 wrote to memory of 1188 1852 cmd.exe 40 PID 1852 wrote to memory of 1188 1852 cmd.exe 40 PID 1852 wrote to memory of 1188 1852 cmd.exe 40 PID 2588 wrote to memory of 2940 2588 gbkusncub.ppt 41 PID 2588 wrote to memory of 2940 2588 gbkusncub.ppt 41 PID 2588 wrote to memory of 2940 2588 gbkusncub.ppt 41 PID 2588 wrote to memory of 2940 2588 gbkusncub.ppt 41 PID 2588 wrote to memory of 2940 2588 gbkusncub.ppt 41 PID 2588 wrote to memory of 2940 2588 gbkusncub.ppt 41 PID 2588 wrote to memory of 2940 2588 gbkusncub.ppt 41 PID 2588 wrote to memory of 2912 2588 gbkusncub.ppt 42 PID 2588 wrote to memory of 2912 2588 gbkusncub.ppt 42 PID 2588 wrote to memory of 2912 2588 gbkusncub.ppt 42 PID 2588 wrote to memory of 2912 2588 gbkusncub.ppt 42 PID 2588 wrote to memory of 2912 2588 gbkusncub.ppt 42 PID 2588 wrote to memory of 2912 2588 gbkusncub.ppt 42 PID 2588 wrote to memory of 2912 2588 gbkusncub.ppt 42 PID 2588 wrote to memory of 2912 2588 gbkusncub.ppt 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe"C:\Users\Admin\AppData\Local\Temp\6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rwwk.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c gbkusncub.ppt hcmdvu.msc3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\gbkusncub.pptgbkusncub.ppt hcmdvu.msc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
PID:2912
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1188
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522B
MD5e51ef2d4160c0f41b42ea8f38dedaa45
SHA1aca488c15e88ad25e089eb374b6c1ead4c800e68
SHA2564b7eabb2302fec9292a5aeb5949d54c0744c57de6cc527fb285441d29fae3c24
SHA5124bf85824b9f0447e175fef3a731a514df19470b45611df683d6aafb5844d1dd23512ef092480ff715978c4e27df129cea355493fa56d2407a24dc3b993b403e0
-
Filesize
562B
MD50a597abaa9895b8a6e2a1e01c1d2e207
SHA1f37d888d098be4d11e5c170fb8e1e7470d91290c
SHA2569d7b071af5a275c98a994d56ee211e646c8aa2cba39fb37fa20d78f73179552f
SHA5129686f6182a3946c9013ea0b0147cc0ead5ecbe529645e6e70faf5779acb72f48849e9cae7c2519fd497a169d9b7a7f2acef990a85401727c42ce4a6994703b2b
-
Filesize
511B
MD5685b8082e059988e8f569a7c957d67cc
SHA16402355c5a4a7514a39fee6ee37c46902a4efc24
SHA2562b14a53107fec583b8ecb5055d194a2c5997491cb91a7cddf989dfd787fd577d
SHA5125692ac0f30dac8f18c0c0d52578cda99ce2f3c9656b5b2c6437dda4e5c6c014e8f94f5584785c50847346be963b737e3fce0c727884955c01c9129eff2154a44
-
Filesize
570B
MD5bb96fa2eb279e1fa70ee33b80ddf5486
SHA1d4eca17fd2b78bfb8264295e6f254255649ca3af
SHA256bb828b95aa2bef4d424ae1ecc976435ad053b06ec5e89af75de2763b0cce523c
SHA512bd81985876a5cf9d4c579a2f0ea7738b28df12c1f2a9c4c1a8c12ace89b1a32bdf098987b807435f2cc950695015b7069b61360f55d9e3ba711359609a7e7b04
-
Filesize
543B
MD5f7490a6265f334876342496600dfca5c
SHA1e79e42617ba61c13293b3ad44d2fdcb547fd75f3
SHA256b61b5dbc2284545df43d06b8434819b95bcc6ae4e5e22617f05a97e5ac2fef17
SHA512b2ee0fd841a658df4ccb2db1d63a31aeebf47baa4a3ff6d8fd956ad76531e131b61a637b2ba49e1d161b6950c06e838b61bc19bf840832c68cc559649acc9c06
-
Filesize
514B
MD53d8dd208a1bc990063b574044319ff30
SHA18a028e38eecaaa27c448ec281bfc1a00045895b5
SHA25684d1770a96d4802e652390702f6022d144238548a7f0f6a80497975165cfe2c3
SHA51262e46b51fe8569d5c24a96f398ab826457f5ed2a98fa7af27e012bbad7a83c6d6a0d31338192d0276617c2c99314bb71ab13d995db4118ba54c5909b706467cf
-
Filesize
529B
MD52ddf35f6efa65e7b1e286e3839980288
SHA1dcbcfd1ed8d5a63e07b89bdf65ec39af1373c4f8
SHA2568da7643f1455aed90195609e344014ada2f338c6f7e59c68faef3a7714f84b3b
SHA512980bb720a6326d2f60e7e3e70ef65b3131b1166383cbc42b57d5474d03f884ab271da8847f2679d640931813cf27c88800b9a1f780a6f6912e9cd98dc948e887
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
513B
MD545d2330198499ebfd1b73e984826fe5e
SHA16178824c68fb54d2e79aa6914b517530628b8220
SHA2567407261ce6f3f09ffb85b70a630d7d951e2bd88f709b7f504f2dbef21bd3dd6c
SHA51286056988f1eee5339620c8906aaa4914718d3b8ceb6c69ae65401358dfab1ff66cda12de286770fe675104358d31b200a4d60b24f8c224ada2ac0a4640fb359f
-
Filesize
540B
MD55a33acb108a1c219ed1194d8381cd40a
SHA1d55846b97a021bbe4dcf490085a0824ad2c38961
SHA256f26513a135fa2e295c130a54290838e954b668d5aa013887f12b09ca0a735e93
SHA512a18fd243b2463ff6ea3cb61c7347cfa3c66f757647e9185a8a65114de11def9bd0ca40d8bc08da3ed0f45f913b948a7e377367d1d93739beb2d593e5496229c5
-
Filesize
351KB
MD5fae6ee35c0f5ac2dc4885c0de8e88032
SHA1587bf6f4105d4420762c463ba33e9e3ba677e85f
SHA2564db090b6f1cd2501c929b31c2e29d4d0a4ddf1e81be6800e763d8c45bea8744d
SHA5121ce62d900017dd4545023acc3ca32daee7eb454a6144c99958d57e88838402013854f410b8be1fb5d607819c48ba72fefecc11d2c78a81408855bf3899e04b38
-
Filesize
581B
MD516fa357e6e8840d33742a7717112abd8
SHA1866906ce593fbc4b7a27f7c4d6ed172a225b0d50
SHA2566b5ea4f4f6718ff1f3ec6b8c7f6518f447de4cea2ab2dac8a5371202487b7939
SHA512a4d39e318aabee034e1225ed91c7ea06f1cd93b013cde0ef34bd6e3b2ce4719615efe7f9da98611d872d6fdf7062c4d13079776b27c75bb407332bc0cf443c5d
-
Filesize
512B
MD5470edbbda73def0f717d602dd7f78c56
SHA17aaa4969c33a33a770534cbabbeb8bb100106a7f
SHA256bdb2567db5e89eeb431c2c4dfac73673e50b512258684cc67d9ccea0b2665b64
SHA51247a1c4a233d6f52a7f756d17861552fda764b8d20cdbf61155f9445905ae7885050e39788b991692452ad71a76abb3765a7d20e5edd9838c6f77478c60550ce9
-
Filesize
637B
MD581feb95c89263dc75504bff8e06a5d90
SHA110454bc7f50a03508fa973874fbdcf433bd2d2f6
SHA25685609bb1d624bcbc6db2a4db193e871d08c3c22f826f214dd34cb0cb3255b479
SHA512029325eba2ddf3fc3c263a4719df6963433bab9bf4e568ee007662b62289ee69cf4e28566975679230d95e67f7697a28e4a300fdb27844c22fb810506b3306cf
-
Filesize
62KB
MD5465381aa4e9b430423f61894f1ca3b7a
SHA1cb87f2e9902cd6fd1559afaffbf93d427e2db11c
SHA2562bd6653b99fc6535c1fcae63c1091f6bc227e20a72b0501f46eebee5e073677a
SHA5128f38351940dbe639c447b06cd3004d421669d3f880c2e6c0db421a2774cc92a91d6aa66e58a27e688b49d6b6881eb4134ac20a707891630516da5ab7406666e0
-
Filesize
42KB
MD59c3405160c29af9d745c01e85258d216
SHA128fc240be5dab0d20e11513c838039b1edfd8eae
SHA256a197e7a9fe3a95b01be43406fa6b497d3e5a650af15665bcbeb1d47b5566b81d
SHA5122c41e654c916ac53381742a29cdbd8ab00134f51d18799397ab86709eb89247b911f269dba871860f39f0b874e50773bd11fd085171ec2155a02e73e41e221e4
-
Filesize
42KB
MD522f822322ddddb7e3169080058b05ae6
SHA1125f3af3d92bf7852ad9936449c0f66d8ddc9b2a
SHA256b5ae6a489465ef6111a05c70e4c455825da1aefa4da28672ab14708fc862c8e5
SHA5129339143cde357a11eb17b2ea358a4f7c20d8ba1c013130cf5b135e5f31152e73216b3145a8d95bbdab463ccdde905b9156edce9f67efda6b0ae8161d3ea51946
-
Filesize
528B
MD56f6df56c43cc6f1c193aad1c7ab82d06
SHA1854f0199c9223417a3b6f82ada40afae98d144b6
SHA2561ac36434bcaf1b5092e4c4ad1038cca646817fe26c12d9efea0d1ee708f5e7b6
SHA5120ed1a079782d22bd1f4f5ef8c990cb1cdfb35042acb3e636e539468ea81d9c76ce9d8fbd9250e490b80808a19cffc151832279d630529a370aeb97452be9cf23
-
Filesize
543B
MD5f0e4edf30f267fbc4c721e275845377a
SHA104ecffcbfbaea9c4e75f005e19cfee8146c6bb34
SHA2567d06a00c8471f7e712c435ef1ccbe2e9d84550db3cdc9849d33fd8fb9e49985b
SHA512d90197c3f3a5fd8237cc5db49106763af311f4084b71a12e4755152e2fc740cfb1c1b9f3ae468bef489c3c1cdc776f576f98cbe82e740040fe09262aa9bde253
-
Filesize
509B
MD51f26c199cc3920e832244b417095e92d
SHA10377748fa2da7c3d521b800f6f84b76f8f975418
SHA25680489b9caf4a3e00356ae69a3d94ca7b5afb54e162e4cd2b2ab5f57dd91ea1ed
SHA512dddd31c3d68cdafeb3fc5eeb54fcb8d5221db34c7afec1374c727f900971807a2e064828611f75ac58a66cbce3bda67a0b7db3b7e63ef97a2cf61f231a5beea7
-
Filesize
527B
MD549b1d10a8bee0b150f2662b0b0fd9de3
SHA1e276a3601859997b41081f368c8aac69e7ee97b2
SHA256ed87e32fb424996b03e4ca15b2ea08804e2098d2b8c534b1ff2b932bbe7184ee
SHA5121ad7647287a8cdb62f760f7f154808966a7df689c98919caef1f5c6d03c0059cf50503d72987ee7acea3aea06c886ad2da133eba31e39048b882c98045a056a7
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215