Overview
overview
7Static
static
3infected/QtCore4.dll
windows10-ltsc 2021-x64
3infected/QtGui4.dll
windows10-ltsc 2021-x64
3infected/Q...k4.dll
windows10-ltsc 2021-x64
3infected/Q...t4.dll
windows10-ltsc 2021-x64
3infected/Setup.exe
windows10-ltsc 2021-x64
7infected/a...-1.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/a...-0.dll
windows10-ltsc 2021-x64
1infected/msvcp100.dll
windows10-ltsc 2021-x64
3infected/msvcr100.dll
windows10-ltsc 2021-x64
3infected/nvdisps.dll
windows10-ltsc 2021-x64
5infected/nvdispsr.dll
windows10-ltsc 2021-x64
1infected/n...32.dll
windows10-ltsc 2021-x64
3infected/t...64.dll
windows10-ltsc 2021-x64
1infected/t...ts.dll
windows10-ltsc 2021-x64
1Resubmissions
08-11-2024 01:13
241108-blevks1lgs 1008-11-2024 00:57
241108-ba4dsstqfn 1007-11-2024 19:15
241107-xypq7sznbk 7Analysis
-
max time kernel
97s -
max time network
143s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07-11-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
infected/QtCore4.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
infected/QtGui4.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
infected/QtNetwork4.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
infected/QtWebKit4.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
infected/Setup.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
infected/api-ms-win-core-processthreads-l1-1-1.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
infected/api-ms-win-core-profile-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
infected/api-ms-win-core-rtlsupport-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
infected/api-ms-win-core-string-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
infected/api-ms-win-core-synch-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
infected/api-ms-win-core-synch-l1-2-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
infected/api-ms-win-core-sysinfo-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
infected/api-ms-win-core-timezone-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
infected/api-ms-win-core-util-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
infected/api-ms-win-crt-conio-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
infected/api-ms-win-crt-convert-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
infected/api-ms-win-crt-environment-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
infected/api-ms-win-crt-filesystem-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
infected/api-ms-win-crt-heap-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
infected/api-ms-win-crt-locale-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
infected/api-ms-win-crt-math-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
infected/api-ms-win-crt-multibyte-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
infected/api-ms-win-crt-private-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
infected/api-ms-win-crt-process-l1-1-0.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
infected/msvcp100.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
infected/msvcr100.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
infected/nvdisps.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral28
Sample
infected/nvdispsr.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral29
Sample
infected/nvptxJitCompiler32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral30
Sample
infected/trading_api64.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral31
Sample
infected/tradingnetworkingsockets.dll
Resource
win10ltsc2021-20241023-en
General
-
Target
infected/Setup.exe
-
Size
80KB
-
MD5
2a8613b7d99903516b8fe02fd820bf52
-
SHA1
78a96addcb556ab1d490fac80f929305263d06b9
-
SHA256
f1d68c5e7c7660d4f2ce412c109b7fe3e088872fa0ebe61ca9ab9dd92a496407
-
SHA512
af0902aeb6169ea507b787da7b61c3533df4610c3f51c1d8f65dfc9008c8ce2580f2d86a49a4d0acc2c51c731f3e4c447d0d1d8e779dc1c75e43d30b79c46436
-
SSDEEP
1536:9A8oAY5SXfidLez+Q+EGfdUHLLXJ+CqoVpPBucQwk7qnKXKo5OMY8xk03ben8TK:M7Ohz+Q+EGlUHLLXJ+CqoTPBucQwktXS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
nc.exepid Process 2436 nc.exe -
Loads dropped DLL 1 IoCs
Processes:
AutoIt3.exepid Process 2452 AutoIt3.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid Process procid_target PID 764 set thread context of 2172 764 Setup.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AutoIt3.exeSetup.exemore.comdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoIt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exemore.compid Process 764 Setup.exe 764 Setup.exe 2172 more.com 2172 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exemore.compid Process 764 Setup.exe 2172 more.com -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Setup.exemore.comdescription pid Process procid_target PID 764 wrote to memory of 2436 764 Setup.exe 81 PID 764 wrote to memory of 2436 764 Setup.exe 81 PID 764 wrote to memory of 2172 764 Setup.exe 87 PID 764 wrote to memory of 2172 764 Setup.exe 87 PID 764 wrote to memory of 2172 764 Setup.exe 87 PID 764 wrote to memory of 2172 764 Setup.exe 87 PID 2172 wrote to memory of 2452 2172 more.com 92 PID 2172 wrote to memory of 2452 2172 more.com 92 PID 2172 wrote to memory of 2452 2172 more.com 92 PID 2172 wrote to memory of 2452 2172 more.com 92 PID 2172 wrote to memory of 2452 2172 more.com 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\infected\Setup.exe"C:\Users\Admin\AppData\Local\Temp\infected\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Roaming\DJGB\RCCZXZWEKVL\nc.exeC:\Users\Admin\AppData\Roaming\DJGB\RCCZXZWEKVL\nc.exe2⤵
- Executes dropped EXE
PID:2436
-
-
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\AutoIt3.exeC:\Users\Admin\AppData\Local\Temp\AutoIt3.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634
-
Filesize
2.3MB
MD538755ab7e0243ac4384f85a1eae2eed2
SHA1047d45902bb3b20fdc0197d69301ec09e0bf7e9a
SHA256e56f855c84d87a3db42528cda113a1157f0341915ebe517332ac366203658c9c
SHA512855b8431e0299e516fccd68f3b9896ba0c05d6b133bd4dbdba9319b60e75398c6cb512794ffd0d92946a51dbb55c7ce840acce73adcea381c358b056cdd9310a
-
Filesize
285KB
MD57fb44c5bca4226d8aab7398e836807a2
SHA147128e4f8afabfde5037ed0fcaba8752c528ff52
SHA256a64ead73c06470bc5c84cfc231b0723d70d29fec7d385a268be2c590dc5eb1ef
SHA512f0bd093f054c99bcc50df4005d0190bd7e3dcefea7008ae4c9b67a29e832e02ae9ff39fa75bc1352c127aeb13afdea9bfdcc238ac826ef17f288d6fbd2ec8cab