Resubmissions
08-11-2024 01:13
241108-blevks1lgs 1008-11-2024 00:57
241108-ba4dsstqfn 1007-11-2024 19:15
241107-xypq7sznbk 7Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20241023-it -
resource tags
arch:x64arch:x86image:win11-20241023-itlocale:it-itos:windows11-21h2-x64systemwindows -
submitted
08-11-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
infected.zip
Resource
win10ltsc2021-20241023-it
Behavioral task
behavioral2
Sample
infected.zip
Resource
win11-20241023-it
General
-
Target
infected.zip
-
Size
31.2MB
-
MD5
f3086b596f50e215a706559d5ec8cbc8
-
SHA1
afa5c27fbc93d1398d00324de3ac467ae377bc6e
-
SHA256
5f73dab125efbe100426f39621d5fdedb343a1d912f88ed322ed04a66daab473
-
SHA512
d5141566392f7089da4db9940d0ec86d236dfb68dbf05f9377797df0d9ae2b447cffe75fe0d32be402e6f3af57aff677e9ae604a63b839afd62f362a9c687016
-
SSDEEP
786432:qHjbJsO6eSFdZUDAea6ebsP+DPdIfpCdFD5ojjBW7PQbB:GjCRVFrDeqbsPCdIfpCnDWMbQF
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Setup.exenc.exepid Process 900 Setup.exe 1736 nc.exe -
Loads dropped DLL 7 IoCs
Processes:
Setup.exeAutoIt3.exepid Process 900 Setup.exe 900 Setup.exe 900 Setup.exe 900 Setup.exe 900 Setup.exe 900 Setup.exe 3224 AutoIt3.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid Process procid_target PID 900 set thread context of 1384 900 Setup.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Setup.exemore.comAutoIt3.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoIt3.exe -
Modifies registry class 2 IoCs
Processes:
7zFM.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exemore.compid Process 900 Setup.exe 900 Setup.exe 1384 more.com 1384 more.com -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid Process 4620 7zFM.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exemore.compid Process 900 Setup.exe 1384 more.com -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
7zFM.exesvchost.exedescription pid Process Token: SeRestorePrivilege 4620 7zFM.exe Token: 35 4620 7zFM.exe Token: SeSecurityPrivilege 4620 7zFM.exe Token: SeBackupPrivilege 2596 svchost.exe Token: SeRestorePrivilege 2596 svchost.exe Token: SeSecurityPrivilege 2596 svchost.exe Token: SeTakeOwnershipPrivilege 2596 svchost.exe Token: 35 2596 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zFM.exepid Process 4620 7zFM.exe 4620 7zFM.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Setup.exemore.comdescription pid Process procid_target PID 900 wrote to memory of 1736 900 Setup.exe 86 PID 900 wrote to memory of 1736 900 Setup.exe 86 PID 900 wrote to memory of 1384 900 Setup.exe 87 PID 900 wrote to memory of 1384 900 Setup.exe 87 PID 900 wrote to memory of 1384 900 Setup.exe 87 PID 900 wrote to memory of 1384 900 Setup.exe 87 PID 1384 wrote to memory of 3224 1384 more.com 89 PID 1384 wrote to memory of 3224 1384 more.com 89 PID 1384 wrote to memory of 3224 1384 more.com 89 PID 1384 wrote to memory of 3224 1384 more.com 89 PID 1384 wrote to memory of 3224 1384 more.com 89
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\infected.zip"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4620
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1240
-
C:\Users\Admin\Desktop\infected\Setup.exe"C:\Users\Admin\Desktop\infected\Setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Roaming\DJGB\MXZVNUWLBQGFTSWXA\nc.exeC:\Users\Admin\AppData\Roaming\DJGB\MXZVNUWLBQGFTSWXA\nc.exe2⤵
- Executes dropped EXE
PID:1736
-
-
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\AutoIt3.exeC:\Users\Admin\AppData\Local\Temp\AutoIt3.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3224
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5b48e5bfca952e4d71e63a2217dff60ea
SHA1046a7c4ac8534e6683db24ee8597220b3b61acc7
SHA25605a996be8e0bbb4cebe5d5a41f628e6403c2dabc2f000ec82037d7c2aec2dde9
SHA512eba713cf7abd5c5e3fb2a488c545331c75adccf46dd6de99300256ef686f150243b3275528e1d67d96b2e3542317a6fc4c1f9e01faacab85a0dbf3811310c908
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634
-
Filesize
285KB
MD57fb44c5bca4226d8aab7398e836807a2
SHA147128e4f8afabfde5037ed0fcaba8752c528ff52
SHA256a64ead73c06470bc5c84cfc231b0723d70d29fec7d385a268be2c590dc5eb1ef
SHA512f0bd093f054c99bcc50df4005d0190bd7e3dcefea7008ae4c9b67a29e832e02ae9ff39fa75bc1352c127aeb13afdea9bfdcc238ac826ef17f288d6fbd2ec8cab
-
Filesize
2.5MB
MD5fecc62a37d37d9759e6b02041728aa23
SHA10c5f646caef7a6e9073d58ed698f6cfbfb2883a3
SHA25694c1395153d7758900979351e633ab68d22ae9b306ef8e253b712a1aab54c805
SHA512698f90f1248dacbd4bdc49045a4e80972783d9dcec120d187abd08f5ef03224b511f7870320938b7e8be049c243ffb1c450c847429434ef2e2c09288cb9286a6
-
Filesize
8.2MB
MD5831ba3a8c9d9916bdf82e07a3e8338cc
SHA16c89fd258937427d14d5042736fdfccd0049f042
SHA256d2c8c8b6cc783e4c00a5ef3365457d776dfc1205a346b676915e39d434f5a52d
SHA512beda57851e0e3781ece1d0ee53a3f86c52ba99cb045943227b6c8fc1848a452269f2768bf4c661e27ddfbe436df82cfd1de54706d814f81797a13fefec4602c5
-
Filesize
1.0MB
MD58a2e025fd3ddd56c8e4f63416e46e2ec
SHA15f58feb11e84aa41d5548f5a30fc758221e9dd64
SHA25652ae07d1d6a467283055a3512d655b6a43a42767024e57279784701206d97003
SHA5128e3a449163e775dc000e9674bca81ffabc7fecd9278da5a40659620cfc9cc07f50cc29341e74176fe10717b2a12ea3d5148d1ffc906bc809b1cd5c8c59de7ba1
-
Filesize
12.5MB
MD5094f4248b13cc9890c3d9984d9cf4753
SHA1fd56012de8499b6a4d37f4a011e352c096a564b5
SHA256e22b92470da89cb30ff0d57a177e429a7a6b49ada3ad1f351546ff77783126b7
SHA512c6d93720ed384301247dd961c8d3cd2f8663416039063f404c507c95d4fafbb7f4b1a4982e096b9c43b0fdc3d6d2faa2565397cd96072ce9a6e74910a91e326c
-
Filesize
80KB
MD52a8613b7d99903516b8fe02fd820bf52
SHA178a96addcb556ab1d490fac80f929305263d06b9
SHA256f1d68c5e7c7660d4f2ce412c109b7fe3e088872fa0ebe61ca9ab9dd92a496407
SHA512af0902aeb6169ea507b787da7b61c3533df4610c3f51c1d8f65dfc9008c8ce2580f2d86a49a4d0acc2c51c731f3e4c447d0d1d8e779dc1c75e43d30b79c46436
-
Filesize
1.6MB
MD598a00db9b31d4cf6ace08e0eb4925e5f
SHA1d8aa1d8e0d8ea19ec7e6dc86e56988cd9e1abc52
SHA256aa7908817b249bca8e364bbc6e11732dab1270e97b17855002f3251c54e7de5c
SHA512aef598d7fcbd2bff4469b0a6603fd1d9f670ae7de29c0690cdde69fa8fadc335c739000038c5524c0b74cff12732191aacfe9c53fdcfd8052a3ed4fb30561641
-
Filesize
411KB
MD503e9314004f504a14a61c3d364b62f66
SHA10aa3caac24fdf9d9d4c618e2bbf0a063036cd55d
SHA256a3ba6421991241bea9c8334b62c3088f8f131ab906c3cc52113945d05016a35f
SHA5122fcff4439d2759d93c57d49b24f28ae89b7698e284e76ac65fe2b50bdefc23a8cc3c83891d671de4e4c0f036cef810856de79ac2b028aa89a895bf35abff8c8d
-
Filesize
752KB
MD567ec459e42d3081dd8fd34356f7cafc1
SHA11738050616169d5b17b5adac3ff0370b8c642734
SHA2561221a09484964a6f38af5e34ee292b9afefccb3dc6e55435fd3aaf7c235d9067
SHA5129ed1c106df217e0b4e4fbd1f4275486ceba1d8a225d6c7e47b854b0b5e6158135b81be926f51db0ad5c624f9bd1d09282332cf064680dc9f7d287073b9686d33
-
Filesize
19KB
MD5a3f833dd4f930631e3115a02949c8ebf
SHA10b216e0a51496852d7bd2eeb929d28a7980e87bd
SHA256e2388092fb1f05fe80f3a4837f868ccc145fdf5b60e2bd042556c8a3dd2014a8
SHA512e5e6fae414ec65d719b808b13156f79fc0f116824f7cfbbb2eea1dbfa63a917d45cff2ebb4b86a8c159e745548ee9f7338b9983897d877692b679abf61d15c34