Analysis
-
max time kernel
300s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
Certificate 11-19AIS.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Certificate 11-19AIS.exe
Resource
win10v2004-20241007-en
General
-
Target
Certificate 11-19AIS.exe
-
Size
1.1MB
-
MD5
1e1db5d9c073fcff1706c32d887e3e28
-
SHA1
76cd9d1e4b8817fccba215ecdf8916a8e9bcbe8b
-
SHA256
4de8d7a95ca5edd2a521f7232b56b02d2f684f1638a2a704270631c127ba9c02
-
SHA512
3bcde550451b05e5f0f6040ffead01af2b25625738a4dfaa30817fb6d7c6e933e68624e2954ce9db795c4bca5cd635186bd727ff8b39b38ee9e3da27a3270677
-
SSDEEP
24576:otb20pkaCqT5TBWgNQ7a5yp3ZKcX+7a2PUMdHxzHdUH6A:xVg5tQ7a5ypJKc+7zddHxBq5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2348 set thread context of 2340 2348 Certificate 11-19AIS.exe 30 PID 2340 set thread context of 1228 2340 svchost.exe 21 PID 2340 set thread context of 2556 2340 svchost.exe 31 PID 2556 set thread context of 1228 2556 netbtugc.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Certificate 11-19AIS.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe 2556 netbtugc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2348 Certificate 11-19AIS.exe 2340 svchost.exe 1228 Explorer.EXE 1228 Explorer.EXE 2556 netbtugc.exe 2556 netbtugc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1228 Explorer.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2348 Certificate 11-19AIS.exe 2348 Certificate 11-19AIS.exe 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2348 Certificate 11-19AIS.exe 2348 Certificate 11-19AIS.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2340 2348 Certificate 11-19AIS.exe 30 PID 2348 wrote to memory of 2340 2348 Certificate 11-19AIS.exe 30 PID 2348 wrote to memory of 2340 2348 Certificate 11-19AIS.exe 30 PID 2348 wrote to memory of 2340 2348 Certificate 11-19AIS.exe 30 PID 2348 wrote to memory of 2340 2348 Certificate 11-19AIS.exe 30 PID 1228 wrote to memory of 2556 1228 Explorer.EXE 31 PID 1228 wrote to memory of 2556 1228 Explorer.EXE 31 PID 1228 wrote to memory of 2556 1228 Explorer.EXE 31 PID 1228 wrote to memory of 2556 1228 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\Certificate 11-19AIS.exe"C:\Users\Admin\AppData\Local\Temp\Certificate 11-19AIS.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Certificate 11-19AIS.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2340
-
-
-
C:\Windows\SysWOW64\netbtugc.exe"C:\Windows\SysWOW64\netbtugc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5662cbc86dd42e258769623b2d2e5fd9d
SHA1cb44d95d9bdfb4c0863b7b2924ec56c8b6e2c351
SHA256fd33fd801feeb2e8d345c7cd706fa404fd40129a431a715b66c9a33fdcec3a1b
SHA512a73d39409ffebcb335a5f026202482255de943d320c476a205d01439c4ffda9b316de5197d4001c3e8cce89bd8fc5bc4328e3acce65a810263c9b2c703e0c4a4