Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe
Resource
win10v2004-20241007-en
General
-
Target
88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe
-
Size
1.1MB
-
MD5
287e61624e5c839ff4b366e1969b3bce
-
SHA1
de64781dc1e8d8fa7c89c0e0e1952970efa6bafd
-
SHA256
88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3
-
SHA512
0a07311662b1b78e5030a1b3c6a5ea84ea4c5fdada5f954ecaa9d7183f3f3f103b3e4e9844344e4d87aaf24223dddb9ca9b11fa9f09178519eadaa0604007f49
-
SSDEEP
24576:gtb20pkaCqT5TBWgNQ7aVstv2/34RUf2aJabe8cXb6A:pVg5tQ7aVstv2/4RbI5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2464 set thread context of 2404 2464 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 30 PID 2404 set thread context of 1100 2404 svchost.exe 18 PID 2404 set thread context of 3064 2404 svchost.exe 32 PID 3064 set thread context of 1100 3064 netbtugc.exe 18 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe 3064 netbtugc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2464 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 2404 svchost.exe 1100 Explorer.EXE 1100 Explorer.EXE 3064 netbtugc.exe 3064 netbtugc.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2464 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 2464 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 1100 Explorer.EXE 1100 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2464 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 2464 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2404 2464 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 30 PID 2464 wrote to memory of 2404 2464 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 30 PID 2464 wrote to memory of 2404 2464 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 30 PID 2464 wrote to memory of 2404 2464 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 30 PID 2464 wrote to memory of 2404 2464 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 30 PID 1100 wrote to memory of 3064 1100 Explorer.EXE 32 PID 1100 wrote to memory of 3064 1100 Explorer.EXE 32 PID 1100 wrote to memory of 3064 1100 Explorer.EXE 32 PID 1100 wrote to memory of 3064 1100 Explorer.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe"C:\Users\Admin\AppData\Local\Temp\88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2404
-
-
-
C:\Windows\SysWOW64\netbtugc.exe"C:\Windows\SysWOW64\netbtugc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5ad39c6bef2ee20589f7a6d816524b642
SHA1b90b7c5ff956bcf4b28ec799ebbc142f0b1b03e3
SHA25657b3edf2c964e554a548518224bd8c51f51cf208351977602ce5a6e79a01b531
SHA51232f41606e357137ce8897a921acee0a365a0d2081b5f78926603c581c93d73c8653354ad5aff41509ad2b0631863c636e058c8fc065f7ccc599098b516262441