Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe
Resource
win10v2004-20241007-en
General
-
Target
88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe
-
Size
1.1MB
-
MD5
287e61624e5c839ff4b366e1969b3bce
-
SHA1
de64781dc1e8d8fa7c89c0e0e1952970efa6bafd
-
SHA256
88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3
-
SHA512
0a07311662b1b78e5030a1b3c6a5ea84ea4c5fdada5f954ecaa9d7183f3f3f103b3e4e9844344e4d87aaf24223dddb9ca9b11fa9f09178519eadaa0604007f49
-
SSDEEP
24576:gtb20pkaCqT5TBWgNQ7aVstv2/34RUf2aJabe8cXb6A:pVg5tQ7aVstv2/4RbI5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3984 set thread context of 4424 3984 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 86 PID 4424 set thread context of 3460 4424 svchost.exe 56 PID 4424 set thread context of 760 4424 svchost.exe 96 PID 760 set thread context of 3460 760 netbtugc.exe 56 PID 760 set thread context of 2940 760 netbtugc.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe -
description ioc Process Key created \Registry\User\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netbtugc.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 4424 svchost.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 3984 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 4424 svchost.exe 3460 Explorer.EXE 3460 Explorer.EXE 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe 760 netbtugc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3984 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 3984 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3984 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 3984 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3460 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3984 wrote to memory of 4424 3984 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 86 PID 3984 wrote to memory of 4424 3984 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 86 PID 3984 wrote to memory of 4424 3984 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 86 PID 3984 wrote to memory of 4424 3984 88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe 86 PID 3460 wrote to memory of 760 3460 Explorer.EXE 96 PID 3460 wrote to memory of 760 3460 Explorer.EXE 96 PID 3460 wrote to memory of 760 3460 Explorer.EXE 96 PID 760 wrote to memory of 2940 760 netbtugc.exe 97 PID 760 wrote to memory of 2940 760 netbtugc.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe"C:\Users\Admin\AppData\Local\Temp\88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\88bd9c321e78561ad3a06e28f49adf5c09a2ad460c39c946ebffd3ec716276d3.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4424
-
-
-
C:\Windows\SysWOW64\netbtugc.exe"C:\Windows\SysWOW64\netbtugc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5ad39c6bef2ee20589f7a6d816524b642
SHA1b90b7c5ff956bcf4b28ec799ebbc142f0b1b03e3
SHA25657b3edf2c964e554a548518224bd8c51f51cf208351977602ce5a6e79a01b531
SHA51232f41606e357137ce8897a921acee0a365a0d2081b5f78926603c581c93d73c8653354ad5aff41509ad2b0631863c636e058c8fc065f7ccc599098b516262441