Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 11:57
Static task
static1
Behavioral task
behavioral1
Sample
Certificate 1045-20-11.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Certificate 1045-20-11.exe
Resource
win10v2004-20241007-en
General
-
Target
Certificate 1045-20-11.exe
-
Size
1.1MB
-
MD5
374bfa99caf54477156253c18125cdc8
-
SHA1
b252c1316f4d9b91e79f64c51365cf65981f64d1
-
SHA256
f605d6db615c055fc80141bf79ab3f541303cf082244b352352bbd982a7aca50
-
SHA512
c73c1b2ce3501abf103ba5586f2e6217dcaf3c551c3e9d4b8e088732ef387a6c3f630cce8bb745bec0f0fa2903fc9bac1577ce1b159cbf1a472099364e927a06
-
SSDEEP
24576:otb20pkaCqT5TBWgNQ7ajmQK273J9BvzK2it6A:xVg5tQ7ajm81jzU5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2344 set thread context of 1700 2344 Certificate 1045-20-11.exe 31 PID 1700 set thread context of 1408 1700 svchost.exe 21 PID 1700 set thread context of 2380 1700 svchost.exe 32 PID 2380 set thread context of 1408 2380 netbtugc.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Certificate 1045-20-11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 1700 svchost.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe 2380 netbtugc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2344 Certificate 1045-20-11.exe 1700 svchost.exe 1408 Explorer.EXE 1408 Explorer.EXE 2380 netbtugc.exe 2380 netbtugc.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2344 Certificate 1045-20-11.exe 2344 Certificate 1045-20-11.exe 1408 Explorer.EXE 1408 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2344 Certificate 1045-20-11.exe 2344 Certificate 1045-20-11.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1700 2344 Certificate 1045-20-11.exe 31 PID 2344 wrote to memory of 1700 2344 Certificate 1045-20-11.exe 31 PID 2344 wrote to memory of 1700 2344 Certificate 1045-20-11.exe 31 PID 2344 wrote to memory of 1700 2344 Certificate 1045-20-11.exe 31 PID 2344 wrote to memory of 1700 2344 Certificate 1045-20-11.exe 31 PID 1408 wrote to memory of 2380 1408 Explorer.EXE 32 PID 1408 wrote to memory of 2380 1408 Explorer.EXE 32 PID 1408 wrote to memory of 2380 1408 Explorer.EXE 32 PID 1408 wrote to memory of 2380 1408 Explorer.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\Certificate 1045-20-11.exe"C:\Users\Admin\AppData\Local\Temp\Certificate 1045-20-11.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Certificate 1045-20-11.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1700
-
-
-
C:\Windows\SysWOW64\netbtugc.exe"C:\Windows\SysWOW64\netbtugc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD52c1ae20b3cf7d697105651bb6521b2c7
SHA1d1f4ca4515fb14685bf1470a58dd326f4edde8c1
SHA256fc8853f20677fe8ded4f79e160e5831730703c967e1811b9c87bd9d5677dce20
SHA512c0a88760349a7e9c204ead6b536886898fa1149d45de8dc8a142d48257f26acc48ab34ba1f7b6b00d02bbcab3215a1b61484dcb7b50c527d33966ed769a5c932