Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 11:57
Static task
static1
Behavioral task
behavioral1
Sample
Certificate 1045-20-11.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Certificate 1045-20-11.exe
Resource
win10v2004-20241007-en
General
-
Target
Certificate 1045-20-11.exe
-
Size
1.1MB
-
MD5
374bfa99caf54477156253c18125cdc8
-
SHA1
b252c1316f4d9b91e79f64c51365cf65981f64d1
-
SHA256
f605d6db615c055fc80141bf79ab3f541303cf082244b352352bbd982a7aca50
-
SHA512
c73c1b2ce3501abf103ba5586f2e6217dcaf3c551c3e9d4b8e088732ef387a6c3f630cce8bb745bec0f0fa2903fc9bac1577ce1b159cbf1a472099364e927a06
-
SSDEEP
24576:otb20pkaCqT5TBWgNQ7ajmQK273J9BvzK2it6A:xVg5tQ7ajm81jzU5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4464 set thread context of 1124 4464 Certificate 1045-20-11.exe 83 PID 1124 set thread context of 3464 1124 svchost.exe 56 PID 1124 set thread context of 3256 1124 svchost.exe 99 PID 3256 set thread context of 3464 3256 netbtugc.exe 56 PID 3256 set thread context of 4832 3256 netbtugc.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Certificate 1045-20-11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netbtugc.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 1124 svchost.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4464 Certificate 1045-20-11.exe 1124 svchost.exe 3464 Explorer.EXE 3464 Explorer.EXE 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe 3256 netbtugc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4464 Certificate 1045-20-11.exe 4464 Certificate 1045-20-11.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4464 Certificate 1045-20-11.exe 4464 Certificate 1045-20-11.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4464 wrote to memory of 1124 4464 Certificate 1045-20-11.exe 83 PID 4464 wrote to memory of 1124 4464 Certificate 1045-20-11.exe 83 PID 4464 wrote to memory of 1124 4464 Certificate 1045-20-11.exe 83 PID 4464 wrote to memory of 1124 4464 Certificate 1045-20-11.exe 83 PID 3464 wrote to memory of 3256 3464 Explorer.EXE 99 PID 3464 wrote to memory of 3256 3464 Explorer.EXE 99 PID 3464 wrote to memory of 3256 3464 Explorer.EXE 99 PID 3256 wrote to memory of 4832 3256 netbtugc.exe 102 PID 3256 wrote to memory of 4832 3256 netbtugc.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\Certificate 1045-20-11.exe"C:\Users\Admin\AppData\Local\Temp\Certificate 1045-20-11.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Certificate 1045-20-11.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1124
-
-
-
C:\Windows\SysWOW64\netbtugc.exe"C:\Windows\SysWOW64\netbtugc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD52c1ae20b3cf7d697105651bb6521b2c7
SHA1d1f4ca4515fb14685bf1470a58dd326f4edde8c1
SHA256fc8853f20677fe8ded4f79e160e5831730703c967e1811b9c87bd9d5677dce20
SHA512c0a88760349a7e9c204ead6b536886898fa1149d45de8dc8a142d48257f26acc48ab34ba1f7b6b00d02bbcab3215a1b61484dcb7b50c527d33966ed769a5c932