Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 13:03
Static task
static1
Behavioral task
behavioral1
Sample
Certificate 1045-20-11.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Certificate 1045-20-11.exe
Resource
win10v2004-20241007-en
General
-
Target
Certificate 1045-20-11.exe
-
Size
1.1MB
-
MD5
374bfa99caf54477156253c18125cdc8
-
SHA1
b252c1316f4d9b91e79f64c51365cf65981f64d1
-
SHA256
f605d6db615c055fc80141bf79ab3f541303cf082244b352352bbd982a7aca50
-
SHA512
c73c1b2ce3501abf103ba5586f2e6217dcaf3c551c3e9d4b8e088732ef387a6c3f630cce8bb745bec0f0fa2903fc9bac1577ce1b159cbf1a472099364e927a06
-
SSDEEP
24576:otb20pkaCqT5TBWgNQ7ajmQK273J9BvzK2it6A:xVg5tQ7ajm81jzU5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2168 set thread context of 2760 2168 Certificate 1045-20-11.exe 30 PID 2760 set thread context of 1188 2760 svchost.exe 21 PID 2760 set thread context of 2576 2760 svchost.exe 32 PID 2576 set thread context of 1188 2576 netbtugc.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Certificate 1045-20-11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2760 svchost.exe 2760 svchost.exe 2760 svchost.exe 2760 svchost.exe 2760 svchost.exe 2760 svchost.exe 2760 svchost.exe 2760 svchost.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe 2576 netbtugc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2168 Certificate 1045-20-11.exe 2760 svchost.exe 1188 Explorer.EXE 1188 Explorer.EXE 2576 netbtugc.exe 2576 netbtugc.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2168 Certificate 1045-20-11.exe 2168 Certificate 1045-20-11.exe 1188 Explorer.EXE 1188 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2168 Certificate 1045-20-11.exe 2168 Certificate 1045-20-11.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2760 2168 Certificate 1045-20-11.exe 30 PID 2168 wrote to memory of 2760 2168 Certificate 1045-20-11.exe 30 PID 2168 wrote to memory of 2760 2168 Certificate 1045-20-11.exe 30 PID 2168 wrote to memory of 2760 2168 Certificate 1045-20-11.exe 30 PID 2168 wrote to memory of 2760 2168 Certificate 1045-20-11.exe 30 PID 1188 wrote to memory of 2576 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2576 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2576 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2576 1188 Explorer.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Certificate 1045-20-11.exe"C:\Users\Admin\AppData\Local\Temp\Certificate 1045-20-11.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Certificate 1045-20-11.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2760
-
-
-
C:\Windows\SysWOW64\netbtugc.exe"C:\Windows\SysWOW64\netbtugc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD52c1ae20b3cf7d697105651bb6521b2c7
SHA1d1f4ca4515fb14685bf1470a58dd326f4edde8c1
SHA256fc8853f20677fe8ded4f79e160e5831730703c967e1811b9c87bd9d5677dce20
SHA512c0a88760349a7e9c204ead6b536886898fa1149d45de8dc8a142d48257f26acc48ab34ba1f7b6b00d02bbcab3215a1b61484dcb7b50c527d33966ed769a5c932