Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 13:03
Static task
static1
Behavioral task
behavioral1
Sample
Certificate 1045-20-11.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Certificate 1045-20-11.exe
Resource
win10v2004-20241007-en
General
-
Target
Certificate 1045-20-11.exe
-
Size
1.1MB
-
MD5
374bfa99caf54477156253c18125cdc8
-
SHA1
b252c1316f4d9b91e79f64c51365cf65981f64d1
-
SHA256
f605d6db615c055fc80141bf79ab3f541303cf082244b352352bbd982a7aca50
-
SHA512
c73c1b2ce3501abf103ba5586f2e6217dcaf3c551c3e9d4b8e088732ef387a6c3f630cce8bb745bec0f0fa2903fc9bac1577ce1b159cbf1a472099364e927a06
-
SSDEEP
24576:otb20pkaCqT5TBWgNQ7ajmQK273J9BvzK2it6A:xVg5tQ7ajm81jzU5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2928 set thread context of 448 2928 Certificate 1045-20-11.exe 82 PID 448 set thread context of 3508 448 svchost.exe 56 PID 448 set thread context of 3348 448 svchost.exe 92 PID 3348 set thread context of 3508 3348 netbtugc.exe 56 PID 3348 set thread context of 4588 3348 netbtugc.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Certificate 1045-20-11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe -
description ioc Process Key created \Registry\User\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netbtugc.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2928 Certificate 1045-20-11.exe 448 svchost.exe 3508 Explorer.EXE 3508 Explorer.EXE 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe 3348 netbtugc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2928 Certificate 1045-20-11.exe 2928 Certificate 1045-20-11.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2928 Certificate 1045-20-11.exe 2928 Certificate 1045-20-11.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2928 wrote to memory of 448 2928 Certificate 1045-20-11.exe 82 PID 2928 wrote to memory of 448 2928 Certificate 1045-20-11.exe 82 PID 2928 wrote to memory of 448 2928 Certificate 1045-20-11.exe 82 PID 2928 wrote to memory of 448 2928 Certificate 1045-20-11.exe 82 PID 3508 wrote to memory of 3348 3508 Explorer.EXE 92 PID 3508 wrote to memory of 3348 3508 Explorer.EXE 92 PID 3508 wrote to memory of 3348 3508 Explorer.EXE 92 PID 3348 wrote to memory of 4588 3348 netbtugc.exe 93 PID 3348 wrote to memory of 4588 3348 netbtugc.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\Certificate 1045-20-11.exe"C:\Users\Admin\AppData\Local\Temp\Certificate 1045-20-11.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Certificate 1045-20-11.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:448
-
-
-
C:\Windows\SysWOW64\netbtugc.exe"C:\Windows\SysWOW64\netbtugc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD52c1ae20b3cf7d697105651bb6521b2c7
SHA1d1f4ca4515fb14685bf1470a58dd326f4edde8c1
SHA256fc8853f20677fe8ded4f79e160e5831730703c967e1811b9c87bd9d5677dce20
SHA512c0a88760349a7e9c204ead6b536886898fa1149d45de8dc8a142d48257f26acc48ab34ba1f7b6b00d02bbcab3215a1b61484dcb7b50c527d33966ed769a5c932