Analysis
-
max time kernel
107s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2025, 14:26
Behavioral task
behavioral1
Sample
517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe
Resource
win10v2004-20241007-en
General
-
Target
517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe
-
Size
596KB
-
MD5
74ea3fe876df4812df04805cb921edb0
-
SHA1
43ba407cf7cb376fbc9932eb6b3142a3d606bdeb
-
SHA256
517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952
-
SHA512
f3b26517d67c0843b1ef57a7059d11b51bcbefb07ee092946c36722e29cf7d7131473ed6e9ff3a37a1655258e03199b3ceeec3171e67efc29abf3b23c1408b2a
-
SSDEEP
6144:Zs9C0eaieHm71o2pL2IMJDoMc2ZNu5GQpsnp/yFPMsXnQODVNIg+cTtgJ7AOyZja:Zs9C0eaieHmO292D3//yFPMsXkJ7MmkE
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 11 4128 rundll32.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Gxtuum.exe -
Executes dropped EXE 3 IoCs
pid Process 2132 Gxtuum.exe 2040 Gxtuum.exe 2284 Gxtuum.exe -
Loads dropped DLL 2 IoCs
pid Process 2612 rundll32.exe 4128 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job 517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe -
pid Process 2088 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1208 netsh.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 2088 powershell.exe 2088 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2088 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1748 517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2132 1748 517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe 81 PID 1748 wrote to memory of 2132 1748 517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe 81 PID 1748 wrote to memory of 2132 1748 517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe 81 PID 2132 wrote to memory of 2612 2132 Gxtuum.exe 83 PID 2132 wrote to memory of 2612 2132 Gxtuum.exe 83 PID 2132 wrote to memory of 2612 2132 Gxtuum.exe 83 PID 2612 wrote to memory of 4128 2612 rundll32.exe 84 PID 2612 wrote to memory of 4128 2612 rundll32.exe 84 PID 4128 wrote to memory of 1208 4128 rundll32.exe 85 PID 4128 wrote to memory of 1208 4128 rundll32.exe 85 PID 4128 wrote to memory of 2088 4128 rundll32.exe 87 PID 4128 wrote to memory of 2088 4128 rundll32.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe"C:\Users\Admin\AppData\Local\Temp\517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3660607b8b\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\3660607b8b\Gxtuum.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\44c9c3d1e2ec03\cred64.dll, Main3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\44c9c3d1e2ec03\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\442511616637_Desktop.zip' -CompressionLevel Optimal5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3660607b8b\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\3660607b8b\Gxtuum.exe1⤵
- Executes dropped EXE
PID:2040
-
C:\Users\Admin\AppData\Local\Temp\3660607b8b\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\3660607b8b\Gxtuum.exe1⤵
- Executes dropped EXE
PID:2284
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
596KB
MD574ea3fe876df4812df04805cb921edb0
SHA143ba407cf7cb376fbc9932eb6b3142a3d606bdeb
SHA256517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952
SHA512f3b26517d67c0843b1ef57a7059d11b51bcbefb07ee092946c36722e29cf7d7131473ed6e9ff3a37a1655258e03199b3ceeec3171e67efc29abf3b23c1408b2a
-
Filesize
76KB
MD5451b4de9b481a633dafbea6b1aed8470
SHA1130228c1a2f43b72316f991a89f3c89901e2720a
SHA2565ae5e56f760be5573840bc9c5499e7de0e4e0249b7f86a1eb2f4e08844a8d9cc
SHA512dfa3d610565cbfca7f3e46f727a2cce4076ba665eccc285f8f10dc1ea81cb9b97e4db6bc30af14fdfe84e1511847e335a11a8c3b3b8a70e997a61f2386e03532
-
Filesize
15KB
MD58bdc232a0dfeef0f1c64a2d27a3b2169
SHA1e0ddb7acee2e4db826bbc73653402ee4799e98c7
SHA256bcb8da7bb0d0179c5cc8b03fd3d6070eda657454ac308a685d6f7f6946b469f8
SHA5123d5e41b5c142f77bcba2070d0e70ecfab072196e674eccffad8cf165f1e4faefe78b9e94cdf5e2bc35e7cf886817b6fcb8ebe114f000ab8763934b6e54867bc9
-
Filesize
9KB
MD5a8f702e52e3c99f1a981036d2b70afde
SHA1c9f12b4b680ca5093f604572993008793eef4696
SHA256196ebaddb32885ed5b1a9c539c595536926e7d9b402c3b2dd9410b5d7cce98af
SHA5125bc039a6ef03f2885a2890f4306ceb9c9483dda30bcd672abc7ccb737320aa2242c1563c00ca1f2d43dda024f525a3bda39a3bdea51d7a03839df60b19e8e8d2
-
Filesize
15KB
MD5ce212900311d33aeccc9fe1106b74a66
SHA19e42bb527f62382e0ddb0a7dfb147c1d20ab35f6
SHA256e90c4eb0293fcad38fd69063695450767c4754fb3f084593b15fd9ab934f8c50
SHA512b0aa4904e25f8b84650dc9e3a098ec99406af60d901361f0ae8424c9296e50412c41809489ab5015ad3c382af155e6ada76b62753bcf39ba054a684b7550a507
-
Filesize
17KB
MD5860e0a383cfd56dddfa43599e92bc5b4
SHA123d84c2bb2a27532ef0c150a22cc398d8055c9ba
SHA2561e62865b28e8a3a65344b9f3cfc63f5efa4d950d61aa9eb08474742947991f88
SHA512e6ce642b0d5a7674007aecac1701279fdd723855c2131970e0bc74ed517f86ebe42102426f92f880bc6dae1313b81f3e823287869989bc01d3179480ddd411f3
-
Filesize
19KB
MD5735de501ef00e3714a0f14929ee9bac6
SHA10141183cdafeefe473e6c8051751123cefd09c37
SHA256b7cb1208df67cb7030c5c5e0a6744e9bb8dabacb35d82b8b22f051f61fb13759
SHA512475492a9c2444abac89e7c470f51eb82d96230f2c639bdc8d092e5f87585971425f3000fabe5142ba8014d4977b2ff895d0b6a5f688b4869c4e747dd8100462d
-
Filesize
16KB
MD5ee69af2a7bee15e2a86e7dacb2becec8
SHA15ba564bc337b3c64f1668b7e708c00174c88e162
SHA2569b17aa0c257a6c4dd43868feeca4be932036a1c02a2030c58cbdce3deb0e5e37
SHA5129febab521b240c7b6ab7d2963c34bbdcb5e6363ff4c4dc3bec56d2ab2813603f7e252a1b31250733801f55d02e7d45905999a5906733247b819a829426a24433
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.2MB
MD5478cf1466756aec3b32c8cc61fc5c6c6
SHA1201c3726ce7759de084693759c405d4ff7bf4cd9
SHA25692c5b1eae5d9f4eb47debd827d3168fb8ab989753262747c04ffee38c010e192
SHA5122e1e413f02655fec855d081c96ca950701db546a28e4fb66cf5c7593dd39d8eca70882705e82260570193b5e4ecdaec144b2af514144175f1a35ed22f98a3b75