Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 18:03
Behavioral task
behavioral1
Sample
HTWP098760233.exe
Resource
win7-20240903-en
General
-
Target
HTWP098760233.exe
-
Size
458KB
-
MD5
e98405841a1287e07e371cc0058475ad
-
SHA1
21a40b88b8b5fbae87836a32e94c32afc4898eb3
-
SHA256
8f1be325faa69592642419a3ce86343a7b484853d0a1b27bd769f8435be85381
-
SHA512
801a0cfb1c359c86a54616d6d4a314b18a875bb907c2056c4435e3e9e128dc215dc5a54e95e2676cd4924c15a568dcf596caad7e4b1b4a992ae9dab56da7d9ca
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLUb0z+ZHhHg4vzlN:tthEVaPqLUtNJdblN
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Milburr.vbs Milburr.exe -
Executes dropped EXE 1 IoCs
pid Process 1572 Milburr.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4260-13-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/1572-23-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/4260-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/files/0x0007000000023cae-10.dat upx behavioral2/memory/4260-13-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/1572-23-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2300 1572 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HTWP098760233.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Milburr.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4260 HTWP098760233.exe 4260 HTWP098760233.exe 1572 Milburr.exe 1572 Milburr.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 4260 HTWP098760233.exe 4260 HTWP098760233.exe 1572 Milburr.exe 1572 Milburr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4260 wrote to memory of 1572 4260 HTWP098760233.exe 82 PID 4260 wrote to memory of 1572 4260 HTWP098760233.exe 82 PID 4260 wrote to memory of 1572 4260 HTWP098760233.exe 82 PID 1572 wrote to memory of 5000 1572 Milburr.exe 83 PID 1572 wrote to memory of 5000 1572 Milburr.exe 83 PID 1572 wrote to memory of 5000 1572 Milburr.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\HTWP098760233.exe"C:\Users\Admin\AppData\Local\Temp\HTWP098760233.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\batchers\Milburr.exe"C:\Users\Admin\AppData\Local\Temp\HTWP098760233.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\HTWP098760233.exe"3⤵PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 7523⤵
- Program crash
PID:2300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1572 -ip 15721⤵PID:548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD5e98405841a1287e07e371cc0058475ad
SHA121a40b88b8b5fbae87836a32e94c32afc4898eb3
SHA2568f1be325faa69592642419a3ce86343a7b484853d0a1b27bd769f8435be85381
SHA512801a0cfb1c359c86a54616d6d4a314b18a875bb907c2056c4435e3e9e128dc215dc5a54e95e2676cd4924c15a568dcf596caad7e4b1b4a992ae9dab56da7d9ca