Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
31-01-2025 06:50
Static task
static1
Behavioral task
behavioral1
Sample
723-130-2025.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
723-130-2025.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
724-130-2025.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
724-130-2025.exe
Resource
win10v2004-20250129-en
General
-
Target
723-130-2025.exe
-
Size
1.1MB
-
MD5
1cf5ecd1b8b508ae3c6a04a3341439f3
-
SHA1
e97b3bb75997b8faa8d54975e8dec5b3cd0f3a71
-
SHA256
a82f8608d3e988686365f5a95c721ed3669a088b4f48181cac546e85a1c81104
-
SHA512
e676a40018ba9e46290c6b15cbe444ec966467a531e2cc3a65939fa36d90c467f22a6baa5277443ce314e1f663d937519a26574f4920850663c67a539f4832a4
-
SSDEEP
24576:mAHnh+eWsN3skA4RV1Hom2KXFmIaQhxZhzOq3Q5:Bh+ZkldoPK1XaQhxZtJm
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2936 netbtugc.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2108 set thread context of 2548 2108 723-130-2025.exe 30 PID 2548 set thread context of 2108 2548 svchost.exe 29 PID 2548 set thread context of 2936 2548 svchost.exe 32 PID 2936 set thread context of 1100 2936 netbtugc.exe 18 -
Program crash 1 IoCs
pid pid_target Process procid_target 2564 2108 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723-130-2025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1163522206-1469769407-485553996-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netbtugc.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2548 svchost.exe 2548 svchost.exe 2548 svchost.exe 2548 svchost.exe 2936 netbtugc.exe 2936 netbtugc.exe 2936 netbtugc.exe 2936 netbtugc.exe 2936 netbtugc.exe 2936 netbtugc.exe 2936 netbtugc.exe 2936 netbtugc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2108 723-130-2025.exe 2548 svchost.exe 2108 723-130-2025.exe 2108 723-130-2025.exe 2936 netbtugc.exe 2936 netbtugc.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2108 723-130-2025.exe 2108 723-130-2025.exe 1100 Explorer.EXE 1100 Explorer.EXE 1100 Explorer.EXE 1100 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2108 723-130-2025.exe 2108 723-130-2025.exe 1100 Explorer.EXE 1100 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2548 2108 723-130-2025.exe 30 PID 2108 wrote to memory of 2548 2108 723-130-2025.exe 30 PID 2108 wrote to memory of 2548 2108 723-130-2025.exe 30 PID 2108 wrote to memory of 2548 2108 723-130-2025.exe 30 PID 2108 wrote to memory of 2548 2108 723-130-2025.exe 30 PID 2108 wrote to memory of 2564 2108 723-130-2025.exe 31 PID 2108 wrote to memory of 2564 2108 723-130-2025.exe 31 PID 2108 wrote to memory of 2564 2108 723-130-2025.exe 31 PID 2108 wrote to memory of 2564 2108 723-130-2025.exe 31 PID 2108 wrote to memory of 2936 2108 723-130-2025.exe 32 PID 2108 wrote to memory of 2936 2108 723-130-2025.exe 32 PID 2108 wrote to memory of 2936 2108 723-130-2025.exe 32 PID 2108 wrote to memory of 2936 2108 723-130-2025.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\723-130-2025.exe"C:\Users\Admin\AppData\Local\Temp\723-130-2025.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\723-130-2025.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 3163⤵
- Program crash
PID:2564
-
-
C:\Windows\SysWOW64\netbtugc.exe"C:\Windows\SysWOW64\netbtugc.exe"3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5db188804ef5ffa5fafa804b555dd40b9
SHA1a181d975979f35d6ca17a736d3c143a75e63e6d7
SHA2560c302426b73d5cb269aad18c78dc2616f5faeb1a0b2b88b999d6cd623f8cb723
SHA512d872aba3b3e78e2c6f0094d724bacee36289a27e08de596bd047f673d3cd3c429bd6001b076cf79bdd5f9174815f361b10a6ea2923ca3dfdcdb84f184eddeae8
-
Filesize
484KB
MD53bcbd3b08e4a8843fda34512623960a2
SHA1244d3df69bbc09a43d4af3de5165f50506b8d7af
SHA2567db638aa6b205aadba193dc7803a7e73eb07bbeeacbacad3a65978093e78673c
SHA512914f366aab61ed2c13a87ee07e6a4b7aeffe4689c28014fab786244127852a19b7c1ae58bd8dd11840415035290373922f39b628c2409f68569cbf0b8a57e639
-
Filesize
922KB
MD5dda1b03a5cd2ca37c96b7daf5e3a8ed7
SHA1c70e5f58e61980d39608f0795879bf012dbbbca2
SHA25679f86c1edbbc69652a03a0f5667b3985bcf1e19f16fa3b8c7934e5b97ab8586d
SHA512bf83648c9b5d6d65b2c8409d262a1b7421d2cb13d6c759ec5f352c2d1c5adff3ee2395250fbdfe3590f25fe96bf6b40c2d82a8e7eecaab03be2e6a398e83981f