Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2025 06:50
Static task
static1
Behavioral task
behavioral1
Sample
723-130-2025.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
723-130-2025.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
724-130-2025.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
724-130-2025.exe
Resource
win10v2004-20250129-en
General
-
Target
723-130-2025.exe
-
Size
1.1MB
-
MD5
1cf5ecd1b8b508ae3c6a04a3341439f3
-
SHA1
e97b3bb75997b8faa8d54975e8dec5b3cd0f3a71
-
SHA256
a82f8608d3e988686365f5a95c721ed3669a088b4f48181cac546e85a1c81104
-
SHA512
e676a40018ba9e46290c6b15cbe444ec966467a531e2cc3a65939fa36d90c467f22a6baa5277443ce314e1f663d937519a26574f4920850663c67a539f4832a4
-
SSDEEP
24576:mAHnh+eWsN3skA4RV1Hom2KXFmIaQhxZhzOq3Q5:Bh+ZkldoPK1XaQhxZtJm
Malware Config
Signatures
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3588 set thread context of 1724 3588 723-130-2025.exe 86 PID 1724 set thread context of 3404 1724 svchost.exe 56 PID 1724 set thread context of 2364 1724 svchost.exe 93 PID 2364 set thread context of 3404 2364 netbtugc.exe 56 PID 2364 set thread context of 4392 2364 netbtugc.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723-130-2025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netbtugc.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 1724 svchost.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 3588 723-130-2025.exe 1724 svchost.exe 3404 Explorer.EXE 3404 Explorer.EXE 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe 2364 netbtugc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3588 723-130-2025.exe 3588 723-130-2025.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3588 723-130-2025.exe 3588 723-130-2025.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3404 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3588 wrote to memory of 1724 3588 723-130-2025.exe 86 PID 3588 wrote to memory of 1724 3588 723-130-2025.exe 86 PID 3588 wrote to memory of 1724 3588 723-130-2025.exe 86 PID 3588 wrote to memory of 1724 3588 723-130-2025.exe 86 PID 3404 wrote to memory of 2364 3404 Explorer.EXE 93 PID 3404 wrote to memory of 2364 3404 Explorer.EXE 93 PID 3404 wrote to memory of 2364 3404 Explorer.EXE 93 PID 2364 wrote to memory of 4392 2364 netbtugc.exe 94 PID 2364 wrote to memory of 4392 2364 netbtugc.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\723-130-2025.exe"C:\Users\Admin\AppData\Local\Temp\723-130-2025.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\723-130-2025.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1724
-
-
-
C:\Windows\SysWOW64\netbtugc.exe"C:\Windows\SysWOW64\netbtugc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4392
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5db188804ef5ffa5fafa804b555dd40b9
SHA1a181d975979f35d6ca17a736d3c143a75e63e6d7
SHA2560c302426b73d5cb269aad18c78dc2616f5faeb1a0b2b88b999d6cd623f8cb723
SHA512d872aba3b3e78e2c6f0094d724bacee36289a27e08de596bd047f673d3cd3c429bd6001b076cf79bdd5f9174815f361b10a6ea2923ca3dfdcdb84f184eddeae8