Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-01-2025 10:03

General

  • Target

    services.png.exe

  • Size

    264KB

  • MD5

    d397a1de162f332782fe3205a07792dd

  • SHA1

    44793b3a374c3cb453bbd87a2fd28d8a4c408002

  • SHA256

    ea251bf7fcc0a42cb9e954a45d925ef379ef1ffca39e482f44af701b4ace8560

  • SHA512

    6be10fc6ebabffadd89a72862c5d292e2939d165298019fe684de4efb3284603756c8764810835c12651ad49f608dd3345c8d778b7fd795683f0fcceeaa3f659

  • SSDEEP

    6144:VtjNiEZdoTD3wad4eq5OxUatA04d0drsFp2A4AG5uU:VTdS3Uek0WchA2D

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1088
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1168
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1192
          • C:\Users\Admin\AppData\Local\Temp\services.png.exe
            "C:\Users\Admin\AppData\Local\Temp\services.png.exe"
            2⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2680
            • C:\Users\Admin\AppData\Roaming\Hearirigdibe\ubahwoura.exe
              "C:\Users\Admin\AppData\Roaming\Hearirigdibe\ubahwoura.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2700
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2040
                • C:\Windows\SysWOW64\HOSTNAME.EXE
                  hostname
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:1044
                • C:\Windows\SysWOW64\ipconfig.exe
                  ipconfig /all
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Gathers network information
                  PID:2876
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  5⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2900
                • C:\Windows\SysWOW64\netsh.exe
                  netsh firewall set opmode disable
                  5⤵
                  • Modifies Windows Firewall
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:112
                • C:\Windows\SysWOW64\net.exe
                  net share
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1736
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 share
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:1868
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1440
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:2556

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Conoraloatge\atkodykiz.eba

              Filesize

              606KB

              MD5

              78f5d59f7b55a7c13a85059afc9f1f07

              SHA1

              b4a9d09e71d09f2d0ce5609cd702560e0b8a53e3

              SHA256

              1c6a6bf6d2d0f5a09f6d22af3e03948619115bcf816636fa2dbcc11d188ff358

              SHA512

              a6639b421d3f7196e27b15b7e8d5aad6ac4098392a7d4906df8b551ef3fc50605c50c855f7b83415b06607e21a53ed186cadd9734536b2bbf486bbde32298c41

            • \Users\Admin\AppData\Local\Temp\tmp7D5A.tmp

              Filesize

              1.2MB

              MD5

              d124f55b9393c976963407dff51ffa79

              SHA1

              2c7bbedd79791bfb866898c85b504186db610b5d

              SHA256

              ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

              SHA512

              278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

            • \Users\Admin\AppData\Local\Temp\tmp7D7A.tmp

              Filesize

              1.1MB

              MD5

              9b98d47916ead4f69ef51b56b0c2323c

              SHA1

              290a80b4ded0efc0fd00816f373fcea81a521330

              SHA256

              96e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b

              SHA512

              68b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94

            • \Users\Admin\AppData\Roaming\Hearirigdibe\ubahwoura.exe

              Filesize

              264KB

              MD5

              8c075d92c320965ac0acf9aef9d87def

              SHA1

              4d4f17a7075890303847a03535e852293bbbd24e

              SHA256

              daaba63cc784e035425b47e0ced975101fcd25646d36e585a893c6b49a69cb76

              SHA512

              2929dcea8492d15457539cc57f43f9306652fd4c90b6e97915a565006447c0167b13f2f2c680d850c9c9b9319a5868b743b6ed1774bd06ec5b17bd8e804b27a1

            • memory/1088-39-0x0000000000220000-0x0000000000267000-memory.dmp

              Filesize

              284KB

            • memory/1088-36-0x0000000000220000-0x0000000000267000-memory.dmp

              Filesize

              284KB

            • memory/1088-34-0x0000000000220000-0x0000000000267000-memory.dmp

              Filesize

              284KB

            • memory/1088-37-0x0000000000220000-0x0000000000267000-memory.dmp

              Filesize

              284KB

            • memory/1088-38-0x0000000000220000-0x0000000000267000-memory.dmp

              Filesize

              284KB

            • memory/1168-48-0x0000000001F90000-0x0000000001FD7000-memory.dmp

              Filesize

              284KB

            • memory/1168-42-0x0000000001F90000-0x0000000001FD7000-memory.dmp

              Filesize

              284KB

            • memory/1168-44-0x0000000001F90000-0x0000000001FD7000-memory.dmp

              Filesize

              284KB

            • memory/1168-46-0x0000000001F90000-0x0000000001FD7000-memory.dmp

              Filesize

              284KB

            • memory/1192-54-0x0000000002EC0000-0x0000000002F07000-memory.dmp

              Filesize

              284KB

            • memory/1192-53-0x0000000002EC0000-0x0000000002F07000-memory.dmp

              Filesize

              284KB

            • memory/1192-51-0x0000000002EC0000-0x0000000002F07000-memory.dmp

              Filesize

              284KB

            • memory/1192-52-0x0000000002EC0000-0x0000000002F07000-memory.dmp

              Filesize

              284KB

            • memory/1440-59-0x0000000001ED0000-0x0000000001F17000-memory.dmp

              Filesize

              284KB

            • memory/1440-61-0x0000000001ED0000-0x0000000001F17000-memory.dmp

              Filesize

              284KB

            • memory/1440-63-0x0000000001ED0000-0x0000000001F17000-memory.dmp

              Filesize

              284KB

            • memory/1440-57-0x0000000001ED0000-0x0000000001F17000-memory.dmp

              Filesize

              284KB

            • memory/2556-105-0x0000000000440000-0x0000000000487000-memory.dmp

              Filesize

              284KB

            • memory/2556-103-0x0000000000440000-0x0000000000487000-memory.dmp

              Filesize

              284KB

            • memory/2556-107-0x0000000000440000-0x0000000000487000-memory.dmp

              Filesize

              284KB

            • memory/2556-109-0x0000000000440000-0x0000000000487000-memory.dmp

              Filesize

              284KB

            • memory/2680-67-0x00000000024A0000-0x00000000024E7000-memory.dmp

              Filesize

              284KB

            • memory/2680-71-0x00000000024A0000-0x00000000024E7000-memory.dmp

              Filesize

              284KB

            • memory/2680-2-0x0000000000270000-0x0000000000271000-memory.dmp

              Filesize

              4KB

            • memory/2680-4-0x0000000000270000-0x0000000000271000-memory.dmp

              Filesize

              4KB

            • memory/2680-69-0x00000000024A0000-0x00000000024E7000-memory.dmp

              Filesize

              284KB

            • memory/2680-0-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/2680-75-0x00000000024A0000-0x00000000024E7000-memory.dmp

              Filesize

              284KB

            • memory/2680-73-0x00000000024A0000-0x00000000024E7000-memory.dmp

              Filesize

              284KB

            • memory/2680-1-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB