Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 03:14
Static task
static1
Behavioral task
behavioral1
Sample
723-130-2025.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
723-130-2025.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
724-130-2025.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
724-130-2025.exe
Resource
win10v2004-20250129-en
General
-
Target
723-130-2025.exe
-
Size
1.1MB
-
MD5
1cf5ecd1b8b508ae3c6a04a3341439f3
-
SHA1
e97b3bb75997b8faa8d54975e8dec5b3cd0f3a71
-
SHA256
a82f8608d3e988686365f5a95c721ed3669a088b4f48181cac546e85a1c81104
-
SHA512
e676a40018ba9e46290c6b15cbe444ec966467a531e2cc3a65939fa36d90c467f22a6baa5277443ce314e1f663d937519a26574f4920850663c67a539f4832a4
-
SSDEEP
24576:mAHnh+eWsN3skA4RV1Hom2KXFmIaQhxZhzOq3Q5:Bh+ZkldoPK1XaQhxZtJm
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2468 netbtugc.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2032 set thread context of 2628 2032 723-130-2025.exe 28 PID 2628 set thread context of 1168 2628 svchost.exe 21 PID 2628 set thread context of 2468 2628 svchost.exe 31 PID 2468 set thread context of 1168 2468 netbtugc.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723-130-2025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netbtugc.exe -
description ioc Process Key created \Registry\User\S-1-5-21-3063565911-2056067323-3330884624-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netbtugc.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2628 svchost.exe 2468 netbtugc.exe 2468 netbtugc.exe 2468 netbtugc.exe 2468 netbtugc.exe 2468 netbtugc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2032 723-130-2025.exe 2628 svchost.exe 1168 Explorer.EXE 1168 Explorer.EXE 2468 netbtugc.exe 2468 netbtugc.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2032 723-130-2025.exe 2032 723-130-2025.exe 1168 Explorer.EXE 1168 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2032 723-130-2025.exe 2032 723-130-2025.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2628 2032 723-130-2025.exe 28 PID 2032 wrote to memory of 2628 2032 723-130-2025.exe 28 PID 2032 wrote to memory of 2628 2032 723-130-2025.exe 28 PID 2032 wrote to memory of 2628 2032 723-130-2025.exe 28 PID 2032 wrote to memory of 2628 2032 723-130-2025.exe 28 PID 1168 wrote to memory of 2468 1168 Explorer.EXE 31 PID 1168 wrote to memory of 2468 1168 Explorer.EXE 31 PID 1168 wrote to memory of 2468 1168 Explorer.EXE 31 PID 1168 wrote to memory of 2468 1168 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\723-130-2025.exe"C:\Users\Admin\AppData\Local\Temp\723-130-2025.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\723-130-2025.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2628
-
-
-
C:\Windows\SysWOW64\netbtugc.exe"C:\Windows\SysWOW64\netbtugc.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5db188804ef5ffa5fafa804b555dd40b9
SHA1a181d975979f35d6ca17a736d3c143a75e63e6d7
SHA2560c302426b73d5cb269aad18c78dc2616f5faeb1a0b2b88b999d6cd623f8cb723
SHA512d872aba3b3e78e2c6f0094d724bacee36289a27e08de596bd047f673d3cd3c429bd6001b076cf79bdd5f9174815f361b10a6ea2923ca3dfdcdb84f184eddeae8
-
Filesize
557KB
MD5d113a47c6ac162a76d78c817aeb57755
SHA1f301cea25c2032dd67ffbd21242b209f0ee70ee2
SHA256bae32df8fa24a3e55bcc1591e09918259173f870090e2ae775509edb8b893eb4
SHA512ba64e248ee75fa43cae60c1e0815c512f89eabc140b35aa696d428a3f5d328db04981c0f500b78211bbfd9087ba678328c8ad63ac51249062900693a1d399178
-
Filesize
1.1MB
MD5f55e5766477de5997da50f12c9c74c91
SHA14dc98900a887be95411f07b9e597c57bdc7dbab3
SHA25690be88984ee60864256378c952d44b13d55ac032ab6a7b8c698885176bcece69
SHA512983417a297e68b58fbd1c07fed7a1697d249110a2c10644b2dc96e3facedd3fbfbcac6a7809631ffd62894f02cadd4d3e62022b9e5e026e5bf434f1eb1878f05