Analysis

  • max time kernel
    1568s
  • max time network
    1586s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    07-07-2022 04:38

General

  • Target

    b8e309c3d298b53ddf03e0e0e6b06eb6e3c6471c3718df83fa65211a374254d2.exe

  • Size

    336KB

  • MD5

    80fa4c5de221f99fc3c32214346a6b6a

  • SHA1

    0c0137d1afdbd423eab14063461a5feed593e226

  • SHA256

    b8e309c3d298b53ddf03e0e0e6b06eb6e3c6471c3718df83fa65211a374254d2

  • SHA512

    999e18bbda2aae73f28efa59e9844732e058a1455acbb0eb5f7715242f6791bf534f15433220851a8bc71b9f1ac8e478364c1177ccfd7f17a99646d09a3209f2

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 14 IoCs
  • UPX packed file 40 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 7 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8e309c3d298b53ddf03e0e0e6b06eb6e3c6471c3718df83fa65211a374254d2.exe
    "C:\Users\Admin\AppData\Local\Temp\b8e309c3d298b53ddf03e0e0e6b06eb6e3c6471c3718df83fa65211a374254d2.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies system executable filetype association
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1056
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2212
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1160
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4924
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:980
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3768
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1108
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3712
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4700
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3240
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2024
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2960
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3680
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4104
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:224

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Change Default File Association

1
T1042

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

6
T1112

Hidden Files and Directories

2
T1158

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

1
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE
    Filesize

    336KB

    MD5

    f0a7bb2669094b719f19368aa347329c

    SHA1

    3844710c7e17b81a6d0048a944a45128353c2266

    SHA256

    d8d0227e3d926e897cf815d08ff5e54715b3324772ac7d43f3d1346d04f741af

    SHA512

    b3f4bc794d4d24769b2c89211ec78915b9a076b9c2b8194139cf041f4d667a7fd5397e6799bb47b518ab69e568bfb1faacb72329d32e485b43ee9dbfee844d1c

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE
    Filesize

    336KB

    MD5

    f0a7bb2669094b719f19368aa347329c

    SHA1

    3844710c7e17b81a6d0048a944a45128353c2266

    SHA256

    d8d0227e3d926e897cf815d08ff5e54715b3324772ac7d43f3d1346d04f741af

    SHA512

    b3f4bc794d4d24769b2c89211ec78915b9a076b9c2b8194139cf041f4d667a7fd5397e6799bb47b518ab69e568bfb1faacb72329d32e485b43ee9dbfee844d1c

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE
    Filesize

    336KB

    MD5

    545a2dfd767565e49a458fdb067cf248

    SHA1

    26b97e370527f158582d2430b1e4f76d51106857

    SHA256

    c9e5e91719300e9a77262ed67354c4596439ad3711d90e7d2a9cd317440b9939

    SHA512

    1868874fc26a4d131f0f8facf6e4f250097f50922f2b582041b4e218c5a557de2a597c2de649a1667454567729cfdc5f8c687d24c20f372b6f7692ff159465e4

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE
    Filesize

    336KB

    MD5

    545a2dfd767565e49a458fdb067cf248

    SHA1

    26b97e370527f158582d2430b1e4f76d51106857

    SHA256

    c9e5e91719300e9a77262ed67354c4596439ad3711d90e7d2a9cd317440b9939

    SHA512

    1868874fc26a4d131f0f8facf6e4f250097f50922f2b582041b4e218c5a557de2a597c2de649a1667454567729cfdc5f8c687d24c20f372b6f7692ff159465e4

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE
    Filesize

    336KB

    MD5

    661ed8ab6259378a4fb24d465f5543c3

    SHA1

    2ca180aa645f033ef0a692c5a0438be6d340c0fe

    SHA256

    4f1a95d446464d55e3a24e838a65b93e401f59913a258e0371a0273c792e25c4

    SHA512

    fc995be81db6d1654c6b5ff24a67147f1a75628471c74822ba8fe0e12b3ab156ca48816618d17d3ffbdb7d9d60c041346f8f22e4bd6322f0417ac205832fd6f0

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE
    Filesize

    336KB

    MD5

    661ed8ab6259378a4fb24d465f5543c3

    SHA1

    2ca180aa645f033ef0a692c5a0438be6d340c0fe

    SHA256

    4f1a95d446464d55e3a24e838a65b93e401f59913a258e0371a0273c792e25c4

    SHA512

    fc995be81db6d1654c6b5ff24a67147f1a75628471c74822ba8fe0e12b3ab156ca48816618d17d3ffbdb7d9d60c041346f8f22e4bd6322f0417ac205832fd6f0

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE
    Filesize

    336KB

    MD5

    ecc7c1b0bb137107f439c9ba363a4858

    SHA1

    b9d42a45e81f903866b23b5a0cff54bf54079240

    SHA256

    7d49f1776f16d6b13bac120671dde2d756033b2832aaea4f4415997ee8660f05

    SHA512

    2e9a4b485fe33697b05e949d10c4fcc8d7bdfea0ddba6a0476caa35a03340c6cbc29c8b9495752df918b7ecb078126b4fb5593787dc3452ead2a2b505142e21e

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE
    Filesize

    336KB

    MD5

    ecc7c1b0bb137107f439c9ba363a4858

    SHA1

    b9d42a45e81f903866b23b5a0cff54bf54079240

    SHA256

    7d49f1776f16d6b13bac120671dde2d756033b2832aaea4f4415997ee8660f05

    SHA512

    2e9a4b485fe33697b05e949d10c4fcc8d7bdfea0ddba6a0476caa35a03340c6cbc29c8b9495752df918b7ecb078126b4fb5593787dc3452ead2a2b505142e21e

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE
    Filesize

    336KB

    MD5

    6220133249e28ff86fc1e18229d48433

    SHA1

    10d5fd97f09c0bc5dfbdeaa1fc1c9148764383ef

    SHA256

    0d626d3512bb0661eacdb063934242a9d18394e4d91a9df922d299f1c8c79636

    SHA512

    a718bc26e3cde4da47b2a6d3a46305b631a3d291ec23a0a8299e7bd1fd2f188d2ba7a1f27e507c2e3794a7adeb137d5613dbd3f726e4d9d86f27461bae5abede

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE
    Filesize

    336KB

    MD5

    9065a93acdad756fc551a6e8f666e0d0

    SHA1

    e6bd90f874465d9364607ab545b4bb3567f0814a

    SHA256

    4098d25d22ed6bbe47b374c67e4f0bc49cf117f82162999615b257b488b1b3cf

    SHA512

    81eaf9cf35ed411577b326dfbd2c1edb4587428d4b0d7ae7269f1d67112b9ba75d773d65e6169d46ab1df62e3ca3ece974d3b7406ef897dd21c1726c87541cfe

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
    Filesize

    336KB

    MD5

    f0a7bb2669094b719f19368aa347329c

    SHA1

    3844710c7e17b81a6d0048a944a45128353c2266

    SHA256

    d8d0227e3d926e897cf815d08ff5e54715b3324772ac7d43f3d1346d04f741af

    SHA512

    b3f4bc794d4d24769b2c89211ec78915b9a076b9c2b8194139cf041f4d667a7fd5397e6799bb47b518ab69e568bfb1faacb72329d32e485b43ee9dbfee844d1c

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
    Filesize

    336KB

    MD5

    545a2dfd767565e49a458fdb067cf248

    SHA1

    26b97e370527f158582d2430b1e4f76d51106857

    SHA256

    c9e5e91719300e9a77262ed67354c4596439ad3711d90e7d2a9cd317440b9939

    SHA512

    1868874fc26a4d131f0f8facf6e4f250097f50922f2b582041b4e218c5a557de2a597c2de649a1667454567729cfdc5f8c687d24c20f372b6f7692ff159465e4

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
    Filesize

    336KB

    MD5

    661ed8ab6259378a4fb24d465f5543c3

    SHA1

    2ca180aa645f033ef0a692c5a0438be6d340c0fe

    SHA256

    4f1a95d446464d55e3a24e838a65b93e401f59913a258e0371a0273c792e25c4

    SHA512

    fc995be81db6d1654c6b5ff24a67147f1a75628471c74822ba8fe0e12b3ab156ca48816618d17d3ffbdb7d9d60c041346f8f22e4bd6322f0417ac205832fd6f0

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
    Filesize

    336KB

    MD5

    ecc7c1b0bb137107f439c9ba363a4858

    SHA1

    b9d42a45e81f903866b23b5a0cff54bf54079240

    SHA256

    7d49f1776f16d6b13bac120671dde2d756033b2832aaea4f4415997ee8660f05

    SHA512

    2e9a4b485fe33697b05e949d10c4fcc8d7bdfea0ddba6a0476caa35a03340c6cbc29c8b9495752df918b7ecb078126b4fb5593787dc3452ead2a2b505142e21e

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
    Filesize

    336KB

    MD5

    6220133249e28ff86fc1e18229d48433

    SHA1

    10d5fd97f09c0bc5dfbdeaa1fc1c9148764383ef

    SHA256

    0d626d3512bb0661eacdb063934242a9d18394e4d91a9df922d299f1c8c79636

    SHA512

    a718bc26e3cde4da47b2a6d3a46305b631a3d291ec23a0a8299e7bd1fd2f188d2ba7a1f27e507c2e3794a7adeb137d5613dbd3f726e4d9d86f27461bae5abede

  • C:\Windows\SysWOW64\IExplorer.exe
    Filesize

    336KB

    MD5

    8be03c3677797a5836dda2e10ee31d69

    SHA1

    dfa0f58f84cc25935dc52a764d9cd35b5765b58f

    SHA256

    6d66b4b8262f696f6d1110becad2cffdb34b01aa997d22d21fe60940c071e957

    SHA512

    3ecaf6febc0309d3c1e0dbc5cd57e8372a00bb916cdf2bb6318d4b4cbc9e568b0df2c134eb88917037262b55eaf380b4613370cf942a84e7e0322eba1f006f96

  • C:\Windows\SysWOW64\IExplorer.exe
    Filesize

    336KB

    MD5

    8be03c3677797a5836dda2e10ee31d69

    SHA1

    dfa0f58f84cc25935dc52a764d9cd35b5765b58f

    SHA256

    6d66b4b8262f696f6d1110becad2cffdb34b01aa997d22d21fe60940c071e957

    SHA512

    3ecaf6febc0309d3c1e0dbc5cd57e8372a00bb916cdf2bb6318d4b4cbc9e568b0df2c134eb88917037262b55eaf380b4613370cf942a84e7e0322eba1f006f96

  • C:\Windows\SysWOW64\IExplorer.exe
    Filesize

    336KB

    MD5

    04546a39ed45819e3f555b2a90fcdfac

    SHA1

    53c4b63e2285c9bb51751f5a576e9d30ba4aa706

    SHA256

    727cb9214fee3d8ad042c99189913220c4023c5953178505211d020854614979

    SHA512

    2f19595b898f614c227802a9a21ad48160fb1ea355d2ada6dbcbc2dcab835305249e0311827476ea4c39e256e4849c684a1e6c59f900bb8c50d5e0896235ee76

  • C:\Windows\xk.exe
    Filesize

    336KB

    MD5

    370ac308341cfda89f546a422c04d600

    SHA1

    87caa039b2806d60a80448abed03b37b7387ee1d

    SHA256

    7d7f66053303d72c187720b868326c66539afe358bf9b50e20acfe35f7881fe2

    SHA512

    975195fd8901ffcb436006a3f7b19b050138d1c0cf9621e1577ccbeb56cfdf10ba587553ddc27afffd6c7055f04ecd960570912f4ac290715b892f293d1d6958

  • C:\Windows\xk.exe
    Filesize

    336KB

    MD5

    370ac308341cfda89f546a422c04d600

    SHA1

    87caa039b2806d60a80448abed03b37b7387ee1d

    SHA256

    7d7f66053303d72c187720b868326c66539afe358bf9b50e20acfe35f7881fe2

    SHA512

    975195fd8901ffcb436006a3f7b19b050138d1c0cf9621e1577ccbeb56cfdf10ba587553ddc27afffd6c7055f04ecd960570912f4ac290715b892f293d1d6958

  • C:\Windows\xk.exe
    Filesize

    336KB

    MD5

    58cb85e305d89d632b10ccddb4fff67d

    SHA1

    3af34fb3419443ff923062d2a9fe9a41f20bd527

    SHA256

    a5b8941babb83272b77ee2c06414978cd71436d2bb6fc3f14f119cc7a3738bdf

    SHA512

    cd47bf4ab43920d9a18533b48fe01d74a9cafbb4ff238cbe7187f202cbb904a67020cf52cc8a37bd88b621231d51bc231421f7587490fb351cd12eb0c8a9d8a0

  • memory/224-208-0x0000000000000000-mapping.dmp
  • memory/224-212-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/980-151-0x0000000000000000-mapping.dmp
  • memory/980-156-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/1056-191-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/1056-130-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/1056-213-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/1108-166-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/1108-162-0x0000000000000000-mapping.dmp
  • memory/1160-144-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/1160-138-0x0000000000000000-mapping.dmp
  • memory/2024-190-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/2024-185-0x0000000000000000-mapping.dmp
  • memory/2212-133-0x0000000000000000-mapping.dmp
  • memory/2212-139-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/2960-196-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/2960-192-0x0000000000000000-mapping.dmp
  • memory/3240-184-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/3240-179-0x0000000000000000-mapping.dmp
  • memory/3680-203-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/3680-199-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/3680-197-0x0000000000000000-mapping.dmp
  • memory/3712-172-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/3712-167-0x0000000000000000-mapping.dmp
  • memory/3768-158-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/3768-161-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/3768-155-0x0000000000000000-mapping.dmp
  • memory/4104-202-0x0000000000000000-mapping.dmp
  • memory/4104-207-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/4700-173-0x0000000000000000-mapping.dmp
  • memory/4700-178-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/4924-150-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/4924-145-0x0000000000000000-mapping.dmp