Analysis
-
max time kernel
20s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2023 12:54
Static task
static1
Behavioral task
behavioral1
Sample
ae09d492ad1f9c8589dd93af19d7655051fb890d1710259bba0453515d701470.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ae09d492ad1f9c8589dd93af19d7655051fb890d1710259bba0453515d701470.exe
Resource
win10v2004-20230703-en
Errors
General
-
Target
ae09d492ad1f9c8589dd93af19d7655051fb890d1710259bba0453515d701470.exe
-
Size
690KB
-
MD5
e12dc94a46521e39e3555972381650d7
-
SHA1
526ec5384befc08a85cf5c32e992d2bf078fe354
-
SHA256
ae09d492ad1f9c8589dd93af19d7655051fb890d1710259bba0453515d701470
-
SHA512
4f611f4c0cccb8e2fbd015487352220507e7157822922dd20609dc30c6ad70029e055d101d3f5739a83419923d5a33222b5c0103c6e1f5133e3460e3c825e79c
-
SSDEEP
12288:jZKzOxunS7PnHbFwU+QhG6puk8mjI03zFF5dG2PNW9xkzWTjkejSOmTdzToeD1pU:jZKG7l6XAWTjkejlmZnppd2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation ae09d492ad1f9c8589dd93af19d7655051fb890d1710259bba0453515d701470.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SideSlide.lnk cscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 540 timeout.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "83" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 5064 shutdown.exe Token: SeRemoteShutdownPrivilege 5064 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4308 LogonUI.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3344 wrote to memory of 1288 3344 ae09d492ad1f9c8589dd93af19d7655051fb890d1710259bba0453515d701470.exe 87 PID 3344 wrote to memory of 1288 3344 ae09d492ad1f9c8589dd93af19d7655051fb890d1710259bba0453515d701470.exe 87 PID 1288 wrote to memory of 4404 1288 cmd.exe 89 PID 1288 wrote to memory of 4404 1288 cmd.exe 89 PID 3344 wrote to memory of 3900 3344 ae09d492ad1f9c8589dd93af19d7655051fb890d1710259bba0453515d701470.exe 90 PID 3344 wrote to memory of 3900 3344 ae09d492ad1f9c8589dd93af19d7655051fb890d1710259bba0453515d701470.exe 90 PID 3900 wrote to memory of 3616 3900 cmd.exe 92 PID 3900 wrote to memory of 3616 3900 cmd.exe 92 PID 3616 wrote to memory of 540 3616 cmd.exe 94 PID 3616 wrote to memory of 540 3616 cmd.exe 94 PID 3616 wrote to memory of 5064 3616 cmd.exe 101 PID 3616 wrote to memory of 5064 3616 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae09d492ad1f9c8589dd93af19d7655051fb890d1710259bba0453515d701470.exe"C:\Users\Admin\AppData\Local\Temp\ae09d492ad1f9c8589dd93af19d7655051fb890d1710259bba0453515d701470.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\ExpHajzu.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\system32\cscript.execscript C:\Users\Admin\AppData\Local\Temp\AgOkdv.vbs3⤵
- Drops startup file
PID:4404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\GBSDSUCH.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\GBSDSUCH.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\system32\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:540
-
-
C:\Windows\system32\shutdown.exeshutdown /r /t 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3946855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260B
MD55473c8215eb8e778da4231249a9fd412
SHA13ef43bd1e5aa001f41e4e26c2aa0ce347c8931b0
SHA25648d28fcdb058e82fbbbcdbb1a6df42c11d519e0bf7f2fa75f267492ead300a50
SHA51299a769fe92e151800a483863ff3f692dea95fca56991848ef5f9888180fcb84cb804c179f1da24013a26f234d09fe55deaee7776b4b1787556a133b55543812d
-
Filesize
573B
MD56286926a4c6a47962dd695594d505e3b
SHA12788d794ef110ed919dc85ebe10517bd7379a46a
SHA256b534abb2ce9e0c0241175c879e1d515e6805523836740a7d119ed3f5a58881f4
SHA5122fda7cf14b2fe101f4788b80a72904f76f700c0e767a7e66b91ef493a49c454ccd793d0f4cae090d966aa15de81ae7941dafa9114e508f0a77c7e55eacbf797c
-
Filesize
44B
MD5e04f000c162860777360b3c135dcb86f
SHA1dcfaa535a33309cf3c435a6a4eaa3737d1eb7ad5
SHA25666ad9e8bd3303f0865f43f275865c18969c83cd7162b540e5cde753aca9e4e58
SHA512e73b3605dfa0fc3e2f9c5bb80e47abcf47361effed09f1e2efcb01e9799f900d594908d6e731056540817b1b9b8deaf47510b1f92a8e25c86e6b207e3a995ea9