Analysis
-
max time kernel
21s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2023 12:55
Static task
static1
Behavioral task
behavioral1
Sample
cd3df0bd520d36d373c7105c67577b92cd11ddd8a40c29044e6d4fe12b20f50a.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
cd3df0bd520d36d373c7105c67577b92cd11ddd8a40c29044e6d4fe12b20f50a.exe
Resource
win10v2004-20230703-en
Errors
General
-
Target
cd3df0bd520d36d373c7105c67577b92cd11ddd8a40c29044e6d4fe12b20f50a.exe
-
Size
696KB
-
MD5
efbe5feb1bfef5d5b37cb5717c956f93
-
SHA1
6c58db16e9b6d41119761863c531a7c61fa63d84
-
SHA256
cd3df0bd520d36d373c7105c67577b92cd11ddd8a40c29044e6d4fe12b20f50a
-
SHA512
fe7390ab5be40fe6188fcd2371b4b7c8c87f3a314ff3ebb2f2fe52f1cb87bcbbf9ec07781132f37ad175f25faace5a7ff3c0bedab5b50de780b389dbfb9824e6
-
SSDEEP
12288:jZKzOxunS7PnHbFwU+QhG6puk8mjI03zFF5dG2PNW9xkzWTjkejSOmTdzToeD1pW:jZKG7l6XAWTjkejlmZnppIl/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation cd3df0bd520d36d373c7105c67577b92cd11ddd8a40c29044e6d4fe12b20f50a.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FoxitPDFReader.lnk cscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4948 timeout.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "178" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4936 shutdown.exe Token: SeRemoteShutdownPrivilege 4936 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4288 LogonUI.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1104 wrote to memory of 4988 1104 cd3df0bd520d36d373c7105c67577b92cd11ddd8a40c29044e6d4fe12b20f50a.exe 86 PID 1104 wrote to memory of 4988 1104 cd3df0bd520d36d373c7105c67577b92cd11ddd8a40c29044e6d4fe12b20f50a.exe 86 PID 4988 wrote to memory of 1368 4988 cmd.exe 88 PID 4988 wrote to memory of 1368 4988 cmd.exe 88 PID 1104 wrote to memory of 2748 1104 cd3df0bd520d36d373c7105c67577b92cd11ddd8a40c29044e6d4fe12b20f50a.exe 89 PID 1104 wrote to memory of 2748 1104 cd3df0bd520d36d373c7105c67577b92cd11ddd8a40c29044e6d4fe12b20f50a.exe 89 PID 2748 wrote to memory of 4240 2748 cmd.exe 91 PID 2748 wrote to memory of 4240 2748 cmd.exe 91 PID 4240 wrote to memory of 4948 4240 cmd.exe 93 PID 4240 wrote to memory of 4948 4240 cmd.exe 93 PID 4240 wrote to memory of 4936 4240 cmd.exe 94 PID 4240 wrote to memory of 4936 4240 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd3df0bd520d36d373c7105c67577b92cd11ddd8a40c29044e6d4fe12b20f50a.exe"C:\Users\Admin\AppData\Local\Temp\cd3df0bd520d36d373c7105c67577b92cd11ddd8a40c29044e6d4fe12b20f50a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\oOEUF.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\system32\cscript.execscript C:\Users\Admin\AppData\Local\Temp\mFmAhoH.vbs3⤵
- Drops startup file
PID:1368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\BIHQJRXS.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\BIHQJRXS.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\system32\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:4948
-
-
C:\Windows\system32\shutdown.exeshutdown /r /t 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa394a855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270B
MD5724af705cc6a205505e76231a4c01421
SHA123b7ff0cfec2cb4cb70e93195bc1bbb7d5d7490e
SHA256534cfb0a27a351b290d9503cd718954468627c9132d8b749a2422856d5e63d57
SHA512840e3d10ee773e37bf2ebd4cb3b04dafcfdbd68967ebe87aa144efa604afef14469ecec2b6a1cffe8d2eb22e329b6da69e1bc525873669482d2c8b961b17bb03
-
Filesize
589B
MD56336f24e20b0c039d2127446afdfbd39
SHA14969466e9b0a7ec8856d4ee258e79ac8a04954fc
SHA256203a32f51bc9b0f1e6ef905cc6c27f7b7eb964be5f97c2a306eaae9dcd6945bf
SHA512acefa293cd1b87c213c1e91b04bf7e2f0b4a069e22ebd1bcd656e91c346da50c20117ea3af338ac023b214dd5dc0d8de2b1271941e70ab34295523b2aea67f84
-
Filesize
44B
MD5e04f000c162860777360b3c135dcb86f
SHA1dcfaa535a33309cf3c435a6a4eaa3737d1eb7ad5
SHA25666ad9e8bd3303f0865f43f275865c18969c83cd7162b540e5cde753aca9e4e58
SHA512e73b3605dfa0fc3e2f9c5bb80e47abcf47361effed09f1e2efcb01e9799f900d594908d6e731056540817b1b9b8deaf47510b1f92a8e25c86e6b207e3a995ea9