Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2023, 03:01

General

  • Target

    4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe

  • Size

    4.4MB

  • MD5

    4459ddf6f1c3484e5f9cdbeda941aa99

  • SHA1

    359b03153d3deb165b1f10ccfdae8fdf82d5e294

  • SHA256

    4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038

  • SHA512

    2cfe1b9b58174e3d8603654669a86e0821a3a7868ce479cd357593a07c16bf24ca3921707b3f3521b7bada1cfe97a8b99f2ebb0c693ea4ec52a058a56e3cd29f

  • SSDEEP

    49152:oTGkQk5QZuTtS0rQMYOQ+q8CEjTG4QWTGHQ39KFeM7:oKkrWsM0r1QnIK4LKHw0Feu

Score
8/10
upx

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 16 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:644
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe
        "C:\Users\Admin\AppData\Local\Temp\4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe"
        2⤵
        • Checks computer location settings
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4564
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            4⤵
            • Delays execution with timeout.exe
            PID:3676
      • C:\Windows\Inf\setupcl.exe
        "C:\Windows\Inf\setupcl.exe"
        2⤵
        • Executes dropped EXE
        PID:4868
      • C:\Windows\chglogon.exe
        "C:\Windows\chglogon.exe"
        2⤵
        • Drops file in Drivers directory
        • Manipulates Digital Signatures
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3384
    • C:\Windows\Syswow64\6a065a98
      C:\Windows\Syswow64\6a065a98
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Windows\Syswow64\6a065a98"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 1
          3⤵
          • Delays execution with timeout.exe
          PID:4920

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\INF\setupcl.exe

            Filesize

            10KB

            MD5

            501d2b053f7ead583763e758038ce68a

            SHA1

            5db3c5aefc28214c73f24ec4d2b416d9e6a0423d

            SHA256

            913c6ecfeb0e6b7347682c7ca9e7bf5cf5d875bb52e7a4332d305b10c5f16db1

            SHA512

            1084465dd01e5d959c3a5f1a6a4d0701c185551b079823f87f679a4f22433f45454dc8489773741c5c2cc2ceecc7b216d72b5adc2e982353d1dbcf26e4f1791f

          • C:\Windows\SysWOW64\6a065a98

            Filesize

            4.4MB

            MD5

            5464e85e1a74e86ee5f3bfdf3064db95

            SHA1

            98eb210319a1d5f5f3ec8a99706d1fcae0091a7b

            SHA256

            787c935005d2a844a99baaa0d04a16bab513fc3f6088bee46e838a00ec651e80

            SHA512

            4b3495c556cc0f4d78b6273f1d584a97da964c71c8f8eb0e7f68b9db59e595ad3932f0be2cdbd0131576b2a0f881a0c91188ad64c09c722f2e67bd44bd402fa5

          • C:\Windows\SysWOW64\6a065a98

            Filesize

            4.4MB

            MD5

            5464e85e1a74e86ee5f3bfdf3064db95

            SHA1

            98eb210319a1d5f5f3ec8a99706d1fcae0091a7b

            SHA256

            787c935005d2a844a99baaa0d04a16bab513fc3f6088bee46e838a00ec651e80

            SHA512

            4b3495c556cc0f4d78b6273f1d584a97da964c71c8f8eb0e7f68b9db59e595ad3932f0be2cdbd0131576b2a0f881a0c91188ad64c09c722f2e67bd44bd402fa5

          • C:\Windows\chglogon.exe

            Filesize

            23KB

            MD5

            96c637283d92573c121b34513c267987

            SHA1

            1556fdc9ee7e3f8c8729932e0d5e660dfd69cc53

            SHA256

            a9cc2b03783896c6596d8f4e4cc3db555a9096264bc8253478d1f0f0fbb2b74b

            SHA512

            a7aa96670c2b1a2cf8511c4bef0f2742fa3e2bbe8b797d380652b8bc8d57182fc97fe1fb41b6de3279febdfec9af280c7c9df9641be0685ffb90219caf68dff2

          • memory/644-28-0x0000026FD6E60000-0x0000026FD6E63000-memory.dmp

            Filesize

            12KB

          • memory/644-73-0x0000026FD6EC0000-0x0000026FD6EC1000-memory.dmp

            Filesize

            4KB

          • memory/644-31-0x0000026FD6E70000-0x0000026FD6E98000-memory.dmp

            Filesize

            160KB

          • memory/644-29-0x0000026FD6EC0000-0x0000026FD6EC1000-memory.dmp

            Filesize

            4KB

          • memory/1028-4-0x0000000000270000-0x00000000002F9000-memory.dmp

            Filesize

            548KB

          • memory/1028-64-0x0000000000270000-0x00000000002F9000-memory.dmp

            Filesize

            548KB

          • memory/3384-70-0x000001CBA8410000-0x000001CBA8411000-memory.dmp

            Filesize

            4KB

          • memory/3384-75-0x000001CBA8450000-0x000001CBA84F0000-memory.dmp

            Filesize

            640KB

          • memory/3384-25-0x000001CBA7AE0000-0x000001CBA7BAB000-memory.dmp

            Filesize

            812KB

          • memory/3384-91-0x000001CBA81D0000-0x000001CBA81D1000-memory.dmp

            Filesize

            4KB

          • memory/3384-90-0x000001CBA81D0000-0x000001CBA81D1000-memory.dmp

            Filesize

            4KB

          • memory/3384-89-0x000001CBA81D0000-0x000001CBA81D1000-memory.dmp

            Filesize

            4KB

          • memory/3384-88-0x000001CBA81D0000-0x000001CBA81D1000-memory.dmp

            Filesize

            4KB

          • memory/3384-65-0x00007FFE85230000-0x00007FFE85240000-memory.dmp

            Filesize

            64KB

          • memory/3384-66-0x000001CBA81E0000-0x000001CBA81E1000-memory.dmp

            Filesize

            4KB

          • memory/3384-67-0x000001CBA83F0000-0x000001CBA83F1000-memory.dmp

            Filesize

            4KB

          • memory/3384-87-0x000001CBA81D0000-0x000001CBA81D1000-memory.dmp

            Filesize

            4KB

          • memory/3384-86-0x000001CBA81D0000-0x000001CBA81D1000-memory.dmp

            Filesize

            4KB

          • memory/3384-84-0x000001CBA8450000-0x000001CBA84F0000-memory.dmp

            Filesize

            640KB

          • memory/3384-71-0x000001CBA7AE0000-0x000001CBA7BAB000-memory.dmp

            Filesize

            812KB

          • memory/3384-72-0x000001CBA7AA0000-0x000001CBA7AA1000-memory.dmp

            Filesize

            4KB

          • memory/3384-85-0x000001CBA83F0000-0x000001CBA83F2000-memory.dmp

            Filesize

            8KB

          • memory/3384-74-0x000001CBA8400000-0x000001CBA840F000-memory.dmp

            Filesize

            60KB

          • memory/3384-26-0x00007FFE85230000-0x00007FFE85240000-memory.dmp

            Filesize

            64KB

          • memory/3384-76-0x000001CBA83F0000-0x000001CBA83F2000-memory.dmp

            Filesize

            8KB

          • memory/3384-77-0x000001CBA81E0000-0x000001CBA81E1000-memory.dmp

            Filesize

            4KB

          • memory/3384-78-0x000001CBA84F0000-0x000001CBA84F1000-memory.dmp

            Filesize

            4KB

          • memory/3384-79-0x000001CBA83F0000-0x000001CBA83F1000-memory.dmp

            Filesize

            4KB

          • memory/3384-80-0x000001CBA8400000-0x000001CBA8401000-memory.dmp

            Filesize

            4KB

          • memory/3384-81-0x000001CBA8500000-0x000001CBA8501000-memory.dmp

            Filesize

            4KB

          • memory/3384-82-0x000001CBA84F0000-0x000001CBA84F1000-memory.dmp

            Filesize

            4KB

          • memory/3384-83-0x000001CBA8410000-0x000001CBA8411000-memory.dmp

            Filesize

            4KB

          • memory/3428-10-0x0000000007800000-0x0000000007803000-memory.dmp

            Filesize

            12KB

          • memory/3428-69-0x0000000007820000-0x0000000007821000-memory.dmp

            Filesize

            4KB

          • memory/3428-68-0x0000000008FE0000-0x00000000090D7000-memory.dmp

            Filesize

            988KB

          • memory/3428-12-0x0000000007800000-0x0000000007803000-memory.dmp

            Filesize

            12KB

          • memory/3428-17-0x0000000007820000-0x0000000007821000-memory.dmp

            Filesize

            4KB

          • memory/3428-14-0x0000000008FE0000-0x00000000090D7000-memory.dmp

            Filesize

            988KB

          • memory/4564-0-0x00000000009F0000-0x0000000000A79000-memory.dmp

            Filesize

            548KB

          • memory/4564-38-0x00000000009F0000-0x0000000000A79000-memory.dmp

            Filesize

            548KB