Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 15:38

General

  • Target

    0419fa158298e87fd6342b25884f7ca2.exe

  • Size

    88KB

  • MD5

    0419fa158298e87fd6342b25884f7ca2

  • SHA1

    f219af924f85542b88f71842367bbd39e4379179

  • SHA256

    73f79c9a74c2b184936cc56328ae2f9b389284018b3f38bbb15f67c89e856bd1

  • SHA512

    b9a1806e87348365a265e0a09b57a6897d290bbce188610e64948ef5fc7e1fb44c96363db163013ef47766346b1cdea5f86a01319686de82079e29380ec8fc2b

  • SSDEEP

    768:L7mv35BMCHSTLUPdzqVegTLw4aMzI8ryPIaFG0YIb5ZnsxD5BMC8v:L7Q5bSTLUPduVe34aMc8WP/b5ZsxD5

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 31 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0419fa158298e87fd6342b25884f7ca2.exe
    "C:\Users\Admin\AppData\Local\Temp\0419fa158298e87fd6342b25884f7ca2.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\WINDOWS\system\ISASS.exe
      C:\WINDOWS\system\ISASS.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\WINDOWS\system\LNETINFO.exe
        C:\WINDOWS\system\LNETINFO.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:932
        • C:\WINDOWS\system\ISASS.exe
          C:\WINDOWS\system\ISASS.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:500
        • C:\WINDOWS\system\ISASS.exe
          C:\WINDOWS\system\ISASS.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:436
        • C:\WINDOWS\system\ISASS.exe
          C:\WINDOWS\system\ISASS.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2036
        • C:\WINDOWS\system\ISASS.exe
          C:\WINDOWS\system\ISASS.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3848
        • C:\WINDOWS\system\ISASS.exe
          C:\WINDOWS\system\ISASS.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3184
      • C:\WINDOWS\security\krnl32.bat
        C:\WINDOWS\security\krnl32.bat
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:400
      • C:\WINDOWS\system\LNETINFO.exe
        C:\WINDOWS\system\LNETINFO.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2200
      • C:\WINDOWS\system\LNETINFO.exe
        C:\WINDOWS\system\LNETINFO.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:752
      • C:\WINDOWS\system\LNETINFO.exe
        C:\WINDOWS\system\LNETINFO.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4284
      • C:\WINDOWS\system\LNETINFO.exe
        C:\WINDOWS\system\LNETINFO.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3196
    • C:\WINDOWS\Explorer.exe
      C:\WINDOWS\Explorer.exe
      2⤵
      • Modifies registry class
      PID:3620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Patah Hati.txt

    Filesize

    281B

    MD5

    8b45c9539b312faf6edbd2f29d80aa9f

    SHA1

    8fba44d7f1139f77be3b3cd158be710cf47e3c3c

    SHA256

    1936c3a6dd6f44505ffe7986168de41c593ac127dd46f5305ad5b4c6c5d25773

    SHA512

    65763efb1fa2690817ea89faa1c8cce41aa9b7e51fcec0c8f16404d5e19637a1042bda808c43eb5acf0b65631b84782a1c601f7522a052374c2596a4ae580e85

  • C:\Windows\System\ISASS.exe

    Filesize

    88KB

    MD5

    0419fa158298e87fd6342b25884f7ca2

    SHA1

    f219af924f85542b88f71842367bbd39e4379179

    SHA256

    73f79c9a74c2b184936cc56328ae2f9b389284018b3f38bbb15f67c89e856bd1

    SHA512

    b9a1806e87348365a265e0a09b57a6897d290bbce188610e64948ef5fc7e1fb44c96363db163013ef47766346b1cdea5f86a01319686de82079e29380ec8fc2b

  • memory/436-169-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/500-50-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/752-255-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/752-265-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/860-65-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/860-0-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2036-271-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2200-168-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3184-477-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3196-479-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3848-375-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/4284-374-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB