Analysis
-
max time kernel
42s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 23:45
Behavioral task
behavioral1
Sample
44211f3bf584a0b119a39450fa24cf2b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
44211f3bf584a0b119a39450fa24cf2b.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
44211f3bf584a0b119a39450fa24cf2b.exe
-
Size
23KB
-
MD5
44211f3bf584a0b119a39450fa24cf2b
-
SHA1
605cefb8eb5b39f15bd5350de18e0155961690b0
-
SHA256
e8fe63b43481c39a8ec58d77ee57c6ff4a9211d942c05b62a66475f8d2fddd7c
-
SHA512
1213e9036ee39b1f6002883a00969cf39e69a15d09b16c3317bbc5b8466673b24376313fbaa73f08bf3cc51b73851bb6a62315b9985d3603e90de06c2b7713c1
-
SSDEEP
384:GbCEXMMADQIrUeNFwx9E5xtT6fkCMst8AdxIiv4dK8y8KG8szTO4Am7UnwtzwGKH:C1NAUsbxtT6sFst/3IrdlLUwG8Znbcut
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4056-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4056-4-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NOPE = "C:\\Install\\setup.exe" reg.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "42" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2732 shutdown.exe Token: SeRemoteShutdownPrivilege 2732 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4100 LogonUI.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4056 wrote to memory of 4664 4056 44211f3bf584a0b119a39450fa24cf2b.exe 91 PID 4056 wrote to memory of 4664 4056 44211f3bf584a0b119a39450fa24cf2b.exe 91 PID 4056 wrote to memory of 4664 4056 44211f3bf584a0b119a39450fa24cf2b.exe 91 PID 4664 wrote to memory of 4980 4664 cmd.exe 92 PID 4664 wrote to memory of 4980 4664 cmd.exe 92 PID 4664 wrote to memory of 4980 4664 cmd.exe 92 PID 4664 wrote to memory of 2084 4664 cmd.exe 93 PID 4664 wrote to memory of 2084 4664 cmd.exe 93 PID 4664 wrote to memory of 2084 4664 cmd.exe 93 PID 4664 wrote to memory of 2732 4664 cmd.exe 94 PID 4664 wrote to memory of 2732 4664 cmd.exe 94 PID 4664 wrote to memory of 2732 4664 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\44211f3bf584a0b119a39450fa24cf2b.exe"C:\Users\Admin\AppData\Local\Temp\44211f3bf584a0b119a39450fa24cf2b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DC08.tmp\bla - Kopie.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\xcopy.exexcopy setup.exe C:\Install\ /I /Y3⤵
- Enumerates system info in registry
PID:4980
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v NOPE /t REG_SZ /d C:\Install\setup.exe /f3⤵
- Adds Run key to start application
PID:2084
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown -s -f -t 83⤵
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3992055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
909B
MD5116527ecda91d1b6dff211146661e38b
SHA16d789b8a0f8f3ab770ea62953f002f93dc7bde04
SHA256f6f380baf766b1a9ec89dd1bfc133d21e9bb3879b64c552474ba7fbf0dd470e5
SHA5123d10a3d00c2757e4d6321f4a7e9e787c8ae9d179d11b1056514e40ace6dcb5d4f942977070b5b3e9b88f826218251df88d92175402ce0089e5f24de1f83360ee