Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 04:46
Behavioral task
behavioral1
Sample
555893aef83c035c8602bbca0af564c7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
555893aef83c035c8602bbca0af564c7.exe
Resource
win10v2004-20231215-en
General
-
Target
555893aef83c035c8602bbca0af564c7.exe
-
Size
120KB
-
MD5
555893aef83c035c8602bbca0af564c7
-
SHA1
3b228afa68753ad288f2632fc46f29c811cca978
-
SHA256
774e221dbf18bd36c5f46a5782bf2288ba88365634e402b56a097f425a25993a
-
SHA512
0a8c24c3dcf0dbc9f049cd531cf03e8e2814892240214cab6002d6b9199b2a35208b8e93fe14bd3f793eae4d380c6013900884eaf00b513003ddd582b71b56bb
-
SSDEEP
3072:RRqmefClXDGvWc66peoatKYjCDrnrBgN8jy:Pqme4DGvWc0naDrr
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2196 lsass.exe 4044 lsass.exe 3304 winhost.exe 5008 lsass.exe -
resource yara_rule behavioral2/memory/2696-0-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/2696-5-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/2696-16-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/3304-21-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/files/0x000b000000023222-19.dat upx behavioral2/memory/2696-23-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/3304-25-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/2696-33-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 lsass.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 lsass.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE lsass.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies lsass.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\winhost.exe 555893aef83c035c8602bbca0af564c7.exe File opened for modification C:\Windows\winhost.exe 555893aef83c035c8602bbca0af564c7.exe File created C:\Windows\lsass.exe winhost.exe File created C:\Windows\lsass.exe 555893aef83c035c8602bbca0af564c7.exe File created C:\Windows\SMSS.bat 555893aef83c035c8602bbca0af564c7.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ lsass.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" lsass.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" lsass.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" lsass.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" lsass.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix lsass.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" lsass.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" lsass.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2696 555893aef83c035c8602bbca0af564c7.exe 2696 555893aef83c035c8602bbca0af564c7.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2196 2696 555893aef83c035c8602bbca0af564c7.exe 84 PID 2696 wrote to memory of 2196 2696 555893aef83c035c8602bbca0af564c7.exe 84 PID 2696 wrote to memory of 2196 2696 555893aef83c035c8602bbca0af564c7.exe 84 PID 2696 wrote to memory of 2416 2696 555893aef83c035c8602bbca0af564c7.exe 104 PID 2696 wrote to memory of 2416 2696 555893aef83c035c8602bbca0af564c7.exe 104 PID 2696 wrote to memory of 2416 2696 555893aef83c035c8602bbca0af564c7.exe 104 PID 2416 wrote to memory of 4044 2416 cmd.exe 103 PID 2416 wrote to memory of 4044 2416 cmd.exe 103 PID 2416 wrote to memory of 4044 2416 cmd.exe 103 PID 3304 wrote to memory of 5008 3304 winhost.exe 107 PID 3304 wrote to memory of 5008 3304 winhost.exe 107 PID 3304 wrote to memory of 5008 3304 winhost.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\555893aef83c035c8602bbca0af564c7.exe"C:\Users\Admin\AppData\Local\Temp\555893aef83c035c8602bbca0af564c7.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\lsass.exeC:\Windows\lsass.exe2⤵
- Executes dropped EXE
PID:2196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SMSS.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2416
-
-
C:\Windows\lsass.exeC:\Windows\lsass.exe1⤵
- Executes dropped EXE
PID:4044
-
C:\Windows\winhost.exeC:\Windows\winhost.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\lsass.exeC:\Windows\lsass.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31B
MD5f7783aa57cf349f565232daaf7f19485
SHA15ec48d781e5d6ecacf108ad1789753ae80984dc3
SHA2567ca2e292fbddcd05bd64c3b5f9528a282b8f479df61c7682846e85ded87cbb43
SHA512e4bae708254025700bb372e5f9ec1809bd3796bf0fccc1ede110e769ccfffbc0abe555e0425221bec0e7c63e7bf710858bed924e585066432310ef6dde5a829a
-
Filesize
234KB
MD525bc4287d751ee42ebe3bffa8b780855
SHA107a9c5f7ecac647b8448d3c876747bddfe690805
SHA2565d43f58cc4c8d837265235e679c2b12ee5074d8216948a4ae5cdfaaab0a76e37
SHA512958a014c2a413f7fc31d54b961fb8dd461f64cf58995bca3411275e3e24e421f573267e9c5512ad3501230d284551f18121ef4e9bd633352a68e41982dff11e1
-
Filesize
92KB
MD54120ca3adacc7577949f6b42791dbcaf
SHA125a1312cba7addc52e82cff30a8fff26e5359eec
SHA256a04388be66287396e1358486bc8c93a94a8ddd09685d9cbac1c98d799c1dcbbc
SHA512b23ea8fd45ae2301713eb0471b7e85e3dc92444d4bc6e8065c63bb6c7f174b2c7cd555a8993be971f781049655e911a8376eb8a09cfe89af6c7efb7a4d111d3b
-
Filesize
120KB
MD5555893aef83c035c8602bbca0af564c7
SHA13b228afa68753ad288f2632fc46f29c811cca978
SHA256774e221dbf18bd36c5f46a5782bf2288ba88365634e402b56a097f425a25993a
SHA5120a8c24c3dcf0dbc9f049cd531cf03e8e2814892240214cab6002d6b9199b2a35208b8e93fe14bd3f793eae4d380c6013900884eaf00b513003ddd582b71b56bb