Analysis
-
max time kernel
28s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 07:14
Static task
static1
Behavioral task
behavioral1
Sample
2cf7335ae9b05e449dacd2b95693ba60.exe
Resource
win7-20231215-en
General
-
Target
2cf7335ae9b05e449dacd2b95693ba60.exe
-
Size
672KB
-
MD5
2cf7335ae9b05e449dacd2b95693ba60
-
SHA1
8795ca628e1a7bc0d1f33203af2702a5b7b8bfc8
-
SHA256
02837e7c28378e0517e0efe433ef3f8e0b4d9daebdb4b9cff0df4ab1ba3ce163
-
SHA512
2e9cda0631e47533ac5a1e6dfd14a6a770527480068355b0d92ef0da2b8c3bc18910f5a025e3d8aef8840c974e1ec6c1963d543c71a3a3239706111b6286b27b
-
SSDEEP
12288:neBNUbTVO86UCHruRdp+WA00SKCpVRwfHXSVUhbxk9e/pJu:nJIUCNd0nKwYPX+UhbW9eM
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 5 IoCs
pid Process 1904 alg.exe 3304 DiagnosticsHub.StandardCollector.Service.exe 3888 fxssvc.exe 4232 elevation_service.exe 3936 elevation_service.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-1232405761-1209240240-3206092754-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-1232405761-1209240240-3206092754-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\G: alg.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\T: alg.exe -
Drops file in System32 directory 37 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File opened for modification \??\c:\windows\system32\svchost.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\windows\system32\Appvclient.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\windows\system32\fxssvc.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File opened for modification \??\c:\windows\system32\fxssvc.exe alg.exe File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File created \??\c:\windows\system32\diagsvcs\afpnphda.tmp 2cf7335ae9b05e449dacd2b95693ba60.exe File created \??\c:\windows\system32\epdggmbi.tmp 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe alg.exe File opened for modification \??\c:\windows\system32\dllhost.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File created \??\c:\windows\system32\bajlkbmf.tmp 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\windows\system32\vds.exe alg.exe File opened for modification \??\c:\windows\system32\wbengine.exe alg.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe alg.exe File created \??\c:\windows\system32\ekdmomjf.tmp 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File opened for modification \??\c:\windows\system32\alg.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File created \??\c:\windows\system32\nhhgfofk.tmp 2cf7335ae9b05e449dacd2b95693ba60.exe File created \??\c:\windows\system32\laeokdoj.tmp 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\windows\system32\lsass.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\windows\system32\msdtc.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe alg.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File created \??\c:\program files (x86)\mozilla maintenance service\imhnenmf.tmp 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe alg.exe File created \??\c:\program files\google\chrome\Application\106.0.5249.119\lpdiahlc.tmp 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File created \??\c:\program files\common files\microsoft shared\source engine\mggpqmnd.tmp alg.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\egglkomm.tmp 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe alg.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe 2cf7335ae9b05e449dacd2b95693ba60.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe alg.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1904 alg.exe 1904 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1148 2cf7335ae9b05e449dacd2b95693ba60.exe Token: SeAuditPrivilege 3888 fxssvc.exe Token: SeTakeOwnershipPrivilege 1904 alg.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cf7335ae9b05e449dacd2b95693ba60.exe"C:\Users\Admin\AppData\Local\Temp\2cf7335ae9b05e449dacd2b95693ba60.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1904
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:3304
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3880
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4232
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3936
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵PID:2056
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵PID:4528
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 804 808 816 8192 812 7882⤵PID:3472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672KB
MD51c5e7fa8b9c7f265ae0a954ad68bfc57
SHA1354d90b21e3bcdab7481a3b9be99785263694d66
SHA256ef16560bf1a3473805ec629661c45214fead5eb4d671539a5a70fa45c90a99a9
SHA512ce041244f7d209fe9fdaedddc2e8b1fdd3cc891819761274d157ba2c7aa1c3d3d7420f8729431f337a295b07526669d317b52b87ea0f7cc1d7b0ad48c5676cce
-
Filesize
738KB
MD560af24fa3fb9eaecd7c6771ba44a2651
SHA1e2c93eb1273251524faa3b01983edc5309d973d0
SHA256b880d41feff46fa845aedc9ab1474eb57f9d226a4806443e148c5fe642925da7
SHA512d920bc4c6637bb6924b9fd48a2ebd466083b891339ff2b4086381b97a11cfcd4a156fb97028d19363f6e92ab2e043fa58c62392fc00d97c1ef82a7f978f7cee6
-
Filesize
1.7MB
MD507b57daff58c840ac91b683d04c5e080
SHA1e3553b88b8d639374945c83178017ef02f0b19e7
SHA256c596cfdd5598f9cd9925b864411552ed1cb716765dc94d083be3647b19cd13ee
SHA5127f83f45e900705bf4d5e6e171c76b7d1efffd95ca7e528b9d874dca3c1e94c6b573928f1635f632b13f6c13ecff5b774253e0448393d968317cd46b807a5099a
-
Filesize
2.5MB
MD53e7fe0356aa7fc3124e1c5e1a5e97bad
SHA14f9f2b4e0e6f75d39c995dfd949fd1a9bdee462f
SHA256cd262819a94a6585ee53144cc057c585b75ac2f711285d05f23a7a2a8d72df8f
SHA512c6475c1ef10b6a7970bb9dc43dacb714ae07a0a85209f9c6e1715c44f3b5abb7a6d123a14906ebdc2f451ec943371dbd982562e7d7fae57b88b174b22361933a