Analysis

  • max time kernel
    3s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 01:48

Errors

Reason
Machine shutdown

General

  • Target

    3b95feaab29491ac65b7840f86436c25.exe

  • Size

    68KB

  • MD5

    3b95feaab29491ac65b7840f86436c25

  • SHA1

    6074c1fd12e7d0213066ab1b1656397f45a43537

  • SHA256

    2711c03fe875ace84d319a3c23253fe2fc446d5d40364211c7323d9fa989df7c

  • SHA512

    0b3c1dc500e64c3f42ca70121c7dd3a5aab11718f165fd5c7f3da1e72f7b0c85f4cea4821ad17abdc0820dc53011b2b8f5786d23ba76002f02c585ea3a261c3e

  • SSDEEP

    768:/8Auby53IqpHaZOCcHy77BwRdrW+ZnOZbtR0dkN6MyMZ/ytjirERfE0DJZFU5E:Oby19oZkH07BM14dtyk6M0DJ

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Manipulates Digital Signatures 1 TTPs 64 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Modifies Installed Components in the registry 2 TTPs 37 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b95feaab29491ac65b7840f86436c25.exe
    "C:\Users\Admin\AppData\Local\Temp\3b95feaab29491ac65b7840f86436c25.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C attrib -A -R -S -H C:\ntldr & del /F /Q C:\ntldr
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1312
      • C:\Windows\SysWOW64\attrib.exe
        attrib -A -R -S -H C:\ntldr
        3⤵
        • Views/modifies file attributes
        PID:1168
    • C:\Windows\SysWOW64\shutdown.exe
      "C:\Windows\System32\shutdown.exe" -r -f -t 20 -c "YOU HAVE JUST LOST THE GAME"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1108
    • C:\Windows\SysWOW64\reg.exe
      "C:\Windows\System32\reg.exe" delete "hkcu\Software" /f
      2⤵
      • Manipulates Digital Signatures
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:1736
    • C:\Windows\SysWOW64\reg.exe
      "C:\Windows\System32\reg.exe" delete "hklm\Software" /f
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Manipulates Digital Signatures
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Installs/modifies Browser Helper Object
      • Modifies Internet Explorer settings
      PID:2320
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2220
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:2608

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads