Analysis

  • max time kernel
    197s
  • max time network
    202s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2024 19:57

General

  • Target

    040a43a53026d1eb8a1b39fb1216e716.exe

  • Size

    556KB

  • MD5

    040a43a53026d1eb8a1b39fb1216e716

  • SHA1

    9090487c6b239968f3e980f24d87f01e8a2f0c95

  • SHA256

    5def381413fba68eb44ef49c9991bdea93daf3ae3ff4d86d0c0120c5b2bb49a4

  • SHA512

    38706f6fa14f8c9120f7e63c76dc767ed071c2d4de016ddb5ee408bc8f614a72d5a5e66608d67f147bc1cdd952685ae1a49caa8624a1e782a4f9ae82ba002f85

  • SSDEEP

    12288:Dlsns1q8NrrTCP5FyTNiQXsRgkEgAayFQQHzO:S8Nrr2DeNncJlQTO

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 2 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\040a43a53026d1eb8a1b39fb1216e716.exe
    "C:\Users\Admin\AppData\Local\Temp\040a43a53026d1eb8a1b39fb1216e716.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4720
    • C:\Users\Admin\AppData\Local\Temp\040a43a53026d1eb8a1b39fb1216e716.exe
      "C:\Users\Admin\AppData\Local\Temp\040a43a53026d1eb8a1b39fb1216e716.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Users\Admin\AppData\Local\Temp\040a43a53026d1eb8a1b39fb1216e716.exe
        "C:\Users\Admin\AppData\Local\Temp\040a43a53026d1eb8a1b39fb1216e716.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies Installed Components in the registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Modifies WinLogon
        • Suspicious use of SetWindowsHookEx
        PID:4708
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 776
          4⤵
          • Program crash
          PID:3232
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4708 -ip 4708
    1⤵
      PID:3036

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    4
    T1547

    Registry Run Keys / Startup Folder

    2
    T1547.001

    Winlogon Helper DLL

    2
    T1547.004

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Privilege Escalation

    Boot or Logon Autostart Execution

    4
    T1547

    Registry Run Keys / Startup Folder

    2
    T1547.001

    Winlogon Helper DLL

    2
    T1547.004

    Defense Evasion

    Modify Registry

    4
    T1112

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\dwlGina3.dll
      Filesize

      131KB

      MD5

      456f8bc05e54621c857f013aaad94c9e

      SHA1

      0fab3946fdd69ff134f39bef38d59375778ab54a

      SHA256

      7dec9b1f3a56e65b26b724f0df4a77f47ac8c99407d2e98b40d7da93ec431718

      SHA512

      03929db4369c38c314370d2e87a8b4d09c8e6a6b93c6f06a23a06da45ad6bda543cdab0d9e7cf2dbc80447a060f860f4a8d0cc21f6c6402f327b4f885935b111

    • memory/4708-15-0x0000000000400000-0x00000000004A3000-memory.dmp
      Filesize

      652KB

    • memory/4708-8-0x0000000000400000-0x00000000004A3000-memory.dmp
      Filesize

      652KB

    • memory/4708-19-0x0000000000400000-0x00000000004A3000-memory.dmp
      Filesize

      652KB

    • memory/4708-16-0x0000000002440000-0x0000000002441000-memory.dmp
      Filesize

      4KB

    • memory/4708-37-0x0000000000400000-0x00000000004A3000-memory.dmp
      Filesize

      652KB

    • memory/4708-13-0x0000000000400000-0x00000000004A3000-memory.dmp
      Filesize

      652KB

    • memory/4708-14-0x0000000000400000-0x00000000004A3000-memory.dmp
      Filesize

      652KB

    • memory/4708-36-0x0000000000400000-0x00000000004A3000-memory.dmp
      Filesize

      652KB

    • memory/4708-38-0x0000000000400000-0x00000000004A3000-memory.dmp
      Filesize

      652KB

    • memory/4708-29-0x0000000002440000-0x0000000002441000-memory.dmp
      Filesize

      4KB

    • memory/4708-10-0x0000000000400000-0x00000000004A3000-memory.dmp
      Filesize

      652KB

    • memory/4708-24-0x00000000024C0000-0x0000000002510000-memory.dmp
      Filesize

      320KB

    • memory/4708-25-0x0000000002520000-0x0000000002535000-memory.dmp
      Filesize

      84KB

    • memory/4708-26-0x0000000000400000-0x00000000004A3000-memory.dmp
      Filesize

      652KB

    • memory/4720-0-0x0000000000400000-0x000000000048B000-memory.dmp
      Filesize

      556KB

    • memory/4964-5-0x0000000000400000-0x000000000045D000-memory.dmp
      Filesize

      372KB

    • memory/4964-11-0x0000000000400000-0x000000000045D000-memory.dmp
      Filesize

      372KB

    • memory/4964-3-0x0000000000400000-0x000000000045D000-memory.dmp
      Filesize

      372KB