Analysis

  • max time kernel
    0s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2024, 15:19

General

  • Target

    9d5468f809ddfcf04a97982d371e442c.exe

  • Size

    45KB

  • MD5

    9d5468f809ddfcf04a97982d371e442c

  • SHA1

    02f97dd694b055eb6e5aa11569a659a3900f042c

  • SHA256

    77f5e44a64234c7fbba39e5d4e70102a8a7ba250d0e78b785b7df1c57136b94f

  • SHA512

    7ac9bd6275b698444f869e0bc4b42bd1f898a1ef6ee7dec439fe66964e75c1156daacdee68b59c69f269fb4f75fec3ff074db1ceb5c38e4b4c03f109e0804741

  • SSDEEP

    768:oMzk06sDnriJ3OGKeKNh/UkECjMtvR1VF2r+R5nOwekfZO/r:npDnq+5h/tDSZ15WwdA

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
  • Disables RegEdit via registry modification 3 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 3 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 3 IoCs
  • Modifies system executable filetype association 2 TTPs 35 IoCs
  • Adds Run key to start application 2 TTPs 13 IoCs
  • Modifies WinLogon 2 TTPs 9 IoCs
  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Control Panel 25 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies Internet Explorer start page 1 TTPs 3 IoCs
  • Modifies registry class 55 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d5468f809ddfcf04a97982d371e442c.exe
    "C:\Users\Admin\AppData\Local\Temp\9d5468f809ddfcf04a97982d371e442c.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:632
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe"
      2⤵
        PID:1564
        • C:\Windows\babon.exe
          C:\Windows\babon.exe
          3⤵
            PID:2552
          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
            3⤵
              PID:380
            • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe
              "C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe"
              3⤵
                PID:2344
              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe
                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe"
                3⤵
                  PID:3664
                • C:\Windows\SysWOW64\IExplorer.exe
                  C:\Windows\system32\IExplorer.exe
                  3⤵
                    PID:4616
                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe
                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe"
                  2⤵
                    PID:1240
                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe
                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe"
                      3⤵
                        PID:1328
                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe
                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe"
                        3⤵
                          PID:4948
                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                          3⤵
                            PID:4612
                          • C:\Windows\SysWOW64\IExplorer.exe
                            C:\Windows\system32\IExplorer.exe
                            3⤵
                              PID:640
                            • C:\Windows\babon.exe
                              C:\Windows\babon.exe
                              3⤵
                                PID:3220
                            • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                              "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                              2⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Modifies Control Panel
                              • Suspicious use of SetWindowsHookEx
                              PID:2108
                              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe
                                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe"
                                3⤵
                                  PID:4964
                                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe
                                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe"
                                  3⤵
                                    PID:1972
                                  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                                    "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                                    3⤵
                                      PID:4020
                                    • C:\Windows\SysWOW64\IExplorer.exe
                                      C:\Windows\system32\IExplorer.exe
                                      3⤵
                                        PID:3780
                                      • C:\Windows\babon.exe
                                        C:\Windows\babon.exe
                                        3⤵
                                          PID:4920
                                      • C:\Windows\SysWOW64\IExplorer.exe
                                        C:\Windows\system32\IExplorer.exe
                                        2⤵
                                        • Modifies WinLogon for persistence
                                        • Modifies visibility of file extensions in Explorer
                                        • Modifies visiblity of hidden/system files in Explorer
                                        • Disables RegEdit via registry modification
                                        • Disables cmd.exe use via registry modification
                                        • Executes dropped EXE
                                        • Modifies system executable filetype association
                                        • Adds Run key to start application
                                        • Modifies WinLogon
                                        • Drops file in System32 directory
                                        • Drops file in Windows directory
                                        • Modifies Control Panel
                                        • Modifies Internet Explorer settings
                                        • Modifies Internet Explorer start page
                                        • Modifies registry class
                                        • Suspicious use of SetWindowsHookEx
                                        • System policy modification
                                        PID:4988
                                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe
                                          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe"
                                          3⤵
                                            PID:2132
                                          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe
                                            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe"
                                            3⤵
                                              PID:4464
                                            • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                                              "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                                              3⤵
                                                PID:4536
                                              • C:\Windows\SysWOW64\IExplorer.exe
                                                C:\Windows\system32\IExplorer.exe
                                                3⤵
                                                  PID:1292
                                                • C:\Windows\babon.exe
                                                  C:\Windows\babon.exe
                                                  3⤵
                                                    PID:1188
                                                • C:\Windows\babon.exe
                                                  C:\Windows\babon.exe
                                                  2⤵
                                                  • Modifies WinLogon for persistence
                                                  • Modifies visibility of file extensions in Explorer
                                                  • Modifies visiblity of hidden/system files in Explorer
                                                  • Disables RegEdit via registry modification
                                                  • Disables cmd.exe use via registry modification
                                                  • Executes dropped EXE
                                                  • Modifies system executable filetype association
                                                  • Adds Run key to start application
                                                  • Modifies WinLogon
                                                  • Modifies Control Panel
                                                  • Modifies Internet Explorer settings
                                                  • Modifies Internet Explorer start page
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  • System policy modification
                                                  PID:2632
                                                  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe
                                                    "C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe"
                                                    3⤵
                                                      PID:3196
                                                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe
                                                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe"
                                                      3⤵
                                                        PID:3168
                                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                                                        3⤵
                                                          PID:388
                                                        • C:\Windows\SysWOW64\IExplorer.exe
                                                          C:\Windows\system32\IExplorer.exe
                                                          3⤵
                                                            PID:3928
                                                          • C:\Windows\babon.exe
                                                            C:\Windows\babon.exe
                                                            3⤵
                                                              PID:1452

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads