Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 10:48
Static task
static1
Behavioral task
behavioral1
Sample
40a96c42e50077f03f9873a696427b0c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
40a96c42e50077f03f9873a696427b0c.exe
Resource
win10v2004-20231215-en
General
-
Target
40a96c42e50077f03f9873a696427b0c.exe
-
Size
316KB
-
MD5
40a96c42e50077f03f9873a696427b0c
-
SHA1
5932ee55845edbeb10c7bc612b88eb2f1c7316cd
-
SHA256
37a3c510bf94138e9cc983c691fdfaf22a8de1bbac3cf718a7e522649cdf88fb
-
SHA512
45883c375d9384a99065db8e33778647e31ca7c16baee5f46ef859baf21954b72b7e100ef96adaf3e581cff8a60ee0d91ebe98b364ef9ad7eb3bf0d6efc64b84
-
SSDEEP
6144:vvm10YVZB6KrpwL3nigP+JjwR99SMI27DKEJxDdMSvN:GWYVZE4pYNmZ69SMI8Jxhv
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\e476yexdjs.exe" 40a96c42e50077f03f9873a696427b0c.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\e476yexdjs.exe" 40a96c42e50077f03f9873a696427b0c.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 40a96c42e50077f03f9873a696427b0c.exe -
Disables Task Manager via registry modification
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ZT5B0cUB-7Ln8-ERbk-bYZw-GfsEiQpHSoxF} 40a96c42e50077f03f9873a696427b0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ZT5B0cUB-7Ln8-ERbk-bYZw-GfsEiQpHSoxF}\Vp8VykqmSuJMWPi = "\"C:\\Users\\Admin\\AppData\\Roaming\\e476yexdjs.exe\" /ActiveX" 40a96c42e50077f03f9873a696427b0c.exe -
Loads dropped DLL 2 IoCs
pid Process 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe -
resource yara_rule behavioral2/memory/64-2-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/64-4-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/64-5-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/64-7-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/64-23-0x0000000000400000-0x000000000049A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vp8VykqmSuJMWPi = "C:\\Users\\Admin\\AppData\\Roaming\\e476yexdjs.exe" 40a96c42e50077f03f9873a696427b0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Vp8VykqmSuJMWPi = "C:\\Users\\Admin\\AppData\\Roaming\\e476yexdjs.exe" 40a96c42e50077f03f9873a696427b0c.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 40a96c42e50077f03f9873a696427b0c.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ 40a96c42e50077f03f9873a696427b0c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1228 set thread context of 64 1228 40a96c42e50077f03f9873a696427b0c.exe 90 -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1228 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe 64 40a96c42e50077f03f9873a696427b0c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1228 wrote to memory of 64 1228 40a96c42e50077f03f9873a696427b0c.exe 90 PID 1228 wrote to memory of 64 1228 40a96c42e50077f03f9873a696427b0c.exe 90 PID 1228 wrote to memory of 64 1228 40a96c42e50077f03f9873a696427b0c.exe 90 PID 1228 wrote to memory of 64 1228 40a96c42e50077f03f9873a696427b0c.exe 90 PID 1228 wrote to memory of 64 1228 40a96c42e50077f03f9873a696427b0c.exe 90 PID 1228 wrote to memory of 64 1228 40a96c42e50077f03f9873a696427b0c.exe 90 PID 1228 wrote to memory of 64 1228 40a96c42e50077f03f9873a696427b0c.exe 90 PID 1228 wrote to memory of 64 1228 40a96c42e50077f03f9873a696427b0c.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\40a96c42e50077f03f9873a696427b0c.exe"C:\Users\Admin\AppData\Local\Temp\40a96c42e50077f03f9873a696427b0c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\40a96c42e50077f03f9873a696427b0c.exeC:\Users\Admin\AppData\Local\Temp\40a96c42e50077f03f9873a696427b0c.exe2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:64
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD51173123287198dce1eb831f04e28352c
SHA139d650f4297c990a7ffaa7dc3b6d0ef903c9bd14
SHA25665d4582e135c774d9c827ae08de8b77f199ee934f13d1a0537df4f5d18f590ba
SHA512e9fdb6e808b0f3ed850fb364d48609a9726fd41ad138594fc04f8d48d5672aec3aaa76af236f07c4263c053dc539f99009e74491adb03c885190dcce78f0cede