Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
4132cbda66975e8172291aa4d6c4b232.exe
Resource
win7-20231129-en
General
-
Target
4132cbda66975e8172291aa4d6c4b232.exe
-
Size
672KB
-
MD5
4132cbda66975e8172291aa4d6c4b232
-
SHA1
f2484170990c6846d763d3a7743ee0d7d2e46754
-
SHA256
ff5808ac4b050e10713e9132bd3961c369de9bc8791b827f65d143ffbaf119d5
-
SHA512
36d70b773399ceb1a4d1e5f36ec49e74637813a1f9d0a06de96a875e535bb344cfdb8f8d3f2bbf0e885d546b7ce310caee61ba0d8e598c1eb2f93b9eb7fe970b
-
SSDEEP
12288:QeBNUbTVO86UCHruRdp+WA00SKCpVRwfXXSVUhbxk9e/pJu:QJIUCNd0nKwYvX+UhbW9eM
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 6 IoCs
pid Process 2544 alg.exe 2160 DiagnosticsHub.StandardCollector.Service.exe 4304 fxssvc.exe 3520 elevation_service.exe 3836 maintenanceservice.exe 896 msdtc.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-983843758-932321429-1636175382-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-983843758-932321429-1636175382-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: alg.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\G: alg.exe -
Drops file in System32 directory 62 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File created \??\c:\windows\system32\perceptionsimulation\beojknek.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\spectrum.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\system32\lsass.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File created \??\c:\windows\syswow64\ojinmdgm.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\alg.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\msdtc.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File created \??\c:\windows\system32\openssh\fafjdcai.tmp 4132cbda66975e8172291aa4d6c4b232.exe File created \??\c:\windows\system32\nnfcgilo.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe File created \??\c:\windows\system32\flpapije.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\fxssvc.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\svchost.exe 4132cbda66975e8172291aa4d6c4b232.exe File created \??\c:\windows\system32\gjknlbmn.tmp 4132cbda66975e8172291aa4d6c4b232.exe File created \??\c:\windows\system32\cdjolgkp.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\snmptrap.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\vds.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\fxssvc.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe File created \??\c:\windows\system32\diagsvcs\pgeaekaf.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe alg.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe alg.exe File created \??\c:\windows\system32\ienebomg.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\Appvclient.exe 4132cbda66975e8172291aa4d6c4b232.exe File created \??\c:\windows\system32\hphifili.tmp 4132cbda66975e8172291aa4d6c4b232.exe File created \??\c:\windows\system32\jdjnmbdp.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\vds.exe alg.exe File created \??\c:\windows\system32\mfkfeiee.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe alg.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe alg.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\vssvc.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File created \??\c:\windows\system32\mindfqkn.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\locator.exe 4132cbda66975e8172291aa4d6c4b232.exe File created \??\c:\windows\system32\pbmipjbk.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File created \??\c:\windows\system32\mepojqhk.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\wbengine.exe alg.exe File created \??\c:\windows\system32\kidlfdpe.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\Agentservice.exe 4132cbda66975e8172291aa4d6c4b232.exe File created \??\c:\windows\system32\becdobol.tmp 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\system32\dllhost.exe 4132cbda66975e8172291aa4d6c4b232.exe -
Drops file in Program Files directory 24 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe 4132cbda66975e8172291aa4d6c4b232.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\nhqibpbb.tmp alg.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe alg.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe alg.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe alg.exe File created \??\c:\program files (x86)\mozilla maintenance service\ijjnhbdq.tmp 4132cbda66975e8172291aa4d6c4b232.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File created \??\c:\program files\common files\microsoft shared\source engine\nladikkc.tmp alg.exe File created C:\Program Files\7-Zip\gkooamha.tmp alg.exe File created C:\Program Files\7-Zip\cedpmnkl.tmp alg.exe File created \??\c:\program files\google\chrome\Application\106.0.5249.119\egoleafl.tmp alg.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe alg.exe File created C:\Program Files\7-Zip\nccafaqk.tmp alg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File created C:\Program Files\7-Zip\jgpijieg.tmp alg.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe 4132cbda66975e8172291aa4d6c4b232.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe 2544 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2744 4132cbda66975e8172291aa4d6c4b232.exe Token: SeTakeOwnershipPrivilege 2544 alg.exe Token: SeAuditPrivilege 4304 fxssvc.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4132cbda66975e8172291aa4d6c4b232.exe"C:\Users\Admin\AppData\Local\Temp\4132cbda66975e8172291aa4d6c4b232.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2544
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:2160
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3952
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3520
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3836
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
613KB
MD59425392db6203b2d71320bcd7a334364
SHA1fb1c6a3f10e08016dd1c805ab6cc3d2ef7703e4b
SHA25675477e0f7c452ca869b4d6580e0714a91dbf748b82d3a8f452f80693281d5bb1
SHA5120722c08e467b324f9c57862e0f1eee7ec3a461bcdfaa9637590268894625e9b2e11f36fadde99f5d6bb8b6ca7711d64fc32ff11e650b8ea05bce4f04db8f559a
-
Filesize
1.7MB
MD590d841bb7590a369215f3b7d77a8361c
SHA136f7d925ae563435e868f809a2ed9d128994e1c0
SHA25677e038f4f1a1626905501eabf021d52b876956aaacaa3e4f64207e84024c5058
SHA5122d06b3a8e3e8a036ee402b763f44d70d8f147bc0d4246c1ee046bea6b5d08b7270c5401dc4f369ec762eca08d981227be22e6f5149e997a85ebfb477ef48536b
-
Filesize
678KB
MD5780a6ec77dffc3ebf7c0689dee7d4ca6
SHA1c1660e3daab254bfccb7c09d00e1b92e4dc633f5
SHA256932941144f964b0e758243a803461b35ae0123da52abacdb06fdbdeab0ca740d
SHA512fe9710e633afa2fa4418fc5ac5783f8476df12553be29966cdf15d433ea22d0d552233d8dfe91f99e6de3e4c1939cf8ba78cb0472363ec807c556b1d74120d67
-
Filesize
487KB
MD5d627dfb4878b72d753621f6a664c8489
SHA11f8e2749254bae4a3d81a3ddf0f6a5bbb74ddc09
SHA2560a6c1b07198450424e65d021208a6c86b765f9c119239b37aa3c6cbb27f75405
SHA512395f6f4155f2b57762f76fc20f5a4cf08dfacc5c535ac363c62e4a0e6aef24eb9ea1ba23cf051df79613b6c0a6822de9060f3783405b990340e1b146dace74f4
-
Filesize
1.0MB
MD5b64edd2477552bc667187b45ffca5fe9
SHA192ad7e15cae7d8970f12f05a4a49470446768771
SHA256f9994eaa8a7a20f5c549e25fc8e3340e62dde215f527302e9f24550a604ef194
SHA512849e4fce3cc82b7a78330ff861b8f9c947f994bacbc87619f9dcbe25e654c1c89b8a143cc208e2cf38c4f25c6158792d100c1d9c0e6a0a875fbb3f7c2100155b
-
Filesize
489KB
MD5085c168cdace2740aaf3d3f10d954b49
SHA10c9787d4f4dcc496bf97b44af31a346bc4da7468
SHA25617793411dd0a5040619727835de72e638be72fcf3e765eab965080f89b36b5bc
SHA512d78ca9e4e0fbe418cb8a7f3a03c571944cf82c08d7aece7da474f6f4c00032270f3820685581cabb5bcdf0a1c18cf6caf55fc7d98ed5d0d08374952e6e500b76
-
Filesize
540KB
MD5444d9e6ca21310a1e00273cd25c16010
SHA13ee49d922276750f7da0e78edfd65d84b98a449e
SHA2564126cb8fc7e7971d6256b667c63afb2469de39b6c6fdfe292f34ff22c661008d
SHA5123d29fd293ae1782190393952c4cdaa69e23460c5eac4ae069d10264d288e88f0dbcb6a316c1dfd0c44fb4823788d2dcfbb2d739fb671f2ed9735506c6447f422
-
Filesize
637KB
MD5b3a2a57ca160a7da097a73e38ec3dcb4
SHA10352eef04fe4774d9617a36de2da9bfb1b2cfe2c
SHA2563da196b84d77a8486fbde96766e08853c3a427d15953b9dc52f34099ff632469
SHA5129425a6e4d4d7b9ef63e9589ae9e2aeec372254e542c099e97ef11b4a07adeebabedc57fc040c7e837db329422de3616705c294ae5d1ec198975178284d0d377b
-
Filesize
2.0MB
MD5c5d0311bd2e4e95975d9897c481cbd16
SHA167b59d2ae65dd3821365a10fca7787f971514f7a
SHA256878c4919edebf30b9e1f7be587c5f949bd31c5487395d9df04b031a58896ff4b
SHA512e9e7c572fa320e9f2c2d464b464cb314fedd7c802d0a9280ab6f4136682640e7ddd10fd33391f202e52a756f65610c943faab1af11ef29e50e55a25ef92758ae
-
Filesize
641KB
MD58895430c94d423774f939d8d16ca5cc7
SHA1cba3bbb51b96af6275cdee3efb0c51b5e2d2d657
SHA25648084a614e97c54eadd522c6e2cbef06ec67c6c371c533b44150bc6b7f003120
SHA512d292ce745a141cb4d760fbbaaff3885f88baa61c258dffd5ce15fcd24234c622ddbbc342eae97ae422a4c3a323b0095097eeeff439d9c3b828e128927072ed5c