Analysis
-
max time kernel
40s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 15:48
Static task
static1
Behavioral task
behavioral1
Sample
496519ad6523cc81aa1efbf4b1734d8c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
496519ad6523cc81aa1efbf4b1734d8c.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
496519ad6523cc81aa1efbf4b1734d8c.exe
-
Size
112KB
-
MD5
496519ad6523cc81aa1efbf4b1734d8c
-
SHA1
d0884a6fbbfdfdb96ecd2351f9abfa3b6d723070
-
SHA256
15ed32b98b1cf1ac0ab96d743fa07cd954d99d8f5c487ccd81b8724cf9bb039b
-
SHA512
958540ae591f8a1db18c5f5baa96d7ccaed9fc15729c49b998b4a36dcc1fcc5ac571f73df5052e74e8ec6a38036d29ea1b3298e50b03e0850d51824465ce8f67
-
SSDEEP
3072:qsUdRra4l0mFlo2pKV9kC44+IraVkpugc42BXR9IR:qsaRZI2pKRt1n
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4008 x2z8.exe -
Executes dropped EXE 2 IoCs
pid Process 3228 x2z8.exe 4008 x2z8.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 x2z8.exe File opened for modification \??\PHYSICALDRIVE0 496519ad6523cc81aa1efbf4b1734d8c.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4364 set thread context of 3552 4364 496519ad6523cc81aa1efbf4b1734d8c.exe 93 PID 3228 set thread context of 4008 3228 x2z8.exe 95 -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "161" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4008 x2z8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2884 LogonUI.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4364 wrote to memory of 3552 4364 496519ad6523cc81aa1efbf4b1734d8c.exe 93 PID 4364 wrote to memory of 3552 4364 496519ad6523cc81aa1efbf4b1734d8c.exe 93 PID 4364 wrote to memory of 3552 4364 496519ad6523cc81aa1efbf4b1734d8c.exe 93 PID 4364 wrote to memory of 3552 4364 496519ad6523cc81aa1efbf4b1734d8c.exe 93 PID 4364 wrote to memory of 3552 4364 496519ad6523cc81aa1efbf4b1734d8c.exe 93 PID 3552 wrote to memory of 3228 3552 496519ad6523cc81aa1efbf4b1734d8c.exe 94 PID 3552 wrote to memory of 3228 3552 496519ad6523cc81aa1efbf4b1734d8c.exe 94 PID 3552 wrote to memory of 3228 3552 496519ad6523cc81aa1efbf4b1734d8c.exe 94 PID 3228 wrote to memory of 4008 3228 x2z8.exe 95 PID 3228 wrote to memory of 4008 3228 x2z8.exe 95 PID 3228 wrote to memory of 4008 3228 x2z8.exe 95 PID 3228 wrote to memory of 4008 3228 x2z8.exe 95 PID 3228 wrote to memory of 4008 3228 x2z8.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\496519ad6523cc81aa1efbf4b1734d8c.exe"C:\Users\Admin\AppData\Local\Temp\496519ad6523cc81aa1efbf4b1734d8c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\496519ad6523cc81aa1efbf4b1734d8c.exe"C:\Users\Admin\AppData\Local\Temp\496519ad6523cc81aa1efbf4b1734d8c.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\x2z8.exeC:\Users\Admin\AppData\Local\Temp\\x2z8.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\x2z8.exe"C:\Users\Admin\AppData\Local\Temp\x2z8.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3996855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70B
MD5702cef231a752c12709f0a5cac7c2c19
SHA1d8ae33d3f88c2c363c4889d346bc362c8381a48c
SHA25605a2c71393974af18e24d9b187b45aedf324c31936b7b00d6aa96d04b767d16b
SHA512feba51a79258eb9b42586f66f6b9f0a3022ab78228f459d4bbef836858d91e3bb816d29c8b83ed7b590cd3db8b44e37fadf25eb576a1672907cc4806dd383521
-
Filesize
112KB
MD5496519ad6523cc81aa1efbf4b1734d8c
SHA1d0884a6fbbfdfdb96ecd2351f9abfa3b6d723070
SHA25615ed32b98b1cf1ac0ab96d743fa07cd954d99d8f5c487ccd81b8724cf9bb039b
SHA512958540ae591f8a1db18c5f5baa96d7ccaed9fc15729c49b998b4a36dcc1fcc5ac571f73df5052e74e8ec6a38036d29ea1b3298e50b03e0850d51824465ce8f67