Analysis
-
max time kernel
154s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
51ec6784a1c6d03d7aaf1872a55cee1b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51ec6784a1c6d03d7aaf1872a55cee1b.exe
Resource
win10v2004-20231215-en
General
-
Target
51ec6784a1c6d03d7aaf1872a55cee1b.exe
-
Size
71KB
-
MD5
51ec6784a1c6d03d7aaf1872a55cee1b
-
SHA1
6f305f02b7f2dec71d0011403c223230a2e66a2d
-
SHA256
034fb9dbc4e2fc22b196f423ce029d04aef18ffa82c1846f1fccab5e2ff49323
-
SHA512
76e3f619f014a018c40192b15567791d1453c020a35031913e04e7e5f93bef2e7f4b53b58aa359cadbb60f0031b83d7f5fb7789b439dcff54085f178592de5f1
-
SSDEEP
1536:zSQ3T6PLqchtIpYFK4Y8un5iVqxEG8GTgE:zSW6PLqcfXu5iYFgE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,sys.exe" 51ec6784a1c6d03d7aaf1872a55cee1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe shell.exe" 51ec6784a1c6d03d7aaf1872a55cee1b.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 51ec6784a1c6d03d7aaf1872a55cee1b.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" 51ec6784a1c6d03d7aaf1872a55cee1b.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\blank = "C:\\Windows\\system32\\blank.htm" 51ec6784a1c6d03d7aaf1872a55cee1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vxds = "C:\\Windows\\vxds.exe" 51ec6784a1c6d03d7aaf1872a55cee1b.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hlps = "C:\\Windows\\Help\\hlps.exe" 51ec6784a1c6d03d7aaf1872a55cee1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\blank = "C:\\Windows\\system32\\blank.htm" 51ec6784a1c6d03d7aaf1872a55cee1b.exe -
Modifies WinLogon 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LogonPrompt = "[Day of judgment]" 51ec6784a1c6d03d7aaf1872a55cee1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Welcome = "[Antichrist]" 51ec6784a1c6d03d7aaf1872a55cee1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "[Antichrist]" 51ec6784a1c6d03d7aaf1872a55cee1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "[Day of judgment]" 51ec6784a1c6d03d7aaf1872a55cee1b.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf 51ec6784a1c6d03d7aaf1872a55cee1b.exe File created C:\autorun.inf 51ec6784a1c6d03d7aaf1872a55cee1b.exe File opened for modification F:\autorun.inf 51ec6784a1c6d03d7aaf1872a55cee1b.exe File created F:\autorun.inf 51ec6784a1c6d03d7aaf1872a55cee1b.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\blank.htm 51ec6784a1c6d03d7aaf1872a55cee1b.exe File opened for modification C:\Windows\SysWOW64\sys.exe 51ec6784a1c6d03d7aaf1872a55cee1b.exe File created C:\Windows\SysWOW64\sys.exe 51ec6784a1c6d03d7aaf1872a55cee1b.exe File opened for modification C:\Windows\SysWOW64\OEMLOGO.BMP 51ec6784a1c6d03d7aaf1872a55cee1b.exe File created C:\Windows\SysWOW64\OEMLOGO.BMP 51ec6784a1c6d03d7aaf1872a55cee1b.exe File opened for modification C:\Windows\SysWOW64\OEMINFO.INI 51ec6784a1c6d03d7aaf1872a55cee1b.exe File created C:\Windows\SysWOW64\OEMINFO.INI 51ec6784a1c6d03d7aaf1872a55cee1b.exe File opened for modification C:\Windows\SysWOW64\blank.htm 51ec6784a1c6d03d7aaf1872a55cee1b.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\media\wma.exe 51ec6784a1c6d03d7aaf1872a55cee1b.exe File created C:\Windows\media\wma.exe 51ec6784a1c6d03d7aaf1872a55cee1b.exe File opened for modification C:\Windows\shell.exe 51ec6784a1c6d03d7aaf1872a55cee1b.exe File created C:\Windows\shell.exe 51ec6784a1c6d03d7aaf1872a55cee1b.exe File opened for modification C:\Windows\vxds.exe 51ec6784a1c6d03d7aaf1872a55cee1b.exe File created C:\Windows\vxds.exe 51ec6784a1c6d03d7aaf1872a55cee1b.exe File opened for modification C:\Windows\Help\hlps.exe 51ec6784a1c6d03d7aaf1872a55cee1b.exe File created C:\Windows\Help\hlps.exe 51ec6784a1c6d03d7aaf1872a55cee1b.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Microsoft\Internet Explorer\Main 51ec6784a1c6d03d7aaf1872a55cee1b.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "C:\\Windows\\system32\\blank.htm" 51ec6784a1c6d03d7aaf1872a55cee1b.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "Microsoft Internet Explorer [Day of judgment]" 51ec6784a1c6d03d7aaf1872a55cee1b.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "C:\\Windows\\system32\\blank.htm" 51ec6784a1c6d03d7aaf1872a55cee1b.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Colors 51ec6784a1c6d03d7aaf1872a55cee1b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Colors\Background = "155 255 155" 51ec6784a1c6d03d7aaf1872a55cee1b.exe -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 51ec6784a1c6d03d7aaf1872a55cee1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveAutoRun = "0" 51ec6784a1c6d03d7aaf1872a55cee1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "149" 51ec6784a1c6d03d7aaf1872a55cee1b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\51ec6784a1c6d03d7aaf1872a55cee1b.exe"C:\Users\Admin\AppData\Local\Temp\51ec6784a1c6d03d7aaf1872a55cee1b.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies data under HKEY_USERS
- System policy modification
PID:2936
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD551ec6784a1c6d03d7aaf1872a55cee1b
SHA16f305f02b7f2dec71d0011403c223230a2e66a2d
SHA256034fb9dbc4e2fc22b196f423ce029d04aef18ffa82c1846f1fccab5e2ff49323
SHA51276e3f619f014a018c40192b15567791d1453c020a35031913e04e7e5f93bef2e7f4b53b58aa359cadbb60f0031b83d7f5fb7789b439dcff54085f178592de5f1