Analysis

  • max time kernel
    144s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2024, 08:43

General

  • Target

    501b91f7b30ebfb7eca2b667782a9190.exe

  • Size

    683KB

  • MD5

    501b91f7b30ebfb7eca2b667782a9190

  • SHA1

    f2375556030d6e25131649656987a2597bf2f46b

  • SHA256

    aca843d8c6254ba5489ba287518c32aaa5e15fa09f6ed4743b9ff95a23cd89ca

  • SHA512

    e9dc0e746776b03db33770faf8fc32c161b65bbcac0cb91b2cc50ac937b640146062b6070f582f938a334d0dce296895a0a34fc173603403d3f0c209deecc2bb

  • SSDEEP

    12288:A7NFMjqZfMcER1rmuRW3yYW8SW0ZD3nOBi:ApFMjqXER1rmuRW31W8SWoO

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Blocks application from running via registry modification 3 IoCs

    Adds application to list of disallowed applications.

  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs 18 IoCs
  • Modifies system executable filetype association 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Control Panel 1 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • System policy modification 1 TTPs 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\501b91f7b30ebfb7eca2b667782a9190.exe
    "C:\Users\Admin\AppData\Local\Temp\501b91f7b30ebfb7eca2b667782a9190.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Blocks application from running via registry modification
    • Disables RegEdit via registry modification
    • Sets file execution options in registry
    • Modifies system executable filetype association
    • Checks whether UAC is enabled
    • Modifies WinLogon
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:4040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads