Analysis
-
max time kernel
159s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
581a98416ef59c1897c80375ac7cc5da.exe
Resource
win7-20231215-en
General
-
Target
581a98416ef59c1897c80375ac7cc5da.exe
-
Size
668KB
-
MD5
581a98416ef59c1897c80375ac7cc5da
-
SHA1
572c9b667bcb7afadff147e0010630b213cbfa66
-
SHA256
ebb710170635554d4b9ce77873ff341916db87a41f5981830b323c69c2afb736
-
SHA512
d5b37eeb95827b2701f15793785f3283ce700ed995e55e9dce4852ff73e0920622e70dd952ab9fad6d8882b1acdecc40a50a65c5503b6be7640f6c75d421dd1a
-
SSDEEP
12288:FeBNUbTVO86UyIR4YhoCHQtXR7/qt1Mp5O/AbSxDefR66jUKCQiMPj:FJIUyGzhowQL7CYgAbWCUKCQimj
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 8 IoCs
pid Process 4940 alg.exe 4552 DiagnosticsHub.StandardCollector.Service.exe 2824 fxssvc.exe 4420 elevation_service.exe 3456 elevation_service.exe 4056 maintenanceservice.exe 2852 msdtc.exe 3184 msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-635608581-3370340891-292606865-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-635608581-3370340891-292606865-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: alg.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\K: alg.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\R: alg.exe -
Drops file in System32 directory 44 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\tieringengineservice.exe alg.exe File created \??\c:\windows\system32\qegccabc.tmp 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File created \??\c:\windows\system32\hajgijeo.tmp 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\system32\fxssvc.exe alg.exe File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\system32\lsass.exe 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\system32\fxssvc.exe 581a98416ef59c1897c80375ac7cc5da.exe File created \??\c:\windows\syswow64\akqgedna.tmp 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\system32\svchost.exe 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe File opened for modification \??\c:\windows\system32\vds.exe alg.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File opened for modification \??\c:\windows\system32\msdtc.exe 581a98416ef59c1897c80375ac7cc5da.exe File created \??\c:\windows\system32\ladefmpd.tmp 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\system32\alg.exe 581a98416ef59c1897c80375ac7cc5da.exe File created \??\c:\windows\system32\nbmmcbbg.tmp 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\system32\dllhost.exe 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe alg.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File opened for modification \??\c:\windows\system32\Appvclient.exe 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe alg.exe File created \??\c:\windows\system32\diagsvcs\nlhcbejk.tmp 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File opened for modification \??\c:\windows\system32\wbengine.exe alg.exe File created \??\c:\windows\system32\goeedece.tmp 581a98416ef59c1897c80375ac7cc5da.exe File created \??\c:\windows\system32\perceptionsimulation\kdogikbb.tmp 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\windows\system32\locator.exe 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe alg.exe File created \??\c:\program files (x86)\mozilla maintenance service\lfakclbh.tmp alg.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe 581a98416ef59c1897c80375ac7cc5da.exe File created \??\c:\program files\common files\microsoft shared\source engine\cpckhnhj.tmp alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\dgemlgef.tmp alg.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe 581a98416ef59c1897c80375ac7cc5da.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe alg.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe alg.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe alg.exe File created \??\c:\program files\google\chrome\Application\106.0.5249.119\fadjidqc.tmp alg.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe 581a98416ef59c1897c80375ac7cc5da.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe 581a98416ef59c1897c80375ac7cc5da.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe 4940 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 672 Process not Found 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3668 581a98416ef59c1897c80375ac7cc5da.exe Token: SeTakeOwnershipPrivilege 4940 alg.exe Token: SeAuditPrivilege 2824 fxssvc.exe Token: SeSecurityPrivilege 3184 msiexec.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\581a98416ef59c1897c80375ac7cc5da.exe"C:\Users\Admin\AppData\Local\Temp\581a98416ef59c1897c80375ac7cc5da.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4940
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:4552
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3660
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4420
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3456
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4056
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2852
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD5d02af8c66ac34170bb63fd284c72db52
SHA1399b2af0f5720e7275af8a8b14e29ed20587ee87
SHA256580a149df296fb9d1fbc30ea33141ac140008fd09c617ea4dadf71a4df681d53
SHA51223afc0265df130751a03b36715d922fca84d1145e843518cd2b245dae8a851ce62a89541991ab6a7b880d6276c6686b1126e3a992e2b3b11ac8abe30b1cad855
-
Filesize
367KB
MD516e84cfcff8d47e944e022ca1f3d22cd
SHA1c308f5341cc78d903093f13c236b877cb56aa791
SHA2568f94c23ba5c93979fad10a0deb5955bb0255c8cdec33febdfb757d62944b824b
SHA512545f6f99d490f2387cb6dcf3864bf21e2445d2fa3cc22cb1b835b66c19a2727699dce7f056b1d698333b7e25812bdbdfcdf1a9c7974ce9ca679bd91d6905689d
-
Filesize
12KB
MD5e04a1fac943d1d1451360bcf59caf9d8
SHA17c3baa67704351c00980d9a9a736be28118099b5
SHA256c07112a18205bbd8a3acc1f5defbb49d7e503b4803ab413e53e84a1bfeea3517
SHA512eaaa2ca2dd765520ec35d63ec20f60187b20fc7845384bf39555db155e956c8f47fb3f72828089396c8a3b299cfd4c3107acb474b5e49b48771031ca4f4a9fbe
-
Filesize
2.0MB
MD5964fb26966c379d0d77f790662b9040e
SHA1b29b23a518c8602079d6f71686f39dfbe8e98927
SHA2569706626143688c9cf5c036bfed4412660f1aeaa9b3171c7a4434afe222652ad9
SHA512dc739e3ffd09c25b6f06f243202ba2f24cf94cbfb82a8ee65aa8b97ae9a07a003ff1fb544fb7a08d7f2f03778cdc2039880a83f967afa646fc9bcd96b6389c3d
-
Filesize
678KB
MD5957a03ace3469a5131b32ecfbb861cde
SHA10872a6fa6a183d1f955e8b69b0be099afa72f38d
SHA256dc2df07a43f6f51ca88325e5919c28a25ce2b346850a550ab9550e71b7d1f5f7
SHA512da15e3b713ed65bc0535a0b698d5c1a1fd5795eb0989ab1f0289c55eafb2743b9635252fa3b1cd5c5092afeb09e4d4db7701a1d0d4ccd8fd81b8cf4363421e09
-
Filesize
483KB
MD566ffb2ac37537cd9460dd5c6b98d14b7
SHA13c13e2984aeb7388059d8f1004f7af0e51bf87b5
SHA2561001ddd6f7eef54fa11205757772dae7833bb6e4dfb6341aeb284abe712312ab
SHA51260f3b4c9eb8ce9749811829d04fb12bc04f848195ae7cd2aae727148bc11097c4093bd589db1885bd64a27c947e33f45f0fdef9a62b3fd5e0d4104b449155813
-
Filesize
1.0MB
MD5d990be091746faaf1cba51c09b4f2616
SHA12cab41775591d253a4f65cae4df7f0ac9fb5f324
SHA256cc142cafe04311203f30431c9a7d29287bdad24527525feaeb53de851fde95ef
SHA512b7a1cd3855ba9e25abcf218caacca0a65996ad9811db1fad8231b4fd0f49ab45395a869bfaf12137b79f3de71528add4955c6c55d1394ac0cbb7e301c123b80d
-
Filesize
485KB
MD585e353de7ccb3b81268095bd60a6c0c8
SHA1f42b1bf9eac140c725eed8fe4276126421905674
SHA25692f043aeec514deaa0f123513947615d46212f8d4a4c1180032264594d05e002
SHA512ac21cdd8901a118341d76f40c2a21d5d2204aaefe98554cae43b785824fc4c1db9e3551f3e53aea1925088d00a49a36a49a6f006a9e1fe7debde51b7d09eab3b
-
Filesize
536KB
MD5c0bb8fe91787545d764590ebc4b0a972
SHA19f49dd3ee55496b936d4ab845975aa2f8493281d
SHA25629f604d63d3ed7854ab72d2d7166120dcf196c3192f20bd625ee27d728d21548
SHA5129dc3bf0576ede3baf7f58a002dc9031d506fa6b37d8fbd12f4bf379185db2cd95c14d5e36a70dc9add68b8563bf059c2eb1bfc4153b8a882ad682399460a03b2
-
Filesize
459KB
MD53de376ce329d7a672f8d2250b4261e20
SHA1e38fd060c91641b32bab287f4ad22694547eb731
SHA256daf3699af983e2a25d711d9dbaca48ef04956109de205f41e99be15f18dc5a24
SHA5128891f26a563738a64483589e7066020797b4cd66555f3f86b5794a366c1adf56384a87fed13824d0f9665b7b4b92b3a170bdc3ed33b8813973c5c1f3e314cb8e
-
Filesize
1.9MB
MD5973b288ccf24b58aabc0dc4457dcfe85
SHA192d49101c2bc99f5edb6e213819616b4337a69e2
SHA256736d7b57e2576e21da12d2a705cc867bebbdaef9742c693be58d163435befff4
SHA512c28fc28b8567e350e79bb08b3ac7982167cd86578c24f5df8015a2f3fe6b9dc53a1660495889cb6c58fde54041151ee81478590984a78f7fa2d378446a68a971
-
Filesize
609KB
MD58c9299b03e9bc26d9b3aefab559b9640
SHA17e897481a672acff83f6c5d3ee4b1c72918195f9
SHA2561fa1552979bd7464d88ee66b0ccfb3f0e25a006c737a1c2c17ae11a1bd53fd5f
SHA512ad583c37f0d1533d13e5cd44730dd03ac06d513cf9c42b6b5694eb9a35e0bbf52ef594c82b77699a5195aaf00efb01f3049c0ce3dc7a3cd0cf3aae0e6a0df9b4
-
Filesize
633KB
MD5eb1f140dec7ebf3f25433d3d3f2fb4c4
SHA138b45a7ecf5bc30c03d2a69835103e0a884bd721
SHA2561099cc890ec37c9c28af50b8f36310014133dc2866e9499ab37bcd805a605ba3
SHA512c03c63fd66175b1527b47010667b3b38bec57caf05079d8e5e1c1711a1493edf1f030efc2fe1788a6116ebce64bc1108baf4fa6dc0fcc5578a38e6044da68663
-
Filesize
869KB
MD56696976ea1e68c04f83346f2ced64984
SHA1fc53e57aa060ac503a25e885a019a08d3dc1ddc4
SHA2568af656ce18a0d106565a40b70d7457fae7e5defca2ef074b5a3c935a7a1b59ae
SHA5129ea71548b8a3bb98eefcf772cb30a58ac5c1f3c73ac283a45876c2ef1a15075267866381813f8c6c7169b26e415360c5a6a78ce013e3fdb599367340b88e3e94