Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/01/2024, 01:25

General

  • Target

    5bc6866916618eb5090feb4d170a29b0.exe

  • Size

    705KB

  • MD5

    5bc6866916618eb5090feb4d170a29b0

  • SHA1

    7c1deddba70d5ea6c13c2d5b118ce333484800f3

  • SHA256

    ba8a1667e1b5358bab2510a223e6857a2614b40360685203998909bbbe614771

  • SHA512

    dac175fe4ab74ac19d1154822464a639bf882ef78c593088e78a5ef0ce752747a37652fc3b5c9134fd819f4082df7b331095fec9264ac3ebda2edca09ecd2bf2

  • SSDEEP

    12288:1DJnJM4OpSpnO8kTtlTfDxu2h044JB4WOFHXgv4+3otO:NJnJM4OqTWLA2aJzOlXu

Malware Config

Signatures

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bc6866916618eb5090feb4d170a29b0.exe
    "C:\Users\Admin\AppData\Local\Temp\5bc6866916618eb5090feb4d170a29b0.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3156
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:2636
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Executes dropped EXE
    PID:2660
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:4504
    • C:\Windows\system32\fxssvc.exe
      C:\Windows\system32\fxssvc.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2508
    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:4968
    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
      "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:3272
    • C:\Windows\System32\msdtc.exe
      C:\Windows\System32\msdtc.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:2296

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

            Filesize

            1.9MB

            MD5

            303c342acd02f46efc8e5f5f3a0fa500

            SHA1

            1141d2b4afd3200ca02ca560dbdbadf73282a4ba

            SHA256

            e9a68fce2e53f026aee68e53165635e709aacef93bfa326e31cce0cfef53133e

            SHA512

            ae4fa51bf351116f5adedda493236227d480c8132bd9dd7fe96321ce70376b47351953892553d9e59e169ba744a465ffd7bc57f410c62edf9374c65dbd4c8fde

          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\glnglfik.tmp

            Filesize

            2.0MB

            MD5

            f5c893a80dfc27cf75b0abce497fe8b8

            SHA1

            379e3e6fc2d97c317219d2ce07462e081d016e5f

            SHA256

            740d5f4a1544dd9642e4771e4d4ff5c18bcad3cd95005dbce59e6c5926d2b59e

            SHA512

            0130baa1a2d0225527533cc780705af1622f7016d8c60ffb4626623a0963af7bbddd1bff3e889d5296f6e4dca95c5c823a6d8e17642bb15f0096b9bd260ada1f

          • C:\Users\Admin\AppData\Local\enbkqjfq\dndnnmqo.tmp

            Filesize

            678KB

            MD5

            ca613461ef9795578e5ae558e01977b4

            SHA1

            cb1f0165bec496044400b8c1288c7c57c318fd68

            SHA256

            2f6f072d0544e026ecd9772f1d5b53b610d011887c08e74a987659c73265b09a

            SHA512

            54c210d9297af8dc2af5d35bbc5fe8dc27a4fd4ae8690576c9b2f2ef0247fd2c7b81f46d159423396984d1617d37a50a77f551647bad1edd47b9aa30bbf5bc89

          • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

            Filesize

            487KB

            MD5

            7089e1d8a9533e6f61ebc88f94db67c5

            SHA1

            efe6f9af6ab468d06c8fac2e77be93e9b340e3e0

            SHA256

            b97fb503a5ffd8868ce7c70f28c9634a28f064b3dbd206b829db7143b9953f65

            SHA512

            125a3d7428c09b5b83bdab8de68123c9b3ee2dc8375b07243df01e5586cff98d18b160a8135daeced6b680bb90b89aa488e6052dd37728d8e61cd59a7447b02a

          • C:\Windows\System32\FXSSVC.exe

            Filesize

            1.0MB

            MD5

            d38892ee29dab4c0bc8c5d5a20517ccd

            SHA1

            213c546ab1e6a584c6dadc2c0e369246c3abc7e3

            SHA256

            9ba7428427564a44fae7ffff362da883e65f28e485323608ec682dd1314787f4

            SHA512

            404379006020f0cdb9f83d10c13eb4ef90d73912be4bdaf7080746687f9903578921704c447cb952f3775b3556cd3c7a09fb788bf011b1ce0724963b0a49e789

          • C:\Windows\System32\alg.exe

            Filesize

            489KB

            MD5

            c2cf5c65b685d913a7a6f2789f449745

            SHA1

            35f142316d005212a7576330db440bcf207acf0f

            SHA256

            cecf63cf013480e6c8301af74878bbe5774d1df96419d6f15d77bc64d37a8966

            SHA512

            ebc4c6c761a2a7243edb99db5f47f88b6dc4a046ae263c7d713f31b11f87193631d888d6bf18420c29b6dd77b7259a5cdbcaa368b8495778202eb6cc9be06286

          • C:\Windows\System32\msdtc.exe

            Filesize

            540KB

            MD5

            e92bca52d9a31701444662aba7a0b131

            SHA1

            996fde48c31011834c4034058ced69e92b401c48

            SHA256

            c765c34c413677fc2b7d156cbdc84bc161fb0521931ffedf6a0b0dad489e263e

            SHA512

            c3d88ac39c35db505730ef23ba0c330bcbb9bfb3c53f268b22ce2692af3900b0db02df020f39be7d6e689c8593017d0a73910c2ea566b33825ec7c1e44828612

          • \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe

            Filesize

            613KB

            MD5

            1448196aafd62d4a48e070d5f23af7c6

            SHA1

            80f1290422aa350a3d291c32e66eabcd950e4d5a

            SHA256

            faa97b18a2ad989db4677a90b7cf9767f5dae228813580007bb67e8999b4719a

            SHA512

            a003f5acf7b0490ea10390f5c4f0add81feafa94326fa7c206a1b28d9be7e2a262f2aa3c20ee7be1ce78131c0041a0f393d9d29fd33735c96df6f83608af5557

          • \??\c:\program files\common files\microsoft shared\source engine\ose.exe

            Filesize

            637KB

            MD5

            72c252cd38291d28cec4e23d1c8389ee

            SHA1

            1ee92c88dac03585adf78e7a8d3d21d1c65e68e9

            SHA256

            d8edc5e700a166c2c1a5882d412e22aded88df4545baa6d0afbda202ea0f82ec

            SHA512

            34cab947cfae0587c09e7ae01fe01a35827e035d80705817326e2faa2922b6256d4be07eecce5e93ac183870ec5a7c796cf90babcc3fd9ed79ca58cc61cf288f

          • \??\c:\windows\system32\Appvclient.exe

            Filesize

            1.1MB

            MD5

            9c5b2fa0df2c7cd8a7c37d8d95a1278c

            SHA1

            2f72be600385b197d200c7cf68ea609ebe151c94

            SHA256

            7d084787e444ae4bebbf48c1fc1d9e2caf4025244a31da8cc8f2b8f06a49b649

            SHA512

            e996dc8642212529fc433cf42b78099bffb9c72552ecdb38689d2e2b322e4dbf5bff39a386e261d5caf531aee8ec68790d4b98a50e534595715627e1d1c955b8

          • memory/2296-77-0x00007FF7B7EA0000-0x00007FF7B7F82000-memory.dmp

            Filesize

            904KB

          • memory/2296-119-0x00007FF7B7EA0000-0x00007FF7B7F82000-memory.dmp

            Filesize

            904KB

          • memory/2508-40-0x00007FF61CFC0000-0x00007FF61D11F000-memory.dmp

            Filesize

            1.4MB

          • memory/2508-41-0x00007FF61CFC0000-0x00007FF61D11F000-memory.dmp

            Filesize

            1.4MB

          • memory/2636-24-0x00007FF6F8A10000-0x00007FF6F8AE3000-memory.dmp

            Filesize

            844KB

          • memory/2636-76-0x00007FF6F8A10000-0x00007FF6F8AE3000-memory.dmp

            Filesize

            844KB

          • memory/2636-17-0x00007FF6F8A10000-0x00007FF6F8AE3000-memory.dmp

            Filesize

            844KB

          • memory/2660-32-0x00007FF62C8C0000-0x00007FF62C992000-memory.dmp

            Filesize

            840KB

          • memory/2660-92-0x00007FF62C8C0000-0x00007FF62C992000-memory.dmp

            Filesize

            840KB

          • memory/3156-0-0x00007FF631DA0000-0x00007FF631EA9000-memory.dmp

            Filesize

            1.0MB

          • memory/3156-18-0x00007FF631DA0000-0x00007FF631EA9000-memory.dmp

            Filesize

            1.0MB

          • memory/3156-2-0x00007FF631DA0000-0x00007FF631EA9000-memory.dmp

            Filesize

            1.0MB

          • memory/3272-62-0x00007FF7BE0B0000-0x00007FF7BE1A4000-memory.dmp

            Filesize

            976KB

          • memory/3272-64-0x00007FF7BE0B0000-0x00007FF7BE1A4000-memory.dmp

            Filesize

            976KB

          • memory/4968-60-0x00007FF769610000-0x00007FF769865000-memory.dmp

            Filesize

            2.3MB

          • memory/4968-113-0x00007FF769610000-0x00007FF769865000-memory.dmp

            Filesize

            2.3MB