Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
5bc6866916618eb5090feb4d170a29b0.exe
Resource
win7-20231215-en
General
-
Target
5bc6866916618eb5090feb4d170a29b0.exe
-
Size
705KB
-
MD5
5bc6866916618eb5090feb4d170a29b0
-
SHA1
7c1deddba70d5ea6c13c2d5b118ce333484800f3
-
SHA256
ba8a1667e1b5358bab2510a223e6857a2614b40360685203998909bbbe614771
-
SHA512
dac175fe4ab74ac19d1154822464a639bf882ef78c593088e78a5ef0ce752747a37652fc3b5c9134fd819f4082df7b331095fec9264ac3ebda2edca09ecd2bf2
-
SSDEEP
12288:1DJnJM4OpSpnO8kTtlTfDxu2h044JB4WOFHXgv4+3otO:NJnJM4OqTWLA2aJzOlXu
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 6 IoCs
pid Process 2636 alg.exe 2660 DiagnosticsHub.StandardCollector.Service.exe 2508 fxssvc.exe 4968 elevation_service.exe 3272 maintenanceservice.exe 2296 msdtc.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-635608581-3370340891-292606865-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-635608581-3370340891-292606865-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: alg.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\G: alg.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\K: alg.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\H: alg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe File opened for modification \??\c:\windows\system32\snmptrap.exe 5bc6866916618eb5090feb4d170a29b0.exe File created \??\c:\windows\system32\dkfkckcd.tmp 5bc6866916618eb5090feb4d170a29b0.exe File created \??\c:\windows\system32\mjonigbp.tmp 5bc6866916618eb5090feb4d170a29b0.exe File created \??\c:\windows\system32\pjjphjbh.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe alg.exe File created \??\c:\windows\system32\aqkpjmgo.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\searchindexer.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\fxssvc.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File created \??\c:\windows\system32\openssh\kbmqlcjm.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe 5bc6866916618eb5090feb4d170a29b0.exe File created \??\c:\windows\system32\mbfcipcd.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File created \??\c:\windows\system32\hlbgjmnp.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\dllhost.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe alg.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe 5bc6866916618eb5090feb4d170a29b0.exe File created \??\c:\windows\system32\aenmabmh.tmp 5bc6866916618eb5090feb4d170a29b0.exe File created \??\c:\windows\system32\lkkqefbo.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\alg.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\vds.exe alg.exe File created \??\c:\windows\system32\inidaicl.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe 5bc6866916618eb5090feb4d170a29b0.exe File created \??\c:\windows\system32\ofiioeff.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\system32\lsass.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe alg.exe File created \??\c:\windows\system32\ioqlkhno.tmp 5bc6866916618eb5090feb4d170a29b0.exe File created \??\c:\windows\system32\neacqaak.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\vds.exe 5bc6866916618eb5090feb4d170a29b0.exe File created \??\c:\windows\system32\nlnkabcp.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\msiexec.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\spectrum.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\Agentservice.exe 5bc6866916618eb5090feb4d170a29b0.exe File created \??\c:\windows\system32\diagsvcs\onppakbi.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File opened for modification \??\c:\windows\system32\wbengine.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File created \??\c:\windows\system32\perceptionsimulation\lajleiko.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\locator.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\wbengine.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe File created \??\c:\windows\syswow64\cjghdmnc.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File opened for modification \??\c:\windows\system32\vssvc.exe 5bc6866916618eb5090feb4d170a29b0.exe File created \??\c:\windows\system32\wbem\palffkqo.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe alg.exe File created \??\c:\windows\system32\odkokbol.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\windows\system32\svchost.exe 5bc6866916618eb5090feb4d170a29b0.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File created C:\Program Files\7-Zip\cedpmnkl.tmp alg.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe alg.exe File created C:\Program Files\7-Zip\gkooamha.tmp alg.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File created \??\c:\program files (x86)\mozilla maintenance service\fimdnncn.tmp alg.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File created C:\Program Files\7-Zip\jgpijieg.tmp alg.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe alg.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe alg.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\alfmmiih.tmp 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe 5bc6866916618eb5090feb4d170a29b0.exe File created \??\c:\program files\google\chrome\Application\106.0.5249.119\glnglfik.tmp alg.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File created C:\Program Files\7-Zip\nccafaqk.tmp alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File created \??\c:\program files\windows media player\afncgcka.tmp 5bc6866916618eb5090feb4d170a29b0.exe File created \??\c:\program files\common files\microsoft shared\source engine\cpmemiag.tmp alg.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe 5bc6866916618eb5090feb4d170a29b0.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe 2636 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3156 5bc6866916618eb5090feb4d170a29b0.exe Token: SeTakeOwnershipPrivilege 2636 alg.exe Token: SeAuditPrivilege 2508 fxssvc.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bc6866916618eb5090feb4d170a29b0.exe"C:\Users\Admin\AppData\Local\Temp\5bc6866916618eb5090feb4d170a29b0.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2636
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:2660
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4504
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4968
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3272
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5303c342acd02f46efc8e5f5f3a0fa500
SHA11141d2b4afd3200ca02ca560dbdbadf73282a4ba
SHA256e9a68fce2e53f026aee68e53165635e709aacef93bfa326e31cce0cfef53133e
SHA512ae4fa51bf351116f5adedda493236227d480c8132bd9dd7fe96321ce70376b47351953892553d9e59e169ba744a465ffd7bc57f410c62edf9374c65dbd4c8fde
-
Filesize
2.0MB
MD5f5c893a80dfc27cf75b0abce497fe8b8
SHA1379e3e6fc2d97c317219d2ce07462e081d016e5f
SHA256740d5f4a1544dd9642e4771e4d4ff5c18bcad3cd95005dbce59e6c5926d2b59e
SHA5120130baa1a2d0225527533cc780705af1622f7016d8c60ffb4626623a0963af7bbddd1bff3e889d5296f6e4dca95c5c823a6d8e17642bb15f0096b9bd260ada1f
-
Filesize
678KB
MD5ca613461ef9795578e5ae558e01977b4
SHA1cb1f0165bec496044400b8c1288c7c57c318fd68
SHA2562f6f072d0544e026ecd9772f1d5b53b610d011887c08e74a987659c73265b09a
SHA51254c210d9297af8dc2af5d35bbc5fe8dc27a4fd4ae8690576c9b2f2ef0247fd2c7b81f46d159423396984d1617d37a50a77f551647bad1edd47b9aa30bbf5bc89
-
Filesize
487KB
MD57089e1d8a9533e6f61ebc88f94db67c5
SHA1efe6f9af6ab468d06c8fac2e77be93e9b340e3e0
SHA256b97fb503a5ffd8868ce7c70f28c9634a28f064b3dbd206b829db7143b9953f65
SHA512125a3d7428c09b5b83bdab8de68123c9b3ee2dc8375b07243df01e5586cff98d18b160a8135daeced6b680bb90b89aa488e6052dd37728d8e61cd59a7447b02a
-
Filesize
1.0MB
MD5d38892ee29dab4c0bc8c5d5a20517ccd
SHA1213c546ab1e6a584c6dadc2c0e369246c3abc7e3
SHA2569ba7428427564a44fae7ffff362da883e65f28e485323608ec682dd1314787f4
SHA512404379006020f0cdb9f83d10c13eb4ef90d73912be4bdaf7080746687f9903578921704c447cb952f3775b3556cd3c7a09fb788bf011b1ce0724963b0a49e789
-
Filesize
489KB
MD5c2cf5c65b685d913a7a6f2789f449745
SHA135f142316d005212a7576330db440bcf207acf0f
SHA256cecf63cf013480e6c8301af74878bbe5774d1df96419d6f15d77bc64d37a8966
SHA512ebc4c6c761a2a7243edb99db5f47f88b6dc4a046ae263c7d713f31b11f87193631d888d6bf18420c29b6dd77b7259a5cdbcaa368b8495778202eb6cc9be06286
-
Filesize
540KB
MD5e92bca52d9a31701444662aba7a0b131
SHA1996fde48c31011834c4034058ced69e92b401c48
SHA256c765c34c413677fc2b7d156cbdc84bc161fb0521931ffedf6a0b0dad489e263e
SHA512c3d88ac39c35db505730ef23ba0c330bcbb9bfb3c53f268b22ce2692af3900b0db02df020f39be7d6e689c8593017d0a73910c2ea566b33825ec7c1e44828612
-
Filesize
613KB
MD51448196aafd62d4a48e070d5f23af7c6
SHA180f1290422aa350a3d291c32e66eabcd950e4d5a
SHA256faa97b18a2ad989db4677a90b7cf9767f5dae228813580007bb67e8999b4719a
SHA512a003f5acf7b0490ea10390f5c4f0add81feafa94326fa7c206a1b28d9be7e2a262f2aa3c20ee7be1ce78131c0041a0f393d9d29fd33735c96df6f83608af5557
-
Filesize
637KB
MD572c252cd38291d28cec4e23d1c8389ee
SHA11ee92c88dac03585adf78e7a8d3d21d1c65e68e9
SHA256d8edc5e700a166c2c1a5882d412e22aded88df4545baa6d0afbda202ea0f82ec
SHA51234cab947cfae0587c09e7ae01fe01a35827e035d80705817326e2faa2922b6256d4be07eecce5e93ac183870ec5a7c796cf90babcc3fd9ed79ca58cc61cf288f
-
Filesize
1.1MB
MD59c5b2fa0df2c7cd8a7c37d8d95a1278c
SHA12f72be600385b197d200c7cf68ea609ebe151c94
SHA2567d084787e444ae4bebbf48c1fc1d9e2caf4025244a31da8cc8f2b8f06a49b649
SHA512e996dc8642212529fc433cf42b78099bffb9c72552ecdb38689d2e2b322e4dbf5bff39a386e261d5caf531aee8ec68790d4b98a50e534595715627e1d1c955b8