Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
7d9ec704db993d2a34bc61730d5a3023.exe
Resource
win7-20231215-en
General
-
Target
7d9ec704db993d2a34bc61730d5a3023.exe
-
Size
959KB
-
MD5
7d9ec704db993d2a34bc61730d5a3023
-
SHA1
b02f863a3878e68cdd84669bf8f0dbccf7f057fc
-
SHA256
2e2109d0ece8ba9313af565fc3df922b6590520f8f3f41e3babe3a162da1a1b7
-
SHA512
44cde23e18e7d3fada8a18a18e0d37ca3d6b519412ff5d94cffca130323f1becb0e688a26e399d3b5a623cb219162dff652566a92d6431534a3d20b731910e38
-
SSDEEP
24576:MPfAPg+YrPXPWeB7S53Xz33xxhLx2H6DzL7:MXAkrP/WH5nz33xxhV2aDzL
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 8 IoCs
pid Process 3392 alg.exe 1904 DiagnosticsHub.StandardCollector.Service.exe 2632 fxssvc.exe 4004 elevation_service.exe 1372 elevation_service.exe 3636 maintenanceservice.exe 4476 msdtc.exe 3396 msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3073191680-435865314-2862784915-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3073191680-435865314-2862784915-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\K: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\G: alg.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\T: alg.exe -
Drops file in System32 directory 52 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\system32\vds.exe alg.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File created \??\c:\windows\syswow64\geddjpen.tmp 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe 7d9ec704db993d2a34bc61730d5a3023.exe File created \??\c:\windows\system32\perceptionsimulation\nedagnom.tmp 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\svchost.exe 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification \??\c:\windows\system32\dllhost.exe 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe alg.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File created \??\c:\windows\system32\diagsvcs\glomhook.tmp 7d9ec704db993d2a34bc61730d5a3023.exe File created \??\c:\windows\system32\klbpeeaq.tmp 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File opened for modification \??\c:\windows\system32\msdtc.exe 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\snmptrap.exe 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\spectrum.exe 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\fxssvc.exe 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File created \??\c:\windows\system32\bebpdkik.tmp 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\msiexec.exe 7d9ec704db993d2a34bc61730d5a3023.exe File created \??\c:\windows\system32\hmppdijg.tmp 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\lsass.exe 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe alg.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File opened for modification \??\c:\windows\system32\wbengine.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification \??\c:\windows\system32\locator.exe 7d9ec704db993d2a34bc61730d5a3023.exe File created \??\c:\windows\system32\cclpcbba.tmp 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\Appvclient.exe 7d9ec704db993d2a34bc61730d5a3023.exe File created \??\c:\windows\system32\lbepncnn.tmp 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe alg.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe alg.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File created \??\c:\windows\system32\injopbhl.tmp 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\fxssvc.exe alg.exe File created \??\c:\windows\system32\jldgmpci.tmp 7d9ec704db993d2a34bc61730d5a3023.exe File created \??\c:\windows\system32\lfmcgffi.tmp 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\alg.exe 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe File created \??\c:\windows\system32\qjnhlgim.tmp 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created \??\c:\program files (x86)\mozilla maintenance service\mdgphmld.tmp alg.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe alg.exe File created C:\Program Files\7-Zip\jgpijieg.tmp alg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe alg.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe 7d9ec704db993d2a34bc61730d5a3023.exe File created \??\c:\program files\common files\microsoft shared\source engine\fhjipkid.tmp alg.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe 7d9ec704db993d2a34bc61730d5a3023.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\pdnajjpk.tmp alg.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe 7d9ec704db993d2a34bc61730d5a3023.exe File created \??\c:\program files\google\chrome\Application\106.0.5249.119\kldnjboo.tmp alg.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe alg.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe 7d9ec704db993d2a34bc61730d5a3023.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe alg.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe 7d9ec704db993d2a34bc61730d5a3023.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe 7d9ec704db993d2a34bc61730d5a3023.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe 3392 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 664 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3252 7d9ec704db993d2a34bc61730d5a3023.exe Token: SeTakeOwnershipPrivilege 3392 alg.exe Token: SeAuditPrivilege 2632 fxssvc.exe Token: SeSecurityPrivilege 3396 msiexec.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d9ec704db993d2a34bc61730d5a3023.exe"C:\Users\Admin\AppData\Local\Temp\7d9ec704db993d2a34bc61730d5a3023.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3392
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:1904
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3604
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4004
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1372
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3636
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4476
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD516fdd97ee6dadd3241e34d66210ec1af
SHA1801965bf7f3e9471aa7559140cdfe9e6c51f81b8
SHA25614b88a1ff264d15d33e6af568df55301d8e0b029c50a97b7920224fd18151d28
SHA51276bc681000444a8afffc06a9997c389caefe0280ac7e0836bdb14852e5508fa42d99ba61d4e22100890e2adbe04fab63cb2efbb7efdcd3b970506f61d66d0d9a
-
Filesize
678KB
MD5a5e5a03657148581d86ecbdf2416d41c
SHA1bcd9c43f24164976ea68b7be9a02aff497cbba54
SHA256dbb5e10020a608dd738b0655df09e9b78e881217b6850eb41581790f07262f2e
SHA5124fe50ffca8df7cb9780074934ba0526a0211c7b7052fd547195b7b5d0ba4a106bbaf0cdd0033ef66f943de00998056400b6b7709a361f95412200de6ee04a99d
-
Filesize
487KB
MD5257c4912d12515c89a9dc7d2a93e0f4a
SHA1cf17dc29b91f781d8eb3fc2c69dc7d0c5cece1b4
SHA2563703c18cba9928e176e009eead35d5769b14beb0e231dbb1ec5bc076be38304f
SHA5129f9a9874b175e26f035dcfbf2f0f8f829abda8994eaec91f284d218361124cb7106c9e9e4c648644eadf0f38e01b38cf28fa50ac27146b0da0eb327abab92850
-
Filesize
1.0MB
MD54906aabbe8bc48806cb574dbdda7aca4
SHA1b2bd8ff476b8d861525b7221f47370fafc2244cd
SHA256c687035bcf5869fc5d535823d3a786b2124e337798103d2ffa06d489feb0f22b
SHA5126456175e2a6645254da9c5dc3f2b015eec46c71fcf4c3f0842ab426c5d687e74ce382e81be016ea6c88530eb879cb83f922228862c702a4c96271b690883071d
-
Filesize
489KB
MD5a8b337d88eea54e737e29c9c80a49518
SHA158f9ade2e05070dcea3dee14274c2acd108db377
SHA2563fb428160f4361e3abd1dfc46beac000170b25a5ee3b30d516d4006fe6ed72c6
SHA512842e1fec33f835a1379d264d47e598e8a04782bf1aa56d9907ba35c765aa48a50cb12d1c1db24ff5c5f9e1809fc4743861be5dfb55275faa0c980754d8a63474
-
Filesize
540KB
MD5b7da24bef4a61fcd845ce050b66dc929
SHA1a48ea3345dec6d2c7084c95a7e3c2c8320f778e1
SHA256126565463431d53194268cd7dea908c2458ff25208170b1de8387bfa8cddc75c
SHA512298a269b7fad28156c5b681bb1391bc17948f7d53c5fda5cf030c99296a7f288889f1c34d488dd5ed85e40b2a13fa7eb6ad21aecae76800fcdfb81cd00ab9386
-
Filesize
463KB
MD551c5071721e1747406cdc700f1664ad8
SHA1673dbb96b648f3e3ddeeec1db80159b09b290e04
SHA256866259169b62c0890ecf9174a52a03dc0be8fd44a8d35b8caddd06374e996e2c
SHA51226a2a6fcf26e67a55301aa5baaefd11910fc3145dd45dbbb622a01f028fc2b5fe4b8474880970857613aa9844e500db47ef98efab6c1aa83990e3b37e1e0ac83
-
Filesize
1.9MB
MD595d3ce0fd859ed2bafbed47fd3f41fe2
SHA15441f80fff869df725b61911f5b5a6ba267bc6c5
SHA2567f7ecba3f7487df3da9f78ca840075e9f4cfd8826870b493260a5c9713747b4b
SHA51221a8611c30da7cda154180024e068298385799192c6361ccb56cdb27f7e906648718e1ef352e04cbfbd5b7b59bbff6f677b0df4491610330b22a4fa03606fbb9
-
Filesize
613KB
MD5e9e9c7058a60b03e5b5612c32d197aba
SHA1e45919c668753731b92d2bc114900da7f6e09c99
SHA2563cdebce2102a2d97e7ec4d31339c2c7c8506030b90ac8c40b7f96349c06a8bc3
SHA512777240c3183438a6fab3b24fbb68d0622b937e48787ef8cb4b8268a3092833166ea931a64e5bb1fa3d1ab8db184a05539dee5ed8eb84a014bbe33c212c577305
-
Filesize
637KB
MD5b443401be0b86e3acce00257daf1401f
SHA1e2ddd22d98d0ebdb815b1a1c5324581bf51f7b92
SHA2562910320b8aa75c9489820509ee925391c7dbfb613d0075c4d4a97dcc17ceaaee
SHA5125895563cb1faa7b9a3ec221e9baebcf255f8dbcff776d1fe78602d27a7f60a7e59347b1adc49c1d97edc36448cf01a3ba00623c8beec4ae3a18bc8db3c07bb0b