Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29-02-2024 03:17

General

  • Target

    PreSetup 2.exe

  • Size

    226KB

  • MD5

    13f52b5eb6d4ca2fa9b6bcb6a706f80a

  • SHA1

    c032838e55f598ef2b2de9d26d056e5a2bfcc08e

  • SHA256

    0fe3174a9efe12d1c80a1c41df2a0df4e24b34e4aabb7c8e3c8dbc323046ea0e

  • SHA512

    a6c4b1c5f108af3971924a958cb1e5d1010b1da10d3c183fbe550e551efd583152ccc7505b0580cd4f866552af8a51eeb080e1181d4bfb53f28a0a7700ef3c42

  • SSDEEP

    3072:FDFfHgTWmCRkGbKGLeNTBfNOwitsxAC+CzIlzFlg:x5aWbksiNTB1OwLxXMlBlg

Score
8/10

Malware Config

Signatures

  • Registers new Print Monitor 2 TTPs 12 IoCs
  • Maps connected drives based on registry 3 TTPs 12 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies data under HKEY_USERS 12 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PreSetup 2.exe
    "C:\Users\Admin\AppData\Local\Temp\PreSetup 2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\8B19.tmp\8B1A.tmp\8B1B.bat "C:\Users\Admin\AppData\Local\Temp\PreSetup 2.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Windows\system32\cmd.exe
        cmd /c "C:\Users\Admin\AppData\Local\Temp\PreSetup 2.exe" max
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3248
        • C:\Users\Admin\AppData\Local\Temp\PreSetup 2.exe
          "C:\Users\Admin\AppData\Local\Temp\PreSetup 2.exe" max
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3664
          • C:\Windows\system32\cmd.exe
            "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\8C61.tmp\8C62.tmp\8C63.bat "C:\Users\Admin\AppData\Local\Temp\PreSetup 2.exe" max"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:832
            • C:\Windows\system32\timeout.exe
              timeout 5
              6⤵
              • Delays execution with timeout.exe
              PID:4680
            • C:\Windows\system32\timeout.exe
              timeout 2
              6⤵
              • Delays execution with timeout.exe
              PID:3144
            • C:\Windows\regedit.exe
              regedit /s "7ZIP.reg"
              6⤵
              • Runs .reg file with regedit
              PID:3444
            • C:\Windows\system32\powercfg.exe
              powercfg -import "C:\Windows\APIs\Cat10IdleOn.pow" 69420228-6969-6969-6969-694202281337
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2392
            • C:\Windows\system32\powercfg.exe
              powercfg -import "C:\Windows\APIs\Cat10IdleOff.pow" 70420228-6969-6969-6969-694202281337
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4760
            • C:\Windows\system32\powercfg.exe
              powercfg -setactive 69420228-6969-6969-6969-694202281337
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4056
            • C:\Windows\system32\powercfg.exe
              powercfg -delete 381b4222-f694-41f0-9685-ff5bb260df2e
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2172
            • C:\Windows\system32\powercfg.exe
              powercfg -delete 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2144
            • C:\Windows\system32\powercfg.exe
              powercfg -delete a1841308-3541-4fab-bc81-f71556f20b4a
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1368
            • C:\Windows\system32\reg.exe
              reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent" /v "StartColorMenu" /t REG_DWORD /d "4284394495" /f
              6⤵
                PID:1552
              • C:\Windows\system32\reg.exe
                reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent" /v "AccentColorMenu" /t REG_DWORD /d "4286102015" /f
                6⤵
                  PID:3112
                • C:\Windows\system32\reg.exe
                  reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent" /v "AccentPalette" /t REG_BINARY /d "FFE5CEFFFFD3ABFFFEC691FFFFB978FFFFAB5EFFFF9E44FFFE8C21FF88179800" /f
                  6⤵
                    PID:976
                  • C:\Windows\system32\reg.exe
                    reg add "HKCU\Software\Microsoft\Windows\DWM" /v "AccentColor" /t REG_DWORD /d "4286102015" /f
                    6⤵
                      PID:3684
                    • C:\Windows\system32\reg.exe
                      reg add "HKCU\Software\Microsoft\Windows\DWM" /v "ColorizationColor" /t REG_DWORD /d "3305093496" /f
                      6⤵
                        PID:3312
                      • C:\Windows\system32\reg.exe
                        reg add "HKCU\Software\Microsoft\Windows\DWM" /v "ColorizationAfterglow" /t REG_DWORD /d "3305093496" /f
                        6⤵
                          PID:1340
                        • C:\Windows\system32\reg.exe
                          reg add "HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent" /v "StartColorMenu" /t REG_DWORD /d "4284394495" /f
                          6⤵
                          • Modifies data under HKEY_USERS
                          PID:4800
                        • C:\Windows\system32\reg.exe
                          reg add "HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent" /v "AccentColorMenu" /t REG_DWORD /d "4286102015" /f
                          6⤵
                          • Modifies data under HKEY_USERS
                          PID:2568
                        • C:\Windows\system32\reg.exe
                          reg add "HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent" /v "AccentPalette" /t REG_BINARY /d "FFE5CEFFFFD3ABFFFEC691FFFFB978FFFFAB5EFFFF9E44FFFE8C21FF88179800" /f
                          6⤵
                          • Modifies data under HKEY_USERS
                          PID:4436
                        • C:\Windows\system32\reg.exe
                          reg add "HKU\.DEFAULT\Software\Microsoft\Windows\DWM" /v "AccentColor" /t REG_DWORD /d "4286102015" /f
                          6⤵
                          • Modifies data under HKEY_USERS
                          PID:2956
                        • C:\Windows\system32\reg.exe
                          reg add "HKU\.DEFAULT\Software\Microsoft\Windows\DWM" /v "ColorizationColor" /t REG_DWORD /d "3305093496" /f
                          6⤵
                          • Modifies data under HKEY_USERS
                          PID:704
                        • C:\Windows\system32\reg.exe
                          reg add "HKU\.DEFAULT\Software\Microsoft\Windows\DWM" /v "ColorizationAfterglow" /t REG_DWORD /d "3305093496" /f
                          6⤵
                          • Modifies data under HKEY_USERS
                          PID:3568
                        • C:\Windows\system32\reg.exe
                          reg add "HKLM\SYSTEM\CurrentControlSet\Control\PriorityControl" /v "Win32PrioritySeparation" /t REG_DWORD /d "24" /f
                          6⤵
                            PID:412
                          • C:\Windows\system32\reg.exe
                            reg add "HKLM\SYSTEM\CurrentControlSet\Services\NlaSvc" /v "DependOnService" /t REG_MULTI_SZ /d "NSI\0RpcSs\0TcpIp" /f
                            6⤵
                              PID:2744
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\HotStart" /f
                              6⤵
                                PID:3360
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Sidebar" /f
                                6⤵
                                  PID:4752
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Telephony" /f
                                  6⤵
                                    PID:4272
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Screensavers" /f
                                    6⤵
                                      PID:4116
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKCU\Printers" /f
                                      6⤵
                                        PID:3296
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\SYSTEM\ControlSet001\Control\Print" /f
                                        6⤵
                                        • Registers new Print Monitor
                                        PID:2448
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\SYSTEM\ControlSet002\Control\Print" /f
                                        6⤵
                                          PID:3920
                                        • C:\Windows\system32\reg.exe
                                          reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "FeatureSettings" /t REG_DWORD /d "1" /f
                                          6⤵
                                            PID:4548
                                          • C:\Windows\system32\reg.exe
                                            reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "FeatureSettingsOverride" /t REG_DWORD /d "33554435" /f
                                            6⤵
                                              PID:2496
                                            • C:\Windows\system32\reg.exe
                                              reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "FeatureSettingsOverrideMask" /t REG_DWORD /d "3" /f
                                              6⤵
                                                PID:1804
                                              • C:\Windows\system32\reg.exe
                                                reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "EnableCfg" /t REG_DWORD /d "0" /f
                                                6⤵
                                                  PID:2996
                                                • C:\Windows\system32\reg.exe
                                                  reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\kernel" /v "DisableExceptionChainValidation" /t REG_DWORD /d "1" /f
                                                  6⤵
                                                    PID:3084
                                                  • C:\Windows\system32\reg.exe
                                                    reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\kernel" /v "KernelSEHOPEnabled" /t REG_DWORD /d "0" /f
                                                    6⤵
                                                      PID:1704
                                                    • C:\Windows\system32\reg.exe
                                                      reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\kernel" /v "DisableTsx" /t REG_DWORD /d "1" /f
                                                      6⤵
                                                        PID:4908
                                                      • C:\Windows\system32\reg.exe
                                                        reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v "ProtectionMode" /t REG_DWORD /d "0" /f
                                                        6⤵
                                                          PID:4860
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell set-ProcessMitigation -System -Disable DEP, StrictHandle, SEHOP
                                                          6⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4580
                                                        • C:\Windows\system32\powercfg.exe
                                                          powercfg -h off
                                                          6⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:992
                                                        • C:\Windows\system32\reg.exe
                                                          reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\CameraAlternate\ShowPicturesOnArrival" /ve /t REG_SZ /d "MSTakeNoAction" /f
                                                          6⤵
                                                            PID:4804
                                                          • C:\Windows\system32\reg.exe
                                                            reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\StorageOnArrival" /ve /t REG_SZ /d "MSTakeNoAction" /f
                                                            6⤵
                                                              PID:2804
                                                            • C:\Windows\system32\reg.exe
                                                              reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\CameraAlternate\ShowPicturesOnArrival" /ve /t REG_SZ /d "MSTakeNoAction" /f
                                                              6⤵
                                                                PID:224
                                                              • C:\Windows\system32\reg.exe
                                                                reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\StorageOnArrival" /ve /t REG_SZ /d "MSTakeNoAction" /f
                                                                6⤵
                                                                  PID:5008
                                                                • C:\Windows\system32\reg.exe
                                                                  reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "WinStationsDisabled" /t REG_SZ /d "1" /f
                                                                  6⤵
                                                                    PID:4636
                                                                  • C:\Windows\system32\reg.exe
                                                                    reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize" /v "DisableRemoteFontBootCache" /t REG_DWORD /d "1" /f
                                                                    6⤵
                                                                      PID:4808
                                                                    • C:\Windows\system32\reg.exe
                                                                      reg add "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\GRE_Initialize" /v "DisableRemoteFontBootCache" /t REG_DWORD /d "1" /f
                                                                      6⤵
                                                                        PID:2968
                                                                      • C:\Windows\system32\reg.exe
                                                                        reg add "HKLM\SYSTEM\CurrentControlSet\Control\MUI\StringCacheSettings" /v "StringCacheGeneration" /t REG_DWORD /d "0" /f
                                                                        6⤵
                                                                          PID:2948
                                                                        • C:\Windows\system32\reg.exe
                                                                          reg add "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v "disabledomaincreds" /t REG_DWORD /d "1" /f
                                                                          6⤵
                                                                            PID:4228
                                                                          • C:\Windows\system32\reg.exe
                                                                            reg add "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v "restrictanonymous" /t REG_DWORD /d "1" /f
                                                                            6⤵
                                                                              PID:3164
                                                                            • C:\Windows\system32\reg.exe
                                                                              reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing" /v "EnableLog" /t REG_DWORD /d "0" /f
                                                                              6⤵
                                                                                PID:2980
                                                                              • C:\Windows\system32\reg.exe
                                                                                reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing" /v "EnableDpxLog" /t REG_DWORD /d "0" /f
                                                                                6⤵
                                                                                  PID:2268
                                                                                • C:\Windows\system32\reg.exe
                                                                                  reg add "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Component Based Servicing" /v "EnableLog" /t REG_DWORD /d "0" /f
                                                                                  6⤵
                                                                                    PID:460
                                                                                  • C:\Windows\system32\reg.exe
                                                                                    reg add "HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Component Based Servicing" /v "EnableDpxLog" /t REG_DWORD /d "0" /f
                                                                                    6⤵
                                                                                      PID:4448
                                                                                    • C:\Windows\system32\reg.exe
                                                                                      reg add "HKLM\SOFTWARE\Microsoft\Ole" /v "EnableDCOM" /t REG_SZ /d "N" /f
                                                                                      6⤵
                                                                                        PID:1332
                                                                                      • C:\Windows\system32\reg.exe
                                                                                        reg add "HKLM\SOFTWARE\WOW6432Node\Microsoft\Ole" /v "EnableDCOM" /t REG_SZ /d "N" /f
                                                                                        6⤵
                                                                                          PID:3252
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c REG QUERY "HKLM\SYSTEM\CurrentControlSet\Services" /S /F "EnableHIPM"| FINDSTR /V "EnableHIPM"
                                                                                          6⤵
                                                                                            PID:2276
                                                                                            • C:\Windows\system32\findstr.exe
                                                                                              FINDSTR /V "EnableHIPM"
                                                                                              7⤵
                                                                                                PID:1548
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                REG QUERY "HKLM\SYSTEM\CurrentControlSet\Services" /S /F "EnableHIPM"
                                                                                                7⤵
                                                                                                • Maps connected drives based on registry
                                                                                                PID:3304
                                                                                            • C:\Windows\system32\reg.exe
                                                                                              REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\amdsbs\Settings\CAM" /F /V "EnableHIPM" /T REG_DWORD /d 0
                                                                                              6⤵
                                                                                                PID:324
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\amdsbs\Settings\CAM" /F /V "EnableDIPM" /T REG_DWORD /d 0
                                                                                                6⤵
                                                                                                  PID:4204
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\amdsbs\Settings\CAM" /F /V "EnableHDDParking" /T REG_DWORD /d 0
                                                                                                  6⤵
                                                                                                    PID:4880
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c REG QUERY "HKLM\SYSTEM\CurrentControlSet\Services" /S /F "IoLatencyCap"| FINDSTR /V "IoLatencyCap"
                                                                                                    6⤵
                                                                                                      PID:1128
                                                                                                      • C:\Windows\system32\findstr.exe
                                                                                                        FINDSTR /V "IoLatencyCap"
                                                                                                        7⤵
                                                                                                          PID:3736
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          REG QUERY "HKLM\SYSTEM\CurrentControlSet\Services" /S /F "IoLatencyCap"
                                                                                                          7⤵
                                                                                                          • Maps connected drives based on registry
                                                                                                          PID:4500

                                                                                            Network

                                                                                            MITRE ATT&CK Enterprise v15

                                                                                            Replay Monitor

                                                                                            Loading Replay Monitor...

                                                                                            Downloads

                                                                                            • C:\Users\Admin\AppData\Local\Temp\8B19.tmp\8B1A.tmp\8B1B.bat

                                                                                              Filesize

                                                                                              47KB

                                                                                              MD5

                                                                                              f118265f48a8296bf10641c15959f32d

                                                                                              SHA1

                                                                                              a4af7f7d09a50e0b84c7dc755fc9855a57b4f684

                                                                                              SHA256

                                                                                              b13d5d684ceff741f279dcd1fee3149b5e53b87501b0310267f0ff538a45a448

                                                                                              SHA512

                                                                                              4f47d14fe126408576efa6e3bb2eb36720343af8087d8367b5d259a10a6f4db8ed78ca4bed5256420f1ee7f8cbfa71ead3b865395fedb8e80c63e81030b6039a

                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_e1latanf.zrj.ps1

                                                                                              Filesize

                                                                                              60B

                                                                                              MD5

                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                              SHA1

                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                              SHA256

                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                              SHA512

                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                            • memory/4580-12-0x00000170AEA30000-0x00000170AEA52000-memory.dmp

                                                                                              Filesize

                                                                                              136KB

                                                                                            • memory/4580-13-0x00007FFCF2DC0000-0x00007FFCF3882000-memory.dmp

                                                                                              Filesize

                                                                                              10.8MB

                                                                                            • memory/4580-14-0x00000170AE970000-0x00000170AE980000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4580-15-0x00000170AE970000-0x00000170AE980000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4580-16-0x00000170AE970000-0x00000170AE980000-memory.dmp

                                                                                              Filesize

                                                                                              64KB

                                                                                            • memory/4580-17-0x00000170AEAF0000-0x00000170AEB0E000-memory.dmp

                                                                                              Filesize

                                                                                              120KB

                                                                                            • memory/4580-20-0x00007FFCF2DC0000-0x00007FFCF3882000-memory.dmp

                                                                                              Filesize

                                                                                              10.8MB