Analysis

  • max time kernel
    45s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 12:26

General

  • Target

    b4b0badfb71b9b4353c864604b8b4dd8.exe

  • Size

    425KB

  • MD5

    b4b0badfb71b9b4353c864604b8b4dd8

  • SHA1

    d2de77da6cf53a1b0e030df44c928beb3f1ff8e2

  • SHA256

    c61638e8ac4047c9a6150cd63fb2a2385fab4ce31eb57fa1a29e557053c52bca

  • SHA512

    b8891a159f41553956c1f9759e6f3d35eb968edcdc5ac94d08a3b7629adb19278d6ce6ad37c4bc2a8ed91e68b00a2467eaee651a38e79313752c2680c11abcb0

  • SSDEEP

    12288:w82tz1DBz5gga7egJlrtyp/0bJoNsOZ930DskP/vl4/mTCEWCEfrjRLmsBfZqFlR:w82tz1DBz5gh6gJVtE/0bJoCeAP/vl40

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • Disables RegEdit via registry modification 3 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 6 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 12 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4b0badfb71b9b4353c864604b8b4dd8.exe
    "C:\Users\Admin\AppData\Local\Temp\b4b0badfb71b9b4353c864604b8b4dd8.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\WINDOWS\scout.exe
      C:\WINDOWS\scout.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 628
        3⤵
        • Program crash
        PID:1808
    • C:\WINDOWS\system\lsass.exe
      C:\WINDOWS\system\lsass.exe
      2⤵
      • Modifies WinLogon for persistence
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2520
    • C:\Windows\SysWOW64\explorer.exe
      explorer b4b0badfb71b9b4353c864604b8b4dd8
      2⤵
        PID:2176
      • C:\WINDOWS\scout.exe
        C:\WINDOWS\scout.exe
        2⤵
        • Modifies WinLogon for persistence
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2792
        • C:\WINDOWS\pikachu.exe
          C:\WINDOWS\pikachu.exe
          3⤵
          • Modifies WinLogon for persistence
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:4244
        • C:\WINDOWS\system\lsass.exe
          C:\WINDOWS\system\lsass.exe
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:1212
      • C:\WINDOWS\system\lsass.exe
        C:\WINDOWS\system\lsass.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1864
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4980 -ip 4980
      1⤵
        PID:4020
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2844
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:2684
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=3044,i,17059189006398306756,4247826696353232857,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:2104

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\WINDOWS\system32\drivers\etc\hosts

            Filesize

            578B

            MD5

            4cedd41692993cf5a0a40baeb724b871

            SHA1

            fc1eeb1d88966ea4a816bcbdab320830b6f70261

            SHA256

            fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695

            SHA512

            e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862

          • C:\Windows\System\lsass.exe

            Filesize

            425KB

            MD5

            b4b0badfb71b9b4353c864604b8b4dd8

            SHA1

            d2de77da6cf53a1b0e030df44c928beb3f1ff8e2

            SHA256

            c61638e8ac4047c9a6150cd63fb2a2385fab4ce31eb57fa1a29e557053c52bca

            SHA512

            b8891a159f41553956c1f9759e6f3d35eb968edcdc5ac94d08a3b7629adb19278d6ce6ad37c4bc2a8ed91e68b00a2467eaee651a38e79313752c2680c11abcb0

          • memory/1212-116-0x0000000000400000-0x0000000000470000-memory.dmp

            Filesize

            448KB

          • memory/1716-0-0x0000000000400000-0x0000000000470000-memory.dmp

            Filesize

            448KB

          • memory/1716-102-0x0000000000400000-0x0000000000470000-memory.dmp

            Filesize

            448KB

          • memory/1864-101-0x0000000000400000-0x0000000000470000-memory.dmp

            Filesize

            448KB

          • memory/2520-117-0x0000000000400000-0x0000000000470000-memory.dmp

            Filesize

            448KB

          • memory/2792-93-0x0000000000400000-0x0000000000470000-memory.dmp

            Filesize

            448KB

          • memory/2792-118-0x0000000000400000-0x0000000000470000-memory.dmp

            Filesize

            448KB

          • memory/4244-119-0x0000000000400000-0x0000000000470000-memory.dmp

            Filesize

            448KB

          • memory/4980-83-0x0000000000400000-0x0000000000470000-memory.dmp

            Filesize

            448KB