Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe
Resource
win10v2004-20240226-en
General
-
Target
4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe
-
Size
472KB
-
MD5
322e4700befb566eba9229da6658b653
-
SHA1
1248ee6b70b64c941d3bb9bde4cfdf28231894d8
-
SHA256
4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa
-
SHA512
d0ebb218cd78e026ace19ca6850509cc84e87a933454d7eaaa0db6e2adbad9e512c77213bc2e58acf95e800d749fe573a806817020a33653f31a38a8560fdf4c
-
SSDEEP
6144:cf+Jjjou35J6i5plrzuo6/LkeYvjoIHnv0RX/VwFdLD/7MsrYMC+9GXL9M8sG3dr:bj8u3ui5pl+uBvc/V0FdYxJdRqMv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation 4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation LSASS.exe -
Executes dropped EXE 2 IoCs
pid Process 2360 LSASS.exe 3728 LSASS.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysUtils = "C:\\Windows\\LSASS.exe" REG.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: LSASS.exe File opened (read-only) \??\E: LSASS.exe File opened (read-only) \??\O: LSASS.exe File opened (read-only) \??\R: LSASS.exe File opened (read-only) \??\X: LSASS.exe File opened (read-only) \??\J: LSASS.exe File opened (read-only) \??\K: LSASS.exe File opened (read-only) \??\W: LSASS.exe File opened (read-only) \??\N: LSASS.exe File opened (read-only) \??\P: LSASS.exe File opened (read-only) \??\U: LSASS.exe File opened (read-only) \??\V: LSASS.exe File opened (read-only) \??\Y: LSASS.exe File opened (read-only) \??\H: LSASS.exe File opened (read-only) \??\I: LSASS.exe File opened (read-only) \??\L: LSASS.exe File opened (read-only) \??\Z: LSASS.exe File opened (read-only) \??\S: LSASS.exe File opened (read-only) \??\G: LSASS.exe File opened (read-only) \??\M: LSASS.exe File opened (read-only) \??\Q: LSASS.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created F:\autorun.inf LSASS.exe File opened for modification F:\autorun.inf LSASS.exe File created C:\autorun.inf LSASS.exe File opened for modification C:\autorun.inf LSASS.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\LSASS.exe 4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe File opened for modification C:\Windows\LSASS.exe 4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe File opened for modification C:\Windows\LSASS.exe LSASS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ LSASS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4784 4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe 4784 4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe 4784 4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe 4784 4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 3728 LSASS.exe 3728 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe 2360 LSASS.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4784 wrote to memory of 2360 4784 4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe 91 PID 4784 wrote to memory of 2360 4784 4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe 91 PID 4784 wrote to memory of 2360 4784 4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe 91 PID 2360 wrote to memory of 2236 2360 LSASS.exe 98 PID 2360 wrote to memory of 2236 2360 LSASS.exe 98 PID 2360 wrote to memory of 2236 2360 LSASS.exe 98 PID 2360 wrote to memory of 1560 2360 LSASS.exe 99 PID 2360 wrote to memory of 1560 2360 LSASS.exe 99 PID 2360 wrote to memory of 1560 2360 LSASS.exe 99 PID 2360 wrote to memory of 3728 2360 LSASS.exe 102 PID 2360 wrote to memory of 3728 2360 LSASS.exe 102 PID 2360 wrote to memory of 3728 2360 LSASS.exe 102 PID 2360 wrote to memory of 4528 2360 LSASS.exe 106 PID 2360 wrote to memory of 4528 2360 LSASS.exe 106 PID 2360 wrote to memory of 4528 2360 LSASS.exe 106 PID 2360 wrote to memory of 4036 2360 LSASS.exe 107 PID 2360 wrote to memory of 4036 2360 LSASS.exe 107 PID 2360 wrote to memory of 4036 2360 LSASS.exe 107 PID 2360 wrote to memory of 2236 2360 LSASS.exe 113 PID 2360 wrote to memory of 2236 2360 LSASS.exe 113 PID 2360 wrote to memory of 2236 2360 LSASS.exe 113 PID 2360 wrote to memory of 4000 2360 LSASS.exe 114 PID 2360 wrote to memory of 4000 2360 LSASS.exe 114 PID 2360 wrote to memory of 4000 2360 LSASS.exe 114 PID 2360 wrote to memory of 1708 2360 LSASS.exe 118 PID 2360 wrote to memory of 1708 2360 LSASS.exe 118 PID 2360 wrote to memory of 1708 2360 LSASS.exe 118 PID 2360 wrote to memory of 3968 2360 LSASS.exe 119 PID 2360 wrote to memory of 3968 2360 LSASS.exe 119 PID 2360 wrote to memory of 3968 2360 LSASS.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe"C:\Users\Admin\AppData\Local\Temp\4932262152b570800f0e595a0034ee2305edef7ed1d1e7914b771a40ea03c9aa.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\LSASS.exe"C:\Windows\LSASS.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:2236
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:1560
-
-
C:\Users\Admin\LSASS.exe"C:\Users\Admin\LSASS.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:4528
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:4036
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:2236
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:4000
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:1708
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SysUtils /t REG_SZ /d "C:\Windows\LSASS.exe" /f3⤵
- Adds Run key to start application
PID:3968
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD572a0d7e753defd34cd5d5d1bd144b28e
SHA1e936ec31ec66c2601789bc2dae1a9e38a91946fd
SHA256849800feb515ec360c75de5ad8fe9df004e869b1dfb5983b8a77c8e8166a225e
SHA512245b794fbe2f0001af7a4cf4d7b33e5887f01607f1bd30a0e023cb37940b2c6064bfdd6531e6e2df3648b2fdc4ec4bf8f5191d5e8308090123c67c855e488b77
-
Filesize
472KB
MD52ace02dcae8950ac118fe8249c1b6a77
SHA1667eb1cd71732253efc552070225d268930929cf
SHA2567f3650540e9cd855e5ab96384fa2050cd6bf086a517da74f2fed23a40a328a1e
SHA512e13a68c47379bed2ba364be042b82b40e1be93bd59202fcbc6a652e9a4236573b1f964c930aa32f1f70174137810db591b77d5fd0261d142299348daeca5f24b
-
Filesize
190B
MD5b1445c7f646c6ca9a7597791af38d575
SHA191efaf63fa1f7a51ee2f9b1c3b0f8932f15439ce
SHA256220517d50470c86d94020cebcd03af286898e65338f468dc5f860dc04af2c88e
SHA512533349278b6d186f0f3947681e90dcc7f617e146736798e6fc23e79d61610f1f7b2e4b4241b296884622fbd6b1cf73dc694a852e05bf4235da8ed40b70c5683f