Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe
Resource
win10v2004-20240226-en
Errors
General
-
Target
1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe
-
Size
543KB
-
MD5
f8710476bef2421010a186346e1c7172
-
SHA1
beebcb59aa847196eea2784517038dc41e537b30
-
SHA256
1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1
-
SHA512
2bfa061f8a472dfdf9c30a2d1ba2e5b2641c8be7a8d7615a7564f6ff178a743272116187c6bff5ae54dc2e496eadb4148446d8ec0425f39e1ebc779c302dfdd8
-
SSDEEP
3072:TGC43DksD+XZVputL00000000000000000000000000000000000000000000009:TGC43NaVyrrrrrrrrrrX
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svchost.eXe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" msmsgs.eXe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svchost.eXe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" angle.eXe -
Disables RegEdit via registry modification 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "2" svchost.eXe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "2" msmsgs.eXe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "2" svchost.eXe Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "2" angle.eXe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation svchost.eXe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation svchost.eXe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation msmsgs.eXe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation angle.eXe -
Executes dropped EXE 4 IoCs
pid Process 4856 svchost.eXe 1796 svchost.eXe 4400 msmsgs.eXe 4336 angle.eXe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\RCX6756.tmp svchost.eXe File created C:\Windows\SysWOW64\angle.eXe angle.eXe File opened for modification C:\Windows\SysWOW64\angle.eXe svchost.eXe File opened for modification C:\Windows\SysWOW64\angle.eXe svchost.eXe File opened for modification C:\Windows\SysWOW64\RCX6785.tmp svchost.eXe File created C:\Windows\SysWOW64\angle.eXe msmsgs.eXe File created C:\Windows\SysWOW64\angle.eXe 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe File opened for modification C:\Windows\SysWOW64\angle.eXe 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe File opened for modification C:\Windows\SysWOW64\RCX326D.tmp 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office11\EXCEL.exe 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office\WINWORD.exe 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office11\WINWORD.exe 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office\EXCEL.exe 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\ziprar.eXe 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe File opened for modification C:\Windows\RCX6774.tmp svchost.eXe File opened for modification C:\Windows\svchost.eXe angle.eXe File opened for modification C:\Windows\RCX67E2.tmp angle.eXe File opened for modification C:\Windows\RCX3F60.tmp 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe File opened for modification C:\Windows\svchost.eXe svchost.eXe File opened for modification C:\Windows\svchost.eXe 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe File opened for modification C:\Windows\RCX6755.tmp svchost.eXe File created C:\Windows\svchost.eXe 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe File opened for modification C:\Windows\RCX326C.tmp 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe File created C:\Windows\ziprar.eXe 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe File opened for modification C:\Windows\svchost.eXe svchost.eXe File created C:\Windows\svchost.eXe msmsgs.eXe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "24" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4400 msmsgs.eXe 4400 msmsgs.eXe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4400 msmsgs.eXe Token: SeShutdownPrivilege 4400 msmsgs.eXe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 4856 svchost.eXe 4856 svchost.eXe 1796 svchost.eXe 1796 svchost.eXe 4400 msmsgs.eXe 4400 msmsgs.eXe 4336 angle.eXe 4336 angle.eXe 4400 msmsgs.eXe 5080 LogonUI.exe 4856 svchost.eXe 1796 svchost.eXe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3408 wrote to memory of 3080 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 88 PID 3408 wrote to memory of 3080 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 88 PID 3408 wrote to memory of 3080 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 88 PID 3408 wrote to memory of 1132 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 95 PID 3408 wrote to memory of 1132 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 95 PID 3408 wrote to memory of 1132 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 95 PID 3408 wrote to memory of 4856 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 102 PID 3408 wrote to memory of 4856 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 102 PID 3408 wrote to memory of 4856 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 102 PID 3408 wrote to memory of 1796 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 103 PID 3408 wrote to memory of 1796 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 103 PID 3408 wrote to memory of 1796 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 103 PID 3408 wrote to memory of 4400 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 104 PID 3408 wrote to memory of 4400 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 104 PID 3408 wrote to memory of 4400 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 104 PID 3408 wrote to memory of 4336 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 105 PID 3408 wrote to memory of 4336 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 105 PID 3408 wrote to memory of 4336 3408 1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe 105 PID 4856 wrote to memory of 1004 4856 svchost.eXe 106 PID 4856 wrote to memory of 1004 4856 svchost.eXe 106 PID 4856 wrote to memory of 1004 4856 svchost.eXe 106 PID 1796 wrote to memory of 4160 1796 svchost.eXe 107 PID 1796 wrote to memory of 4160 1796 svchost.eXe 107 PID 1796 wrote to memory of 4160 1796 svchost.eXe 107 PID 4400 wrote to memory of 2304 4400 msmsgs.eXe 108 PID 4400 wrote to memory of 2304 4400 msmsgs.eXe 108 PID 4400 wrote to memory of 2304 4400 msmsgs.eXe 108 PID 4336 wrote to memory of 3312 4336 angle.eXe 112 PID 4336 wrote to memory of 3312 4336 angle.eXe 112 PID 4336 wrote to memory of 3312 4336 angle.eXe 112 PID 4856 wrote to memory of 2800 4856 svchost.eXe 114 PID 4856 wrote to memory of 2800 4856 svchost.eXe 114 PID 4856 wrote to memory of 2800 4856 svchost.eXe 114 PID 4400 wrote to memory of 4576 4400 msmsgs.eXe 115 PID 4400 wrote to memory of 4576 4400 msmsgs.eXe 115 PID 4400 wrote to memory of 4576 4400 msmsgs.eXe 115 PID 1796 wrote to memory of 2268 1796 svchost.eXe 116 PID 1796 wrote to memory of 2268 1796 svchost.eXe 116 PID 1796 wrote to memory of 2268 1796 svchost.eXe 116 PID 4336 wrote to memory of 532 4336 angle.eXe 120 PID 4336 wrote to memory of 532 4336 angle.eXe 120 PID 4336 wrote to memory of 532 4336 angle.eXe 120 PID 4400 wrote to memory of 3988 4400 msmsgs.eXe 122 PID 4400 wrote to memory of 3988 4400 msmsgs.eXe 122 PID 4400 wrote to memory of 3988 4400 msmsgs.eXe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe"C:\Users\Admin\AppData\Local\Temp\1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" import C:\Windows\regedit.reg2⤵PID:3080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" export HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\srservice C:\Windows\regedit.reg2⤵PID:1132
-
-
C:\Users\Public\Pictures\svchost.eXe"C:\Users\Public\Pictures\svchost.eXe"2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" import C:\Windows\regedit.reg3⤵PID:1004
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" export HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\srservice C:\Windows\regedit.reg3⤵PID:2800
-
-
-
C:\Users\Public\Music\svchost.eXe"C:\Users\Public\Music\svchost.eXe"2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" import C:\Windows\regedit.reg3⤵PID:4160
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" export HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\srservice C:\Windows\regedit.reg3⤵PID:2268
-
-
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\msmsgs.eXe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\msmsgs.eXe"2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" import C:\Windows\regedit.reg3⤵PID:2304
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" export HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\srservice C:\Windows\regedit.reg3⤵PID:4576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" import C:\Windows\regedit.reg3⤵PID:3988
-
-
-
C:\Windows\SysWOW64\angle.eXe"C:\Windows\system32\angle.eXe"2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" import C:\Windows\regedit.reg3⤵PID:3312
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" export HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\srservice C:\Windows\regedit.reg3⤵PID:532
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa394d855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
656B
MD5e0722dddd4442be2d33a6948b7c8d04d
SHA11bc56ec2ca2d1ae3c0cbb2f66289945a32bb3d13
SHA256ea7c34f49417b382ff9c872fccd1f5f58636f3001a2fe837ed195a4d239f66e6
SHA5122236ab5c1547e58aee6da04f4fe5f44a1292cd026596b3766eb76d468e6b67a391982baaa5f4698ec1c719c0c89142e136b1c0f17aa1ea19e7c4963655823bec
-
Filesize
546KB
MD56c985be10f5b3e7dfaa6b5d778bc8a83
SHA1f6f36fb7f0f0116477f8658399f63caa83543812
SHA256b6d6a3b60105105cb7b2d34dad85a640a58a8bdd00100aa35994f5796200cd62
SHA512ee13a32e1ee4f17a7e0c72eaa2a9864879c3387155f334a408fb7fae4e3482f6baaab09789713ebb30cb28a6f021292aec154c52889a227ab04a260defca9bf9
-
Filesize
543KB
MD5f8710476bef2421010a186346e1c7172
SHA1beebcb59aa847196eea2784517038dc41e537b30
SHA2561062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1
SHA5122bfa061f8a472dfdf9c30a2d1ba2e5b2641c8be7a8d7615a7564f6ff178a743272116187c6bff5ae54dc2e496eadb4148446d8ec0425f39e1ebc779c302dfdd8
-
Filesize
541KB
MD5c974de20451a0cd4dce0b428c4e979e4
SHA1fc8023da628a7716bd12723067b5080c212a9cd7
SHA2569e5e8afacfb37f9693158ee983e4257e8465dde3ab813acd4ccb9135fc988ab7
SHA512689d9578d5deac86fcc3d56cedf591b481bb6d68866f7ab3f01ea01432a5b8e0fba17f300fcb705e080377cfabc6222a7d1556fdb093fa6c6af01dc08e8c7de6