Analysis

  • max time kernel
    13s
  • max time network
    15s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 23:07

Errors

Reason
Machine shutdown

General

  • Target

    b9e5a6b455e44f44f9f9ddaa2d80d9da.exe

  • Size

    244KB

  • MD5

    b9e5a6b455e44f44f9f9ddaa2d80d9da

  • SHA1

    42a9b78a5a4b66e2d692f6bee64c3c140e1360e9

  • SHA256

    7863e8dea89549a450f1fa863380092aafaa92252b934a3ed0542e7ad94e6714

  • SHA512

    b65672ab6b4d946f7f81bbbef7ece5fae72372f6500c944fd020cf6795ba1441dcb6c24947da7b70b30c78257fe1bb51d327591d1f9051f700a2ab4fc830ceb0

  • SSDEEP

    6144:aLTH/MyYGHK0ZxnJw2djRldo4OLp6u9ZST:6/9YGHK0ZRJw2djRl1OF6u9ZST

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9e5a6b455e44f44f9f9ddaa2d80d9da.exe
    "C:\Users\Admin\AppData\Local\Temp\b9e5a6b455e44f44f9f9ddaa2d80d9da.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\gnu.exe
      "C:\Users\Admin\AppData\Local\Temp\gnu.exe"
      2⤵
      • Sets DLL path for service in the registry
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:316
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Iprip
    1⤵
    • Sets DLL path for service in the registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3480
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa395c055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gnu.exe

    Filesize

    20KB

    MD5

    a98b03d61872217705cc74520cc85c6a

    SHA1

    7a6963ec6d466f2217b2a4a80a0e003a1543608d

    SHA256

    d5e814a0b4b37339ea041afeb11ecfb2c2cb7de870773129b1f101d75876ba2d

    SHA512

    697b2d39a2649ac647daaee48a6afac757353ab9d7b3302f84ad04e9ae2fb28f4ded632cbff354e0d64dd9a1d802b3f898e6b956a5120be7a45febcd71890059

  • C:\Windows\SysWOW64\fsutk.dll

    Filesize

    116KB

    MD5

    aad18b706572badfa9c830ab54506cdc

    SHA1

    6eed92acefae29b81bd5a32c39179bedaa203171

    SHA256

    289612292165f161906e8e1c02f17d64db5ee1e0441627837c86b76524eb1f2e

    SHA512

    c5c4c6110d89cd05c9f4a103f0c13db3ac8821231116e33c5a66f6a0858c2b4834b066364bac7ef933b7a91cc0c9a9c07cf164ad14ff2c09e633b2473e800343

  • \??\c:\$Recycle.bin\int.dat

    Filesize

    220KB

    MD5

    4ab1dfd710e88fd45fc71c43611645b4

    SHA1

    330a3459e976cde31ce59b39bbe6331e1f0883bb

    SHA256

    da910ecd7b3c8df38fb42cd9fb522709f6e040a9dbc3faee6b97263f279522fe

    SHA512

    0fa056664824e64947d05a8183481d14995c5881112410c504a7a03b02803f9c153e78765ffd782b4b1b417a494d2a17b52764fc3932acf3b2bb80f38d51c372

  • \??\c:\windows\SysWOW64\liprip.dll

    Filesize

    84KB

    MD5

    37e4eeb81970038077c6fea37d597ed8

    SHA1

    746e48e2da60af630cf8552183ea3344731e4497

    SHA256

    a12a6c1b32f5f07f8934c7d2afe5c8b9c18f27e8bdcee7dc8fb223a5032fb3d1

    SHA512

    977531573e5d1b3cfb8bbb7feb327cb358398d97fffeb465d432915cc83dac1a62396cb8f6e4ffbdfe9b8e4d1db344bb699f1a9c92c5b3968034c5befa97d202

  • memory/3480-16-0x0000000001760000-0x0000000001780000-memory.dmp

    Filesize

    128KB