Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe
Resource
win10v2004-20240226-en
General
-
Target
e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe
-
Size
8.8MB
-
MD5
ee4f83a8ead6120a3f100c9be2b3c896
-
SHA1
ba3a45b9f3687406c55e6025d8454172a8757138
-
SHA256
e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d
-
SHA512
450ac224954fb94098c25c09733b84a950d8fb7b6dcffbf55322d3f03ffabba77503127f31c3910494852adaeb3c5c3939aebe4bcc9a9d3200928b1c695f2cad
-
SSDEEP
196608:O4xEPDZ2UywCbw3/GUQHZqW80JbR5vT4b4BaqFz1GI9Ke:OY+8Uyho/GUQHZqW80JbR5vT4b4BaqFz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" wininit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe, cmd.exe /c start c:\\windows\\wininit.exe" wininit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe, cmd.exe /c start c:\\windows\\wininit.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wininit.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" icsys.ico.exe -
Executes dropped EXE 4 IoCs
pid Process 4848 e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe 2172 icsys.ico.exe 1992 wininit.exe 3136 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" icsys.ico.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\wininit.exe wininit.exe File created \??\c:\windows\wininit.exe icsys.ico.exe File opened for modification \??\c:\windows\wininit.exe icsys.ico.exe File opened for modification \??\c:\windows\RCX40D2.tmp icsys.ico.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2172 icsys.ico.exe 2172 icsys.ico.exe 2172 icsys.ico.exe 2172 icsys.ico.exe 1992 wininit.exe 1992 wininit.exe 1992 wininit.exe 1992 wininit.exe 1992 wininit.exe 1992 wininit.exe 1992 wininit.exe 1992 wininit.exe 3136 svchost.exe 3136 svchost.exe 1992 wininit.exe 1992 wininit.exe 3136 svchost.exe 1992 wininit.exe 3136 svchost.exe 1992 wininit.exe 3136 svchost.exe 1992 wininit.exe 3136 svchost.exe 1992 wininit.exe 1992 wininit.exe 1992 wininit.exe 3136 svchost.exe 3136 svchost.exe 3136 svchost.exe 1992 wininit.exe 1992 wininit.exe 3136 svchost.exe 1992 wininit.exe 3136 svchost.exe 1992 wininit.exe 3136 svchost.exe 3136 svchost.exe 3136 svchost.exe 1992 wininit.exe 1992 wininit.exe 3136 svchost.exe 3136 svchost.exe 1992 wininit.exe 1992 wininit.exe 3136 svchost.exe 1992 wininit.exe 1992 wininit.exe 3136 svchost.exe 1992 wininit.exe 1992 wininit.exe 3136 svchost.exe 3136 svchost.exe 3136 svchost.exe 1992 wininit.exe 1992 wininit.exe 3136 svchost.exe 3136 svchost.exe 1992 wininit.exe 1992 wininit.exe 3136 svchost.exe 3136 svchost.exe 1992 wininit.exe 3136 svchost.exe 1992 wininit.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1992 wininit.exe 3136 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1992 wininit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4964 wrote to memory of 4848 4964 e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe 91 PID 4964 wrote to memory of 4848 4964 e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe 91 PID 4964 wrote to memory of 4848 4964 e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe 91 PID 4964 wrote to memory of 2172 4964 e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe 93 PID 4964 wrote to memory of 2172 4964 e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe 93 PID 4964 wrote to memory of 2172 4964 e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe 93 PID 2172 wrote to memory of 1992 2172 icsys.ico.exe 94 PID 2172 wrote to memory of 1992 2172 icsys.ico.exe 94 PID 2172 wrote to memory of 1992 2172 icsys.ico.exe 94 PID 2172 wrote to memory of 3136 2172 icsys.ico.exe 95 PID 2172 wrote to memory of 3136 2172 icsys.ico.exe 95 PID 2172 wrote to memory of 3136 2172 icsys.ico.exe 95 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe"C:\Users\Admin\AppData\Local\Temp\e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exeC:\Users\Admin\AppData\Local\Temp\e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe2⤵
- Executes dropped EXE
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\icsys.ico.exeC:\Users\Admin\AppData\Local\Temp\icsys.ico.exe2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2172 -
\??\c:\windows\wininit.exec:\windows\wininit.exe3⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1992
-
-
\??\c:\users\admin\appdata\local\svchost.exec:\users\admin\appdata\local\svchost.exe3⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- System policy modification
PID:3136
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe
Filesize208KB
MD547216a1ba69974a29b372452793bf33a
SHA1e19ab9bdcb854325fb1073c907c6657be2f32ee2
SHA25602656101bd5905a550e72daf168568d3fda3a4b1a5ec3c0a93f1bc4c3062b987
SHA512cc43017a1011c784473bd8f588d858ae06885ac65ec86d1c8c4c8cf9c5aa6b0e9d177a29ac65f69701bf09f5ef8b3cb55937a5781ca03cb9bab53bdaa28b6d7a
-
C:\Users\Admin\AppData\Local\Temp\e0f87ea261dc02d89f0a2258334e3b7403de30e7604c5b8160e29c9f23bee51d.exe
Filesize186KB
MD57f0fa1ff961b41775775293c49096d3f
SHA1a8e07b08d087b1419df7e7230c62744a2eba39c4
SHA256f354621e41737a7a70b4e15e009c6c0008934e6e382238d19f58b7cf92470db3
SHA5128c76785bc33c1a688a172d201389e8d47098291b5a90fe81d305c3514bc4676f3b1f4efe004e469f160d7671b067ed2befa8d96ace09b34a2e995e0b9fa16bf5
-
Filesize
85KB
MD505a10d73496497b4480101faf7264f52
SHA119ff4e665c05c30ce75087ba11126fe70f8b70fa
SHA25649617236fb37832796801bbc57fac1c98b79e139cfbf2d3e43db0e1b16cae0f7
SHA5120afb8ceff15d366c2fa7a1d69bbae55e698ad829a6bb244ea451e69985c0ae616bba60bbb121c31727458a2016b6b150358aab2572986647bb8a9b7c9e9a54c9
-
Filesize
152KB
MD59b7027d671fe11683be24326feb32d8d
SHA1acc4ba2feacbbdc0dc596967cc7f03f2d5b1877a
SHA256866da6d84d42fadc62a82ffc144e513dd6ff3a2f439b6a0068101c7601ed15da
SHA5122ef4f37661699793dd9a0ee477b44069f1da4401a3648372ed4ff4d04c0abdb9b11a3667bd72431131f063475b3b34c6b843b0a224b3da603e356c2cf3f897e6
-
Filesize
2.4MB
MD5cb965a01b90f5aba913bf6eb3a9fc642
SHA1f85abea33bbf8fb7d9d9ec57e973bed4d34d4537
SHA2568d5966a59804d77a50c0da0cdab6cb84b015b92d916ba9c6fc693a488dc2dea8
SHA512771c7673cd719a9d73095e9ce705951c8e67f5412eaab03c27579f27adf63ab01ecf45abfd1c4f6ab2097c24b549baa1f5a21c7b558358848e2d0f4e97627443
-
Filesize
2.2MB
MD5b41bf7d5510e00e741b70b7969d0d595
SHA1675f1d8f2cdca7cddc759bf0e500430660653fe3
SHA256d9b0dcfc710303af0d54e5a70993f7e02a0e5727210f870ac373c45f988a0022
SHA5124c470d780dbc67575c8bc4373176c3869f16e58cff40cdf8cb04ab1d366554093f686eb088a7fb68cc1a194664c9b783ba63c2f3ae8bbc8f64feab8851086e8f
-
Filesize
2.1MB
MD58d570ae2d498c6cec1174dee477dd461
SHA167647a234ec534486c5d49ed25828126cb7db8ac
SHA25625b93d9f664f3bcf5c5439a9c14ad83edc2b7dbe7bec8ef62009b7f61a52eea8
SHA5128c61833d4806809d994f588e41a316bd5b9b0e442c9cac9a573a2aac2126c18e14960caa5a4d1b6124755087516d0682a374c7e22d1f9f5a0cb800752141e2ff
-
Filesize
1.9MB
MD55e6d8bc6a9215bf1c4d0cbc606795e9a
SHA1d88b7efe00c49061ca97f048ea76a5f8f7e4b912
SHA2562d4d6298f936a4b2e0862f3f4995c1bf424381f87a86eb8f3a6d040636cce69c
SHA512e6fb298f29037c118beca7574c457f7da271c0eb57d51f3f6ef6e10b88ccb5cff2c453c164f16e7f3fd7d36d92ae92a5baa71daf3ed4e5b613bcecd7f699be5d
-
Filesize
1.8MB
MD55d8da1e5d8b114683502bb8999189680
SHA10ce7bbb37074b69c9198c413d6ca4d9d2d787aa8
SHA25607cdc83378c5a877dcd0395914fa8502a4995ad8becae01a428e0ca780ce0f80
SHA512718fee8bf6303faeb8ee5d2f473b0eb7950c5cb0df03e902668f312fbe12f62d4904b96c65fdda940e2041ad931e46b19f45fb43a53dee1710601f5293b024af