Analysis
-
max time kernel
13s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
ConsoleApp1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ConsoleApp1.exe
Resource
win10v2004-20240226-en
General
-
Target
ConsoleApp1.exe
-
Size
65.8MB
-
MD5
fd9978f1ee45dcf628b273c787687bf2
-
SHA1
b5f3699ccb6287bfd9038aded2397b7231464ab8
-
SHA256
1b3c0b6ea908a2c06d2566073b377018b78fefc5f773b27e0e2447b276bf8cba
-
SHA512
732c9660d7bccb108cfa1b50439997ffa08d44733a46b89498c387f9f9006e63d0197272a852e1dab6eda72ef9e0e4ee939508ab0ba218d7463f6838875a6bd9
-
SSDEEP
393216:WW+tK2sxPOzdmxDoh9f0VV41LVTKLb5urzdCVH2tZHfoaE7WAUSWPmcSpnLE7yRt:WnKN69f3TKLb5CP7Ncqmk/jnqN
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions ConsoleApp1.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools ConsoleApp1.exe -
Loads dropped DLL 18 IoCs
pid Process 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe 4432 ConsoleApp1.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "124" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 856 shutdown.exe Token: SeRemoteShutdownPrivilege 856 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1144 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4432 wrote to memory of 856 4432 ConsoleApp1.exe 95 PID 4432 wrote to memory of 856 4432 ConsoleApp1.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ConsoleApp1.exe"C:\Users\Admin\AppData\Local\Temp\ConsoleApp1.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SYSTEM32\shutdown.exe"shutdown" /s /t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3942055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD519daaaeb46aae9ea254f4860f731020e
SHA1a2ff7af80c703f8ddefa816997cc64da0c9e5816
SHA256163a7498cf2b7eec8a7f366e49a2dcfa8306b6f5e984d4781b22c3c26ad0c331
SHA512096a6ed1a9c0cbf0666104393bb5234df49da7e1bc230ae671f7b83ecbc094e37dd08f772e132453ac654caec1ed6a546b2df9fe769844f39653542e96c13924
-
C:\Users\Admin\AppData\Local\Temp\.net\ConsoleApp1\U938HzO+KxCOkJ+9PbQa+uctEmFzu1s=\Microsoft.Win32.Primitives.dll
Filesize21KB
MD527b3ee8d64b2b1290eaf90bfe7d0b009
SHA1d30b53d53f0258666987f9a9fc15c862c6f36935
SHA2565905b9e94aae08d2d8e63a5d907493d89f98153ec95b43e241db5e3a3c6f5bb9
SHA512cc9910757bf24efead841d0632e95bf8a24577bc762391944dd6a82048984140a3f373ccdbaa3f9869e9f38c72213eeaaaad90dd318b3870a4b827e265292c92
-
C:\Users\Admin\AppData\Local\Temp\.net\ConsoleApp1\U938HzO+KxCOkJ+9PbQa+uctEmFzu1s=\Microsoft.Win32.Registry.dll
Filesize87KB
MD5ef200f43384a248855d6825fb27c7413
SHA188cc8ee364886e1d683084c36002053faaf8ebb0
SHA256e1481e57d6efaeb7f463b6e8d93cab48e35beba25ed53382ddef4b15143404e4
SHA512f0810df4b94f44061614e06b1e4bbef83fcbc5e477a6df889859d95422974cde48b5c6990ec3ca3b006d27e88ce436e57c2a9b6256e7f162b5cd8971dc95aab0
-
C:\Users\Admin\AppData\Local\Temp\.net\ConsoleApp1\U938HzO+KxCOkJ+9PbQa+uctEmFzu1s=\System.ComponentModel.Primitives.dll
Filesize52KB
MD5ad43b19efb5bf397a7ff7f0c4bc23f3a
SHA1557831bf876e662941658d45b7a63242229e62fa
SHA256b95484e1e93daab32a9871faf33800ab3c583b1d830dcbd961a6cfb0cef408bb
SHA512bcbad6dddcd29c9e7f435fe38472d2cf76a9d2c9af8990a31ce86f051039b6ec2e28c0064a165e62b18883a6091cd9d9361390d4fd63ec6960910139e40f7b52
-
C:\Users\Admin\AppData\Local\Temp\.net\ConsoleApp1\U938HzO+KxCOkJ+9PbQa+uctEmFzu1s=\System.Console.dll
Filesize150KB
MD5483b394bca8e88a2ddd73ef49c3d1b21
SHA1e712a41d36589b499de449b14a55163217444ec4
SHA2566bdba19e6ed1396e60ea8b2a1a6fa88859203e304e407b6a30c59649563b76e7
SHA512b38a8f3eff74c863c2d93725fe4e61cd43b4b4b78658f9f0ff430b2a5acaf6051ca82cc38c5b12692a3352e50d69f3b6229e1069738c4c2f6932eb2a2f266a67
-
C:\Users\Admin\AppData\Local\Temp\.net\ConsoleApp1\U938HzO+KxCOkJ+9PbQa+uctEmFzu1s=\System.Diagnostics.Process.dll
Filesize251KB
MD5bf5183f8265c7ab13da680f758dcb596
SHA1be25478b6c3357e3507d679269d1d4b97c1ef648
SHA2565f4591a617547661aa486c5b31cf9673be4c95b930a5cf898bd23b07bc1bd8fe
SHA5125507ab30bd53bd36a6cfe25037d4c3b6e5801a24cbc17973e927b1b9675fb5be2551d73cc3b249bec118928d2d51c560cf5ec8939bd08e178a457f68ea8d3ecf
-
C:\Users\Admin\AppData\Local\Temp\.net\ConsoleApp1\U938HzO+KxCOkJ+9PbQa+uctEmFzu1s=\System.IO.FileSystem.dll
Filesize213KB
MD57de43fff6887ce2c7e1a3e857d9dae32
SHA11c08016b08f44ed510dc3c9b3415c0c437fd6fe6
SHA256d9c448babdcf592e0fcacdffb395ec66ddc74469e9a7fcf281bdacf4f9be7382
SHA512c87ebf4e57ca935f51721d72ad8f46b8468513a0ffbea5d001f72be7c94f4c99b0d793cc589517c348e9e20f62eb8303eedfe0ce6fcf2a4a8b5b10ebd4040d06
-
C:\Users\Admin\AppData\Local\Temp\.net\ConsoleApp1\U938HzO+KxCOkJ+9PbQa+uctEmFzu1s=\System.Private.CoreLib.dll
Filesize9.1MB
MD53bef1d84ef1785381eff399adec681df
SHA16a933f1c9f8f5cecb0ffa9aa0d6b382854ed99ae
SHA25643ccf83cf6dd08e2ba9159990a0b099493667c423de51b1db1191f05a748fe51
SHA5129f436e7eb201927663b93e691d781b44d2d34011215a2b4dbf7584e5d788528f7601a7e9e4bbf422734ab9792984a44eed2bf5d9298940eb37420bfdef2066c2
-
C:\Users\Admin\AppData\Local\Temp\.net\ConsoleApp1\U938HzO+KxCOkJ+9PbQa+uctEmFzu1s=\System.Runtime.Extensions.dll
Filesize202KB
MD5672d0c20b632d42f14f3c4bd2d9d2739
SHA184aee0e0d27900728ef601f68bd5892937453d22
SHA2562f5fd0ebed622e1ee3da1a0b96adc2e3e2a4bd91d231594acc8d6dbed441b604
SHA51276e2c44d166412598994c48cfa8426d09ff782b8b6703fce81710576b2998be6bfaa8f675ca67e3ebf056618a839f929ac6d8016f580c331d11f9f96c3018bc1
-
C:\Users\Admin\AppData\Local\Temp\.net\ConsoleApp1\U938HzO+KxCOkJ+9PbQa+uctEmFzu1s=\System.Runtime.dll
Filesize52KB
MD56874d29dc20943dd13b3898cd54cdd88
SHA13eb8c35b2792f5433f45bb4f04e63fa16e7d9782
SHA25620a1ecc100a50c567c170063b18e1fdb0f9d41ea5878981bd3c38f95544ca529
SHA512c800164aef2b1bfbd01f16360184bd416536ee4e182f39317f89702465d11616ce320575e6e442552142957f027a3012126eed54c32ed39d585a357fa26f01b0
-
C:\Users\Admin\AppData\Local\Temp\.net\ConsoleApp1\U938HzO+KxCOkJ+9PbQa+uctEmFzu1s=\System.Text.Encoding.Extensions.dll
Filesize14KB
MD5128862b6211e4968b44c417be3b7373b
SHA1acae1850a6082e2f8ab717377d63b0a771a8d970
SHA2564b406bd4a1a4c7d4015d5c7f5cf9671dec32209e22f9b1872d85876ac72c77db
SHA512c06a0fc69379139be339d64e6a3c474f910743b80691055e8d7b7340a89175a312ba78f282e03cb96568f031de84700d2896c06d8c2749211708b6807acec0f1
-
C:\Users\Admin\AppData\Local\Temp\.net\ConsoleApp1\U938HzO+KxCOkJ+9PbQa+uctEmFzu1s=\System.Threading.Thread.dll
Filesize17KB
MD5e28b58d37ecfc7eceaf280ed742343f5
SHA1bb9a306bd8be1579f81edb80ad0114d28d2bd114
SHA256de01a740531b6411d8b01a38a416b6388d755954a7d29d6b50ca71f0ae4c96bc
SHA51283dbaf4e873e8174ae9716ca1b8300636761902da5c0232d3b4de31e51c95494e23a67859576804412c345b01813cdfa60ce034d9c8f89374c1e0c7ac4a55aa6
-
C:\Users\Admin\AppData\Local\Temp\.net\ConsoleApp1\U938HzO+KxCOkJ+9PbQa+uctEmFzu1s=\System.Threading.dll
Filesize75KB
MD5c8d25e5421e63e07974aa119971b56f5
SHA166d4dddd001bb3e432c575cfee094cb6d4dba0bc
SHA25648f28a34628f517ec1693a5ed02ec30c2cb354a8423c43327825ead731ccadc6
SHA512bbcc3746c978cc68f14ea735652841068822d606ad63b87538953569a9d683d5df0aa1d6901f65234de82730baf14e652879ffa8ee9fe72328fab91780ebe428
-
Filesize
1.2MB
MD58e636859f42c166c13eb041311299b8a
SHA1d5b0d5104c5cfe1b7b2c95d7680c2e84d4f0d70b
SHA256d713a5bafa2ef2fa7c1594d9c22d03357f62f8cb359208bf9e3616639dc351f9
SHA512a5fbee9f04f5ef53c6ab2c666cb1f9e620ceacb25fc2eeb8a079887e2f3f3a3bbee88c6036d39125138f93c599986697444707db90e5ac30515e59d54246e094
-
Filesize
567KB
MD53b8a019ead86792e48c917bfaa0847cf
SHA1a77d874e0fe4e3aa061145c67daa64f3b17bca69
SHA256f66765ec290d8322454831df20730b83b41bc5949b58ebbd92092fdc19f57af3
SHA5129bdf4cb786376e00576315bdb730e580b1b3a6537a0bef3a640db37b0ad87fb4db511bb4b6f65e10cec163ecca656cda29d35e93fbd05253b449497662753b11
-
Filesize
396KB
MD5307b6f5832c5b80c8bc87d97b67e4775
SHA19ab2916ae987ebf0131bab10e449933f3fadcfc0
SHA2567652aeb0ecb06119b0871f6b850193d3ffae73e22bf207c81b67b155afa85991
SHA512cec6e1b2c278b287fc05767a7c596b8f1d180d24ca5be0d4ed484ca8e82487bcc804245e6c60e45852ba7964a3b288f42504c792a617f5200b461089d7a9219b
-
Filesize
382KB
MD5314f06e61af6221c9b4b0af77e1af522
SHA173b811d6488ab3dbb7edf9cf7d3daa0ce2343585
SHA256ee653d530f0ba5bf0e7f691825dcbd2dc6995374820d7e4aef0604cc47c3b3ab
SHA512b05785222438da0f1b0a30ed77d3977c8a96fda00cfe8475816cbcc9b05176253d8a150d713ca99f58145d36ecce7ab643cfc15def39e1169a122dcc2cbd863b
-
Filesize
112KB
MD547eda957551584d4338ee35f5fe6798f
SHA14b5220c3f6db4d29a2d98baa972ca3dc9d0a0762
SHA256f3ea52f01fc8bdf8f9016f5f06d2903f30fc881fd00a025a7751b63e36d8c642
SHA512cb50fb96c860793bc21c6a9c5017748dc91243e459347599550ed816e5b7c343d5d027294169c39e081e44e42c220b5ae03dba9333832ed93d914a1e58baea2b