Resubmissions

30/04/2024, 19:07

240430-xsnlysff98 6

30/04/2024, 19:02

240430-xp4h1adg51 3

30/04/2024, 18:59

240430-xm3hxsfe56 3

Analysis

  • max time kernel
    204s
  • max time network
    142s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30/04/2024, 19:07

General

  • Target

    Awesome_Themes_for_Win_10_11.zip

  • Size

    11.0MB

  • MD5

    5dd2dd6e7ae7ba639b692ef2b6d3f1a9

  • SHA1

    c5d0572b5da16ad7bb4e02c7b72fcf73cc5e60e1

  • SHA256

    2e2656188213e45009dedd4f6ed00c31620718d802fa02d7474885a8af687bca

  • SHA512

    e10944375345952544343d1215d0a3c13ed2587c9c128443f084f2f0304cf0c7f4118f34ada391a02dae9565873df4474f47241947600bb0b5d6df3c6ecb3c41

  • SSDEEP

    196608:EAuqcoJDcYJqsKeEjs44hQ6yshDrtcarr5Ds4ZRi8eNL8ce5XiGTfejhVMhYedk:EvItnKeU0Q6y2Dx5rr5gsvZrX3WFVMho

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Awesome_Themes_for_Win_10_11.zip
    1⤵
      PID:4388
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1496
      • C:\Users\Admin\Desktop\[Setup] Awesome_Themes_for_Win_10_11.exe
        "C:\Users\Admin\Desktop\[Setup] Awesome_Themes_for_Win_10_11.exe"
        1⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1664
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -ExecutionPolicy Bypass -Command "(Get-CimInstance -ClassName Win32_VideoController).Caption;"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3180
      • C:\Users\Admin\Desktop\[Setup] Awesome_Themes_for_Win_10_11.exe
        "C:\Users\Admin\Desktop\[Setup] Awesome_Themes_for_Win_10_11.exe"
        1⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:564
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" -WindowStyle Hidden -ExecutionPolicy Bypass -Command "(Get-CimInstance -ClassName Win32_VideoController).Caption;"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1372
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
        1⤵
          PID:1812
        • C:\Windows\system32\taskmgr.exe
          "C:\Windows\system32\taskmgr.exe" /0
          1⤵
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1480
        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:3524
        • C:\Users\Admin\Desktop\[Setup] Awesome_Themes_for_Win_10_11.exe
          "C:\Users\Admin\Desktop\[Setup] Awesome_Themes_for_Win_10_11.exe"
          1⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4668
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" -WindowStyle Hidden -ExecutionPolicy Bypass -Command "(Get-CimInstance -ClassName Win32_VideoController).Caption;"
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1220

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\[Setup] Awesome_Themes_for_Win_10_11.exe.log

          Filesize

          2KB

          MD5

          04c205a3fc79005c66d4269dc600e0ab

          SHA1

          1f128399af931eea6a0fcaf11fafa2fc6eb16b65

          SHA256

          9460dd54a9cd6128a3b63e87c234f9374c8c6320993f59d97092f9b6b331ae9e

          SHA512

          1a1036df8b88c74c373c371ee65ab9c4893d74b9488507604cfa13d82d1bc2d81686521f4d5196ada5e59831eba4f1bbe2b96210b41a3e41aa64bf7ec71f781d

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          05850c6c0442ea6966fe2a888f219f4b

          SHA1

          e6b1c8eb783b307672a6f06b785a7e9b78633b46

          SHA256

          f51b54c5f5074076216b2d0a3e66c13e80d8f1da311614ec15c9170dff11ad5a

          SHA512

          9db20e00e103700f67256568e38f9b37f29af3c30f3454a38b3e033c6c2f6bd796c5b5a8c5faa98bb45d7521d76c2bf323d503b8a0196cacbd701167d441c6f9

        • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

          Filesize

          9KB

          MD5

          7050d5ae8acfbe560fa11073fef8185d

          SHA1

          5bc38e77ff06785fe0aec5a345c4ccd15752560e

          SHA256

          cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

          SHA512

          a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          0bf24cb5afce6a795556c5f78e5596d1

          SHA1

          346f801251325229af06f880c0df9b146d29b2cc

          SHA256

          1a9adebf24ba029a5dd5a93807b745becae8790bc5bc7309257ae09bdb66d08d

          SHA512

          538e400a94c04af4ec99c6b00f96a50822aa6c397bed8b4fdc38f045633558f1a7ab8ac67bcf96d1da2f588d90b8f586aed65818cb7062b6f9b9d3a9dbfe6872

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          e67ab234089ef141250c6521ce7160f9

          SHA1

          5f41f6f2792ea49624beb224540e49af2d2af64c

          SHA256

          9e6f6d7ba3d7680da46ec97835da89148d3566a7855b38b118ff079f1f62c315

          SHA512

          67ff32bdcbdaeca51bfbbfa1980bc725c89f361ae4629c49f3cc04cb89d5a8502a1de0d96d78b4c38558cff16d1b95ebd2f396c8c9fbc85966e33de6cd56065d

        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

          Filesize

          10KB

          MD5

          2f686552f463dacb3a39e97d1a410c9d

          SHA1

          e4fe9947c26763394b6cd14fa1df940c9af7de73

          SHA256

          6cad84b8c5018d81884c058a9c3482291eaed55fe439371ccf677519652b51b6

          SHA512

          9eb4a075437e51691420c8c25c32a905735c686f6ae2206a852405a3eae902fb6f66e23b8b817e724505257a78c8f174481bdd4b6f229d2c899983c77826a449

        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

          Filesize

          10KB

          MD5

          52b2c896bd2592cfba6006c70afb9c33

          SHA1

          85b5af5a859462eb5b9db12e9bdaf60063a098cf

          SHA256

          899500eb02c81213d25e4d0b76cd212b00d1c846cc28e49d2817871bbd41f4b7

          SHA512

          aa2e60992dcbe782d185517369e8dbc440d84b3f4ba098125907eaa416bfadf7fb5f0fdf72dcfaa2860756a6d861e4459245f87b6b02b37218bf19caf5d36bb8

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_azvyhqmp.nly.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/1480-58-0x000001394F0D0000-0x000001394F0D1000-memory.dmp

          Filesize

          4KB

        • memory/1480-60-0x000001394F0D0000-0x000001394F0D1000-memory.dmp

          Filesize

          4KB

        • memory/1480-67-0x000001394F0D0000-0x000001394F0D1000-memory.dmp

          Filesize

          4KB

        • memory/1480-66-0x000001394F0D0000-0x000001394F0D1000-memory.dmp

          Filesize

          4KB

        • memory/1480-64-0x000001394F0D0000-0x000001394F0D1000-memory.dmp

          Filesize

          4KB

        • memory/1480-68-0x000001394F0D0000-0x000001394F0D1000-memory.dmp

          Filesize

          4KB

        • memory/1480-69-0x000001394F0D0000-0x000001394F0D1000-memory.dmp

          Filesize

          4KB

        • memory/1480-70-0x000001394F0D0000-0x000001394F0D1000-memory.dmp

          Filesize

          4KB

        • memory/1480-65-0x000001394F0D0000-0x000001394F0D1000-memory.dmp

          Filesize

          4KB

        • memory/1480-59-0x000001394F0D0000-0x000001394F0D1000-memory.dmp

          Filesize

          4KB

        • memory/1664-34-0x000000001DFA0000-0x000000001DFA8000-memory.dmp

          Filesize

          32KB

        • memory/1664-32-0x000000001DF50000-0x000000001DF5E000-memory.dmp

          Filesize

          56KB

        • memory/1664-5-0x000000001AE90000-0x000000001AEA2000-memory.dmp

          Filesize

          72KB

        • memory/1664-4-0x0000000002400000-0x000000000240A000-memory.dmp

          Filesize

          40KB

        • memory/1664-45-0x00007FFAFCCA0000-0x00007FFAFD762000-memory.dmp

          Filesize

          10.8MB

        • memory/1664-35-0x0000000020590000-0x000000002061A000-memory.dmp

          Filesize

          552KB

        • memory/1664-0-0x0000000000130000-0x000000000018E000-memory.dmp

          Filesize

          376KB

        • memory/1664-33-0x000000001DF90000-0x000000001DF98000-memory.dmp

          Filesize

          32KB

        • memory/1664-1-0x00007FFAFCCA0000-0x00007FFAFD762000-memory.dmp

          Filesize

          10.8MB

        • memory/1664-6-0x000000001BB50000-0x000000001BB82000-memory.dmp

          Filesize

          200KB

        • memory/1664-31-0x0000000020890000-0x00000000208C8000-memory.dmp

          Filesize

          224KB

        • memory/1664-2-0x000000001B0D0000-0x000000001B0E0000-memory.dmp

          Filesize

          64KB

        • memory/1664-3-0x000000001B200000-0x000000001B316000-memory.dmp

          Filesize

          1.1MB

        • memory/1664-7-0x000000001BB10000-0x000000001BB20000-memory.dmp

          Filesize

          64KB

        • memory/3180-28-0x000001FC741B0000-0x000001FC741D4000-memory.dmp

          Filesize

          144KB

        • memory/3180-27-0x000001FC741B0000-0x000001FC741DA000-memory.dmp

          Filesize

          168KB

        • memory/3180-26-0x000001FC73F10000-0x000001FC73F32000-memory.dmp

          Filesize

          136KB