Analysis

  • max time kernel
    507s
  • max time network
    390s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-05-2024 19:10

General

  • Target

    42.zip

  • Size

    41KB

  • MD5

    1df9a18b18332f153918030b7b516615

  • SHA1

    6c42c62696616b72bbfc88a4be4ead57aa7bc503

  • SHA256

    bbd05de19aa2af1455c0494639215898a15286d9b05073b6c4817fe24b2c36fa

  • SHA512

    6382ca9c307d66ab7566acf78b1afd44b18b24d766253e1dc1cb3a3c0be96ecf1f2042d6bd3332d49078ffee571cf98869c1284c1d3e5c1c7dc3e4c64f71af80

  • SSDEEP

    768:hzyVr8GSKL6O3QOXk/0u3wqOghrFCezL1VFJdbq2QTJTw02Q:hGx8DKXE//ZhhCirFi2cwK

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\42.zip
    1⤵
      PID:212
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3432
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3176
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          PID:2412
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 684 688 696 8192 692
          2⤵
          • Modifies data under HKEY_USERS
          PID:520
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
          • Modifies data under HKEY_USERS
          PID:2480
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 684 688 696 8192 692
          2⤵
            PID:4376
          • C:\Windows\system32\SearchProtocolHost.exe
            "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe3_ Global\UsGthrCtrlFltPipeMssGthrPipe3 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
            2⤵
              PID:4092
            • C:\Windows\system32\SearchFilterHost.exe
              "C:\Windows\system32\SearchFilterHost.exe" 0 684 688 696 8192 692
              2⤵
                PID:4056
            • C:\Windows\system32\taskmgr.exe
              "C:\Windows\system32\taskmgr.exe" /0
              1⤵
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:4368
            • C:\Program Files\7-Zip\7zG.exe
              "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\42\" -ad -an -ai#7zMap22300:84:7zEvent26506
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:5044
            • C:\Windows\system32\taskmgr.exe
              "C:\Windows\system32\taskmgr.exe" /0
              1⤵
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4496
            • C:\Program Files\7-Zip\7zG.exe
              "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\" -an -ai#7zMap3663:84:7zEvent16439
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3624
            • C:\Program Files\7-Zip\7zG.exe
              "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\42\" -ad -an -ai#7zMap8401:84:7zEvent30899
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1820
            • C:\Windows\system32\taskmgr.exe
              "C:\Windows\system32\taskmgr.exe" /0
              1⤵
              • Drops file in Windows directory
              • Checks SCSI registry key(s)
              • Checks processor information in registry
              • Suspicious use of AdjustPrivilegeToken
              PID:3632
            • C:\Windows\system32\LogonUI.exe
              "LogonUI.exe" /flags:0x0 /state0:0xa3a97855 /state1:0x41c64e6d
              1⤵
              • Modifies data under HKEY_USERS
              • Suspicious use of SetWindowsHookEx
              PID:4208

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PRICache\1601268389\715946058.pri

              Filesize

              171KB

              MD5

              30ec43ce86e297c1ee42df6209f5b18f

              SHA1

              fe0a5ea6566502081cb23b2f0e91a3ab166aeed6

              SHA256

              8ccddf0c77743a42067782bc7782321330406a752f58fb15fb1cd446e1ef0ee4

              SHA512

              19e5a7197a92eeef0482142cfe0fb46f16ddfb5bf6d64e372e7258fa6d01cf9a1fac9f7258fd2fd73c0f8a064b8d79b51a1ec6d29bbb9b04cdbd926352388bae

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PRICache\4183903823\2290032291.pri

              Filesize

              2KB

              MD5

              b8da5aac926bbaec818b15f56bb5d7f6

              SHA1

              2b5bf97cd59e82c7ea96c31cf9998fbbf4884dc5

              SHA256

              5be5216ae1d0aed64986299528f4d4fe629067d5f4097b8e4b9d1c6bcf4f3086

              SHA512

              c39a28d58fb03f4f491bf9122a86a5cbe7677ec2856cf588f6263fa1f84f9ffc1e21b9bcaa60d290356f9018fb84375db532c8b678cf95cc0a2cc6ed8da89436

            • C:\Users\Admin\AppData\Local\Temp\42\lib 2.zip

              Filesize

              34KB

              MD5

              0a76bd3e26768bba68aca3d210997069

              SHA1

              753690994a18cf58ed0fe3749d16448b763047b8

              SHA256

              9056b87f079861d1b0f041317d6415927d9ffb6498ce2530ff90fda69fa64e78

              SHA512

              14408ea7f44bc365a58d7480fff9ea3b10fa21bfbd3363c6e30b74a4d4121677e20ce1108cce12c203f0760768aee1c1aa69b130e090c409f9a516ea02d70c49

            • memory/520-57-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-52-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-44-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-46-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-56-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-49-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-48-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-66-0x00000299D4BE0000-0x00000299D4BF0000-memory.dmp

              Filesize

              64KB

            • memory/520-55-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-67-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-62-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-63-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-65-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-64-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-58-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-39-0x00000299D4BE0000-0x00000299D4BF0000-memory.dmp

              Filesize

              64KB

            • memory/520-47-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-41-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-59-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-70-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-71-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-74-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-73-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-72-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-77-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-84-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-85-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-83-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-82-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-81-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/520-80-0x00000299D4C00000-0x00000299D4C10000-memory.dmp

              Filesize

              64KB

            • memory/3176-0-0x000001E2C2390000-0x000001E2C23A0000-memory.dmp

              Filesize

              64KB

            • memory/3176-32-0x000001E2C69F0000-0x000001E2C69F8000-memory.dmp

              Filesize

              32KB

            • memory/3176-16-0x000001E2C2540000-0x000001E2C2550000-memory.dmp

              Filesize

              64KB