Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 00:54

General

  • Target

    826ede644dc595c2b65cc745248b0d94df1ece17a4603115dfaef05fa8ef8061.exe

  • Size

    45KB

  • MD5

    9ff775bb3f2a7de5eb589c3e40e1aa3d

  • SHA1

    7f3c86cfcfb69a384943942c65297bb21aaff6a6

  • SHA256

    826ede644dc595c2b65cc745248b0d94df1ece17a4603115dfaef05fa8ef8061

  • SHA512

    d6aad691ad2fc15209b81d953cf03de1e21391f6bcb7b0d5d17654d920edd5005c1c34e415501f224c1c2df57c70eba543f6c289c242116ecf6d915e5a79eab6

  • SSDEEP

    768:2mFQj8rM9whcqet8WfYUtT92S21XFXRnnePxCXNvF7DFK+5nEIg:8AwEmBj3EXHn4x+9a7

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Detects executables built or packed with MPress PE compressor 18 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\826ede644dc595c2b65cc745248b0d94df1ece17a4603115dfaef05fa8ef8061.exe
    "C:\Users\Admin\AppData\Local\Temp\826ede644dc595c2b65cc745248b0d94df1ece17a4603115dfaef05fa8ef8061.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1828
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:756
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3960
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:332
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3836
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3928
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3944
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2612

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

          Filesize

          45KB

          MD5

          779975b004c2cf709c55eea77cee7b6a

          SHA1

          ecdec00672b8df0c4de0b41136ca44020f5beec5

          SHA256

          32cfd1c05f62462ce79e10b4f52275b268355a8179bcf88ab63806e9e34ea128

          SHA512

          6eb6481b4fab60c9bdf579f273439c42e99dae79152fda6b93d1c4bc5b658edc14c4177dbb9d0e7f88db5a89b843e51cd369a3f5a6cf0b651efec19509475b52

        • C:\Users\Admin\AppData\Local\winlogon.exe

          Filesize

          45KB

          MD5

          9ff775bb3f2a7de5eb589c3e40e1aa3d

          SHA1

          7f3c86cfcfb69a384943942c65297bb21aaff6a6

          SHA256

          826ede644dc595c2b65cc745248b0d94df1ece17a4603115dfaef05fa8ef8061

          SHA512

          d6aad691ad2fc15209b81d953cf03de1e21391f6bcb7b0d5d17654d920edd5005c1c34e415501f224c1c2df57c70eba543f6c289c242116ecf6d915e5a79eab6

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE

          Filesize

          45KB

          MD5

          da5aeb87a26a59fe828a3c20b3326553

          SHA1

          cdef9c256f33720a12ba3585febdbd6e6a2e4ac7

          SHA256

          dda4be2fadf2650109187e638565060327e83944a8844d8d303160418dbe418b

          SHA512

          1769d10060eb2649d3658a8d50b14b3e5b844fe794c241c6943f8d80c1004155b1f4819fcbfc49059a1d7dd4e6ffce60271eafd9de074c61e1ca5a5d5bf8d61a

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE

          Filesize

          45KB

          MD5

          b88a08064678c8955a9b559908b30a05

          SHA1

          95d237835bd60fd731faad287abffbdf79ba0f49

          SHA256

          1858e41b1bfc256d0d10e9a3430f8c675ebb3827e5ff9dc5ce369d57b1cb312e

          SHA512

          727ee5e81610f2e1b5a5493fd112ae78cad8df6bc319ab87b1b034c92342bc7a5c8e3f8005c66d4417716b765df0f9a63b8203dfdc5996bca3eabddad0416b41

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE

          Filesize

          45KB

          MD5

          456f0111adf94f8618559d03d858c9e6

          SHA1

          3dafd9885044745d053a2f4bc61862077a1fd40e

          SHA256

          ac098ccba72c30dd678943894df9e564753edff820dbad6fd18511fdbe24c73d

          SHA512

          e839c37bc62011d1305daa555240bfa041f939bf64b30aeaab3902a9bb27c4e03457f7aa636454af9ad359cc530f0a8ebc5aa9ce189a63c0aec801efa215e1b5

        • C:\Windows\SysWOW64\IExplorer.exe

          Filesize

          45KB

          MD5

          144506bb1ca6cfe11193fd5eee73fb4d

          SHA1

          b5a0a942bca8ad320ce9beb2aef55ddfefed2db1

          SHA256

          483bc7b1ed7377ff41989d218fa93d840065947940f850411430c9d5c9386add

          SHA512

          4387c929fd5c3f834c32690a85412992db1df88e306c0763ab68e4cb6493472e0b19fdaf5542354b08ec4202c6d704eb72e26df05a065f584ef5649196ea9ee2

        • C:\Windows\xk.exe

          Filesize

          45KB

          MD5

          693152791c83aa55c8891bdeee42ee1f

          SHA1

          1db0d508d35706b0fcbf2873bd57a44927e1ecdf

          SHA256

          853adf3adaf17c02f74b8bc2b1a22463a7cfa73dff5c3170543ebbf5195556c0

          SHA512

          683d2097b939bffe0cc974a8b77881d3e5c797f046409e1fbf57db610ae23bad6eaa6db8d5d31a1ab1b5b1250dba3b0e7ac4f2243e1fef3b67c73b0b0f808580

        • memory/332-125-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/332-123-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/756-108-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/756-112-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1828-150-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1828-0-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2612-151-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/3836-131-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/3928-137-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/3944-143-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/3960-118-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB