Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 03:44

General

  • Target

    Eleven.exe

  • Size

    246KB

  • MD5

    c3050a0c5265ec60b0cfba5283aaedad

  • SHA1

    fe0b37ad1b70bf454d760e370fbdcf108e18b59a

  • SHA256

    8640f526d35e7af50d43e9b15a90b35b0f45d213bc680842108e982d337dc0b4

  • SHA512

    e008e49020ce505c3f75eb051d64eccfd3ca2b81b851ddbfdd2df44d234fdec6034590c73ef466406824a03e394be60c772b3ea3ce6f297c09f573868a02fc80

  • SSDEEP

    6144:j+x/LcTEyF1dH3VOVw44UOisbaxHUsAxyOzk9jAOb:/BREcUkHxy8yA

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • Blocks application from running via registry modification 1 IoCs

    Adds application to list of disallowed applications.

  • Drops file in Drivers directory 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 64 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Eleven.exe
    "C:\Users\Admin\AppData\Local\Temp\Eleven.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • UAC bypass
    • Blocks application from running via registry modification
    • Drops file in Drivers directory
    • Checks computer location settings
    • Windows security modification
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1356
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /tn "Windows Update" /tr "C:\WINDOWS\SysWOW64\Eleven.exe" /sc MINUTE /mo 1 /ru SYSTEM /f /rl HIGHEST
      2⤵
      • Creates scheduled task(s)
      PID:2012
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /tn "Windows Update" /tr "C:\WINDOWS\System32\Eleven.exe" /sc MINUTE /mo 15 /ru SYSTEM /f /rl HIGHEST
      2⤵
      • Creates scheduled task(s)
      PID:3024
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{a7b82f7c-73a1-4f1e-b6f0-3c377fa780a8}\up5nyik2.s0s

    Filesize

    16B

    MD5

    8b6174b915f739c1c9f3ffd16056b663

    SHA1

    14ce561e085828e8d29120af5e61fa8c76438120

    SHA256

    92810fc1d064507a328c34eaa18e7ec990eec023afa114c90331601c16d0fd0c

    SHA512

    f7bd5079f9e2fcafdfde9d1461318ac50a5999926b263e2276b8b2fc52d1515daa10d6ab94f387b6e3d35c066004e44f16c6621fb47d344cd93b4656d2f8eedc

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{a7b82f7c-73a1-4f1e-b6f0-3c377fa780a8}\wphe0ph1.s0s

    Filesize

    16B

    MD5

    58d730d71c9194cd0fc2c3fc4ce869c5

    SHA1

    58df2056b36435d33582f8a41b96803ff03a32b0

    SHA256

    198b0f02fbf58fee533102d71c2085fadeea9f66881663f9028b554ece49a8cc

    SHA512

    9f8cc0a05f2b18649538344c89319263db0b7e7f7aa476b6e86a54c8e384654d0cc09653b17ff3ffec2a3450acc203be1d1401ed9de3e07fdf0da9b938cfd2b9

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\4ioubuci.s0s

    Filesize

    48KB

    MD5

    66970bd68fc0ba5f6eb9e82b57f0e0f3

    SHA1

    a2163d9bd6d619e25be8d45ff587d6190ba30d75

    SHA256

    6e26234d4fc89bb9de8b4d3d31db5ce1cba8c3a6f6ec6c8c2acbbc6e9d5cce5f

    SHA512

    b2e543d05e32f5a5e4041db450107d6fc84c1ac7e6564ac86d35e686b590e951d3757465a7c26b8f5ce8320e6b46ff495f73765d9a9a9b99e27c158c65233f80

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\k1twd3nz.s0s

    Filesize

    66KB

    MD5

    2754ecd7ef2d17cd93d691462debfa1c

    SHA1

    52d2719252ac8806e35844f0356c0dd05b0048bc

    SHA256

    ad2d1dd6f64090c7967364411583ef9814d76f7d340427f7ecfc148effa19d64

    SHA512

    2ddac67f51f00d61bbb37930d0dfff4f0ff098746ba1e703f8361680f14b8d8f3279bc3d1d771c5b1324e10d747681adc4aa75331adf4affd2f305de4ae9db9f

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\lbkrva3s.s0s

    Filesize

    77KB

    MD5

    e602432012c54b965ef88becbb147a00

    SHA1

    9504b71e581f07bbc0f519eba9edf842c072f79d

    SHA256

    9f30546487bd37142cd719f0fff08caa04d63ac786a67270303ba09bf715f238

    SHA512

    1878750d845e3db96e3ad4d78d3812b89989b857fdbaa1e3774dc676b09cadf40de10eb9c8cededc6f56f5d99b99e9dcdb441d90e165fd0234ffafc02195fc3d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wopbrfoh.5tv.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Windows\ImmersiveControlPanel\images\eujyz0kv.s0s

    Filesize

    992B

    MD5

    c9421d0fb37360e6f75971de6dd6f159

    SHA1

    addc74e375a4fe237914ec6d026e3fcfef682813

    SHA256

    3861e75c8df8ba37fbebf100e356fd50b0cd1ee924549fdb0c705c0feaaa3e73

    SHA512

    ae37bb70f34c9cd84ca263df291fc0484192ee9d99f6dcc3272fbb2636c9a0cb240091c1a5acde2298fe48fd5747a0682c597e5f5a0e68c7b2b3d7b52ff78371

  • C:\Windows\ImmersiveControlPanel\images\jmlsuq2e.s0s

    Filesize

    576B

    MD5

    9da24842d7efe85aecff90fd3ba994b5

    SHA1

    392c3cc879d1a5d44200f91ccdf8fde60f538734

    SHA256

    0005186a23a5acd30a5fe296f168e6ae7bc1edd92972af38809405fa81f4d0af

    SHA512

    6dc1b1e6376a9b9b383222520be974e969abefb32142af879e87a84c81e7707b85ecdd47328afa9770bd0c891c4805fc8ed74ff1b0d56eefd4e3978b739c7c95

  • C:\Windows\ImmersiveControlPanel\images\qs0zps24.s0s

    Filesize

    368B

    MD5

    20979b47276d4509f0da18b6ebfe4bde

    SHA1

    98110c602dacc7434b2e22de86df049c25ffd42f

    SHA256

    fe8475f04260a271e7d2a134c34a72c463fc825c410b6d65bf769b0008f10364

    SHA512

    258c7acfb659a18f27f8587f31e0454e48fd01f04219fd85fbe49fdaf39a00197e3d0686f3e9d61080273a6460375afd60d96d2590bdfe34d4690907e208a998

  • C:\Windows\SysWOW64\Printing_Admin_Scripts\it-IT\1khu3fdr.s0s

    Filesize

    104KB

    MD5

    db59429f6463fe62978c948a4388b25e

    SHA1

    0fc8ed213126131acfaed948a65be0836bd1136e

    SHA256

    36a68b607a16be8a5c5c2a118e69a2655c22a7302486e55817cc066c0ac05d15

    SHA512

    3bc102dda05a9edf3dda2e57162133d7a5ff1c7c393c9b84caf6234276eecf75a88d8017bc44719f24406dff9f049ca88818a600328fd0456a34ffe4d3da6e83

  • C:\Windows\SysWOW64\Printing_Admin_Scripts\it-IT\zsezjme1.s0s

    Filesize

    56KB

    MD5

    cd60e4f4bd8d8f1a236d883e19b4a1c5

    SHA1

    ddfe00c2796b647ae97c5a3882d5f6af7d640739

    SHA256

    a5aebcb48ec8dd398ec364a2e75e1ce2dbec5f1d50ccbada4849c722ebd38eb0

    SHA512

    5ae6583701cc09f2ae00437f3e6749bebcb0efa998c36726f5bcbeaed02c242cca07594653b24a3357649bf98a63164a2c7d7bfe17f237639d938699d68ed434

  • C:\Windows\SysWOW64\fr-FR\zhye2pbt.s0s

    Filesize

    992B

    MD5

    8a48aa1c8b610ec7491d7cf5b0fe3e9a

    SHA1

    391e9b5aec8749918e08d55cb6148de334a774e8

    SHA256

    1c613213246fda71c134ed1733959bd36bdfd1e4c6d45817069c7a79d86ceabb

    SHA512

    43664d21038aeb2c422bc6948533c6112c5435d6fc7b66225b841a0dd38aaa3659893de1c1af274a773f757cb44680739971f5c0ab7f99649d60d637005bc24a

  • C:\Windows\servicing\Editions\hntv2y2t.s0s

    Filesize

    30KB

    MD5

    ac4c9912557e7dc17a1659721e7bbd9d

    SHA1

    30e643309fda62bed4d15cd99a14d224b6e35deb

    SHA256

    c86a0ce403c1ba567d83fdb404c2d7abda23bae0ea26dbf93bbcc09517ba1c96

    SHA512

    577d467ebee57f75b3ec4e92f7ff6fe1f33c7536be098295c314037633e5aea2da5529c5d3e39d8917ac480a364fb394f6be29fd25a87f94463875933ac84530

  • memory/1356-55-0x0000000074530000-0x0000000074CE0000-memory.dmp

    Filesize

    7.7MB

  • memory/1356-54-0x000000007453E000-0x000000007453F000-memory.dmp

    Filesize

    4KB

  • memory/1356-1-0x00000000005B0000-0x00000000005F4000-memory.dmp

    Filesize

    272KB

  • memory/1356-2-0x0000000004FC0000-0x0000000005018000-memory.dmp

    Filesize

    352KB

  • memory/1356-3-0x0000000074530000-0x0000000074CE0000-memory.dmp

    Filesize

    7.7MB

  • memory/1356-0-0x000000007453E000-0x000000007453F000-memory.dmp

    Filesize

    4KB

  • memory/3828-48-0x0000000007160000-0x0000000007168000-memory.dmp

    Filesize

    32KB

  • memory/3828-37-0x0000000074530000-0x0000000074CE0000-memory.dmp

    Filesize

    7.7MB

  • memory/3828-39-0x0000000074530000-0x0000000074CE0000-memory.dmp

    Filesize

    7.7MB

  • memory/3828-40-0x0000000007480000-0x0000000007AFA000-memory.dmp

    Filesize

    6.5MB

  • memory/3828-41-0x0000000006E40000-0x0000000006E5A000-memory.dmp

    Filesize

    104KB

  • memory/3828-42-0x0000000006EB0000-0x0000000006EBA000-memory.dmp

    Filesize

    40KB

  • memory/3828-43-0x00000000070C0000-0x0000000007156000-memory.dmp

    Filesize

    600KB

  • memory/3828-44-0x0000000007040000-0x0000000007051000-memory.dmp

    Filesize

    68KB

  • memory/3828-45-0x0000000007070000-0x000000000707E000-memory.dmp

    Filesize

    56KB

  • memory/3828-46-0x0000000007080000-0x0000000007094000-memory.dmp

    Filesize

    80KB

  • memory/3828-47-0x0000000007180000-0x000000000719A000-memory.dmp

    Filesize

    104KB

  • memory/3828-23-0x0000000005F80000-0x0000000005FCC000-memory.dmp

    Filesize

    304KB

  • memory/3828-51-0x0000000074530000-0x0000000074CE0000-memory.dmp

    Filesize

    7.7MB

  • memory/3828-38-0x0000000006D00000-0x0000000006DA3000-memory.dmp

    Filesize

    652KB

  • memory/3828-35-0x00000000060E0000-0x00000000060FE000-memory.dmp

    Filesize

    120KB

  • memory/3828-22-0x0000000005AF0000-0x0000000005B0E000-memory.dmp

    Filesize

    120KB

  • memory/3828-21-0x0000000005500000-0x0000000005854000-memory.dmp

    Filesize

    3.3MB

  • memory/3828-11-0x0000000074530000-0x0000000074CE0000-memory.dmp

    Filesize

    7.7MB

  • memory/3828-9-0x0000000004C10000-0x0000000004C76000-memory.dmp

    Filesize

    408KB

  • memory/3828-10-0x0000000004C80000-0x0000000004CE6000-memory.dmp

    Filesize

    408KB

  • memory/3828-8-0x0000000004B70000-0x0000000004B92000-memory.dmp

    Filesize

    136KB

  • memory/3828-7-0x0000000004D50000-0x0000000005378000-memory.dmp

    Filesize

    6.2MB

  • memory/3828-6-0x0000000074530000-0x0000000074CE0000-memory.dmp

    Filesize

    7.7MB

  • memory/3828-5-0x00000000021F0000-0x0000000002226000-memory.dmp

    Filesize

    216KB

  • memory/3828-36-0x0000000074530000-0x0000000074CE0000-memory.dmp

    Filesize

    7.7MB

  • memory/3828-25-0x000000006F480000-0x000000006F4CC000-memory.dmp

    Filesize

    304KB

  • memory/3828-24-0x0000000006AC0000-0x0000000006AF2000-memory.dmp

    Filesize

    200KB