Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-05-2024 22:06

General

  • Target

    4df3a1ac112c6b88c3fef0b967cbb4fb5c86eb1828489f762ffc86f4a76d9578.exe

  • Size

    71KB

  • MD5

    4a975afe225dcf7571d1a96200d9d77e

  • SHA1

    c4fcd60fe5bc1ada4a32a329790e2ffc280b1e7c

  • SHA256

    4df3a1ac112c6b88c3fef0b967cbb4fb5c86eb1828489f762ffc86f4a76d9578

  • SHA512

    8cbe0aceed0beefabfadb2f8c072504373a70b87823b39f4c4a085fece7b2488e99be92707c5ee8dce4da7a1445e847ced999ee953fba78d562d0d113a36e3d5

  • SSDEEP

    1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8slJ:Olg35GTslA5t3/w8U

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3424
        • C:\Users\Admin\AppData\Local\Temp\4df3a1ac112c6b88c3fef0b967cbb4fb5c86eb1828489f762ffc86f4a76d9578.exe
          "C:\Users\Admin\AppData\Local\Temp\4df3a1ac112c6b88c3fef0b967cbb4fb5c86eb1828489f762ffc86f4a76d9578.exe"
          2⤵
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1328
          • C:\Windows\SysWOW64\ipkeroos-aced.exe
            "C:\Windows\system32\ipkeroos-aced.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3728
            • C:\Windows\SysWOW64\ipkeroos-aced.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:2820

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\eatvoxug-eateas.exe

        Filesize

        74KB

        MD5

        b042cbc9bf449ba5f8c7c9dfd3d551af

        SHA1

        2567d040adf5d4e60c230c6d8742d9211ac5b536

        SHA256

        47bec4cbc0d6c9a731e3b5ab699b4076a6701202b036ff3f07fc80e7e2bad9c4

        SHA512

        a103449d0bd2e7846f696e30eaf137b8219b31f4f8b9d34164d8b267372afbe3421d671e4517ab7a1c5ec0911770dadcf6a1449b92cebbeb58f6966e2cac2911

      • C:\Windows\SysWOW64\exmuxod.dll

        Filesize

        5KB

        MD5

        f37b21c00fd81bd93c89ce741a88f183

        SHA1

        b2796500597c68e2f5638e1101b46eaf32676c1c

        SHA256

        76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

        SHA512

        252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

      • C:\Windows\SysWOW64\ifkuxix.exe

        Filesize

        73KB

        MD5

        87791b3c773990ed454e3da2ece2ec9d

        SHA1

        65da06d6fd5f2017937d68e679eb1831efae4f43

        SHA256

        f2fb05bb8ec110b900dea90cc325ef2d4a22d4c4939e5c9ecf523b8788a8fe30

        SHA512

        28d2dd903e5530c4d8b55e703700755123cf809aae7a2d7b67cdbe0ad79bc2dfffadab977afab6b810d2660f33a159551e2acf89158c4f0de17a0b677403fbbc

      • C:\Windows\SysWOW64\ipkeroos-aced.exe

        Filesize

        71KB

        MD5

        4a975afe225dcf7571d1a96200d9d77e

        SHA1

        c4fcd60fe5bc1ada4a32a329790e2ffc280b1e7c

        SHA256

        4df3a1ac112c6b88c3fef0b967cbb4fb5c86eb1828489f762ffc86f4a76d9578

        SHA512

        8cbe0aceed0beefabfadb2f8c072504373a70b87823b39f4c4a085fece7b2488e99be92707c5ee8dce4da7a1445e847ced999ee953fba78d562d0d113a36e3d5

      • memory/1328-6-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/2820-50-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/3728-49-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB