Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    20-05-2024 03:52

General

  • Target

    e3aaef1cf6d4ca0a0cfd557c0cf7f11ffebf04312d77fd51590ad2e6c275dc6e.exe

  • Size

    63KB

  • MD5

    371164f87275c60b2e1451c46588ffee

  • SHA1

    59975974d2aa2bf1cd9a8e325a2647dca1e5d3db

  • SHA256

    e3aaef1cf6d4ca0a0cfd557c0cf7f11ffebf04312d77fd51590ad2e6c275dc6e

  • SHA512

    26cf1345cf8da4b39245ab982fd0c513865ec2801fb35ef58e320a7fc05c38b59a0bfb1c63ee233ff174eff89f567459369e0ed744fea5f2609040c2e79ada20

  • SSDEEP

    768:jSxam3Usjr3REXXr8yxFChMp7v9DLKrzCnbcuyD7UVeQI5no6cAvcV4RP0U+t6:jRsjdEIUFC2p79OCnouy8VDlAG4RsfU

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • UPX dump on OEP (original entry point) 20 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3aaef1cf6d4ca0a0cfd557c0cf7f11ffebf04312d77fd51590ad2e6c275dc6e.exe
    "C:\Users\Admin\AppData\Local\Temp\e3aaef1cf6d4ca0a0cfd557c0cf7f11ffebf04312d77fd51590ad2e6c275dc6e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1200
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2020
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2784
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1132
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2024
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1824
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2328
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    63KB

    MD5

    452dbd36f67e05644d1925332b3987c4

    SHA1

    ca2b625addd16a312fc170078cd89581fb52bea3

    SHA256

    8fb1460fb95254c3c2f3af90b6b1c12d720e039252387ebb5a578c064f5d7f7e

    SHA512

    7c0a1268c6d07b57020b84fff456214b154a242c168a63c6017585702826350459766ee4ae8e56693b77df08395b741fd6837e0fba578b087d28c443032ab319

  • C:\Users\Admin\AppData\Local\services.exe

    Filesize

    63KB

    MD5

    371164f87275c60b2e1451c46588ffee

    SHA1

    59975974d2aa2bf1cd9a8e325a2647dca1e5d3db

    SHA256

    e3aaef1cf6d4ca0a0cfd557c0cf7f11ffebf04312d77fd51590ad2e6c275dc6e

    SHA512

    26cf1345cf8da4b39245ab982fd0c513865ec2801fb35ef58e320a7fc05c38b59a0bfb1c63ee233ff174eff89f567459369e0ed744fea5f2609040c2e79ada20

  • C:\Windows\xk.exe

    Filesize

    63KB

    MD5

    c3a072029121e860bbc0d2fb75159329

    SHA1

    89d7de75fd29663cf2ce166a3304c6c9011a9615

    SHA256

    395d37823eb64b92f4ae7e1d4ab6179062d5eba0b3fbcca3c916c4cb18500e44

    SHA512

    7a47d8d4b7d3e89ed86c7fa945bf45b4f284164b7867916a882f89740f9051c47e454013e7d13c8ea281d78cc5848a155c7ee7af4801962f9c8b5fa4c9609459

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    63KB

    MD5

    1cce22f485735efa2de6042783c01847

    SHA1

    55c67f6044c845618f730a9f2df464943cf21fe2

    SHA256

    4f61613194369f9e243d3b3e57cb757af04dcc436a7c2558f1a0ab2777559608

    SHA512

    2e0ad4f1abffdabfb68df99a1bb8d7944dcdca73c970994d626e8f7994889e5f012350a8a1adfb731b1cb5065097165c085a4b3a992c22492187918ce054b20e

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    63KB

    MD5

    d7832a2061aeecaaf72853d60a4f9f77

    SHA1

    60fc44ee9056bf00fbc5265d43e2ab93b42ff647

    SHA256

    a63c75f4d2fdc71bb2783f5feec060009557e4666a919a73ba79c34a1b0babf9

    SHA512

    1c315ea3a9dce8a7b75a1628b1e95fd199c02629b242f96cfec0492df51cbadbc5252dfb22ad28edcb0b7b199830711f9a73270ceb492227588595467870f051

  • \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    63KB

    MD5

    24caa83990372ef713f7ede8c1366ba9

    SHA1

    47f62f3d275aca78a36ef6ec97f2dfc0388b63f0

    SHA256

    eba01baf67c58a2b7f26e70df9b38945c86017c0ea2cde6101573a8fb5b2081e

    SHA512

    464996cf5242d1a54651240e07eace36338be4fb3bf4aaef1f5d225012a9e5057c83681b503c53b7d3ef0a600c56c27ac23f8cfa253ef2c0b85ef97563b312cd

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    63KB

    MD5

    a1d49ab2bcfc7db7f9b052757811fca2

    SHA1

    962006c4034ba9c853107ef8da5a02bde551cd03

    SHA256

    5f563077468454a73de8f6873460888961f81b96fe320ea18ed151910e3aef83

    SHA512

    0c3684e9cb3a87b231000a396793cd42d3d2c15634397254773f88b819dd603cc56a009f39baf48b0b6e28bf29d00873293c91a169000703cf7ae6aca9c69982

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    63KB

    MD5

    c9810477951552e3397b9c2c021bdb4d

    SHA1

    90c98db741885d2d4553cbf3d557442040cf2e80

    SHA256

    a3707ab0f63fd6570b2af1a590ac4bd1feeccefc959aba954dc647bed919c795

    SHA512

    079d27f1a16b8128f7752a11e78ab6b0a13cfb6426c768a82426e17e1e6c8b482328a8b88ca76f6213b5cc5e7b70e16cc0cc4e0df5d0682964b56b04c0297248

  • memory/1132-140-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1132-136-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1200-159-0x00000000004E0000-0x000000000050F000-memory.dmp

    Filesize

    188KB

  • memory/1200-183-0x00000000004E0000-0x000000000050F000-memory.dmp

    Filesize

    188KB

  • memory/1200-135-0x00000000004E0000-0x000000000050F000-memory.dmp

    Filesize

    188KB

  • memory/1200-134-0x00000000004E0000-0x000000000050F000-memory.dmp

    Filesize

    188KB

  • memory/1200-123-0x00000000004E0000-0x000000000050F000-memory.dmp

    Filesize

    188KB

  • memory/1200-188-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1200-182-0x00000000004E0000-0x000000000050F000-memory.dmp

    Filesize

    188KB

  • memory/1200-109-0x00000000004E0000-0x000000000050F000-memory.dmp

    Filesize

    188KB

  • memory/1200-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1200-165-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1200-110-0x00000000004E0000-0x000000000050F000-memory.dmp

    Filesize

    188KB

  • memory/2016-187-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2020-111-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2020-115-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2024-153-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2328-176-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2784-126-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB