Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2024, 18:44

General

  • Target

    106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe

  • Size

    45KB

  • MD5

    7981f54b51ab1c6d3ce00fe207fc44c4

  • SHA1

    40a02f8d7899f24700d1f86300aee0af17fa8aac

  • SHA256

    106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f

  • SHA512

    b080fd8600b30e1d97ee21f336283dfee84e2a767e626973dc338c39e8454f4a1453945d9d3aaa8dab472adcb7ae00223feb1671a7a3ac539713ae9ca6be36e9

  • SSDEEP

    768:2mFQj8rM9whcqet8WfYUtT92S21XFXRnnePxCXNvF7DFK+5nE1A:8AwEmBj3EXHn4x+9am

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Detects executables built or packed with MPress PE compressor 19 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe
    "C:\Users\Admin\AppData\Local\Temp\106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1868
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2040
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4844
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4004
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4976
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:5072
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2464
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    45KB

    MD5

    b8e491b9a9eaf1e35552b1fc2c118295

    SHA1

    5b1dbae2cc2d0f4a3ca9fa71a2b407003971fefb

    SHA256

    d0d288f6c6e28b26b022d9852b480facf37ff7a5fc30f14a374ad6f04c82725a

    SHA512

    b5c23bfaacce6d0dc83fcece6492be2dd7879e4c007bd660eeef16c18f3676497bb4056cf527076110e5fc47acc9ed738ac9f0941895c093b896534a5c0160dd

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    45KB

    MD5

    a70feddaa072a63357bb468ed29d2490

    SHA1

    88d07faeebce036090806859609e472c4a7cca06

    SHA256

    c9b0e35d70fc9d3dba31e14d3346e5d9a9908d789a8f2370847f4bef279a7446

    SHA512

    d651e72bcedae157dc4eae151f29025feececc8316ad1b791b25c6e3aa4c581d5dbf824bd889f496b7ac21c8339582108cf26f1fb8d4de71b94635417f55cb3e

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    45KB

    MD5

    83b9718aed777302836d93a6da7d5f00

    SHA1

    fe4466153f3dc4a1a091c5fce54ad9dc07f7d404

    SHA256

    621bf43627b164129871bed50149c9f07ef6a07fb9857bf7f916b28ea30bed39

    SHA512

    ad2aa96fa5985f945209b831d30cdc8c2a9207ee5b551fe3523e29d224b71bd6984d7b75b251232d0454fa7ddd62e0767ba27f6e850b26abb3ffaf0ff6da7548

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    45KB

    MD5

    9f1d5fe30bcde40bcd2412048c80e025

    SHA1

    90df5d4596dd5b176003a586bb17d3cff9faf5e3

    SHA256

    da5e065e67103eba3a5d150cc091634df5e2888f60f6fb33f5151b387c19a0a5

    SHA512

    e8adc906d21fa2bfd77fbafc0a15961a02849893f50a23addb375ec841fa8f82622dbf013260394c71e5d329a35eafd80977812bdb719c73b0d9bd0fcb7321a1

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    45KB

    MD5

    7981f54b51ab1c6d3ce00fe207fc44c4

    SHA1

    40a02f8d7899f24700d1f86300aee0af17fa8aac

    SHA256

    106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f

    SHA512

    b080fd8600b30e1d97ee21f336283dfee84e2a767e626973dc338c39e8454f4a1453945d9d3aaa8dab472adcb7ae00223feb1671a7a3ac539713ae9ca6be36e9

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE

    Filesize

    45KB

    MD5

    d861dcd1bf2ff50553b38e2588862265

    SHA1

    adcaee2bae0804496292de3bdeec21570812c1df

    SHA256

    7f3f98fa15740ac057052646ccbfe2b38a00c87d278adf5fee87e4f6d1bf2728

    SHA512

    c10f00187f01971fa7f6d5841d530df668287dbd6df88c45cd5a3e3f15da8617757c137964dc0961df5921d7d05e2bf40370cccaf7aae6994ba38488e69bde90

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    45KB

    MD5

    4b7441df9108c0a5c52de4958c26baee

    SHA1

    64623a672b25f868abb7763e84918b3d28e49c74

    SHA256

    7e319f1c4ce720093573114d6f1d88117c2998ba1801b01aa2d3e51323324093

    SHA512

    ed18fdccd122c88a758eb6cbe2d080562ccb24cd8776aba1b30ba41f73d2dd4d121c02336b01dbb3c065a467ef30f5f40eabd759865d8a8f0825395362420497

  • C:\Windows\xk.exe

    Filesize

    45KB

    MD5

    6dbe8485aa82d6f561f4b29644969dfc

    SHA1

    ccdf963f580677e76f9c6b0e7598e80dc0a2fef3

    SHA256

    028f1fb4eee2c09d8431fcf11e9ac0ca96a6b7044a1f6c524cf49d1629555d92

    SHA512

    0279f984e7840fe9d1d7556d2bc26a0ffae08b5cdf6fa5c5497affaf67823de4d36cc286eb4e2d532ffe6071699f5d3392175736e79c20109886b9e9a5b0c539

  • memory/1868-155-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1868-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2040-112-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2040-107-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2464-147-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3880-154-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4004-128-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4844-118-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4976-132-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/5072-137-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/5072-140-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB