Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 02:07

General

  • Target

    819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe

  • Size

    91KB

  • MD5

    7cc3ebfb126590fe4dfd67558a765ee3

  • SHA1

    47d89c5aac13ef061c9225611e026a9322c64806

  • SHA256

    819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca

  • SHA512

    fdc939ccfd37e5d72a468b6c5d307f51909816efb5843f4cde442e4c12e5cc6df0ab14fa324ad7775d7b18b1b2322b896c6b2e2ade0ad9d8234f261fd7b6aa08

  • SSDEEP

    1536:zAwEmBZ04faWmtN4nic+6Gw3AwEmBZ04faWmtN4nic+6GoV:zGms4Eton0w3Gms4Eton0oV

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Detects executables built or packed with MPress PE compressor 18 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe
    "C:\Users\Admin\AppData\Local\Temp\819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2700
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1796
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3716
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1396
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4036
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2232
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2564
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:5096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    660eee8dd828887317a7b2e8230a6aa6

    SHA1

    760f5d1f895d9f30f1578f9e3c141a4f973d29a9

    SHA256

    f63428ac01159fa037e4b5854afb64d238302d88200f16810c7e75611e092ad1

    SHA512

    849c062eb2ec6ef69e334114d6f533624b331cd2b577a041c9fda38b2c1e02c22c3818c6da9e70c45f6c7243b06dab7a5ec501d72990a15dac8b16a8d28a9c43

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    b4fec8b59f8092ac6fb7b8c5dc662583

    SHA1

    266ed42bf62408bc541097f23b3073c75950ab87

    SHA256

    b29d8b237dd0c6342e60aca4e8decf73b2461a389ef4873e1c774ae8446e4f68

    SHA512

    5e4509897526117967ebfcc65bd90d0212eb42074d1cc9dc8492f4a567e36154a5651fd3142e3a196527b53304782efc0edb4d33d7377ae5c8e61f0f91291a5d

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    84425aebcc794b44fb6d530d90492b49

    SHA1

    2b862c6b43c46527cdcfe55358501bf473093e2e

    SHA256

    6f2333679ad5cb7c9b2673aab8b82c61627268d93486929b0f0ae5368eab41c4

    SHA512

    b55312592b9c826bf83461363643ddb4bdabae6ec3c07f640310dd48c2de5d1afad259ded55639467796ebef429fd291d35f3969e3e861f5eed296dcb8e55cf3

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    3a29ef181562270475c4c9b6dd0b148e

    SHA1

    c553139834d59c66807d1b38ce2a8711ec757f04

    SHA256

    aa88a423423963b2daf6452ef79136d72e408a2b096d7c2fa50771befd6b64d8

    SHA512

    59e8e50ddd207b0b8bbde1bbf21d6a3609c4bf03a538116bd3f49ffaeda689ef326a022588de994db0a18f3ce47e8de8eaeafe9cf8ac07a2ed02d81a360b5d1e

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    7cc3ebfb126590fe4dfd67558a765ee3

    SHA1

    47d89c5aac13ef061c9225611e026a9322c64806

    SHA256

    819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca

    SHA512

    fdc939ccfd37e5d72a468b6c5d307f51909816efb5843f4cde442e4c12e5cc6df0ab14fa324ad7775d7b18b1b2322b896c6b2e2ade0ad9d8234f261fd7b6aa08

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    85962fd7990c2c401c682a96dc418986

    SHA1

    e16c9176cb098ce6a813971c5ef181fee50bd822

    SHA256

    6ee18d739b3ba205b21b89f63b796eb8eb678283424ac78a7451ad3dccf52494

    SHA512

    b054729fd8b5edd0298fd3183c18f5505befe8b284a3bec367b4583816fd625093ca52477b73dfa31d0537ac81a0018404f0072112aa349f9becc0598659890d

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    978221178b572a1a7dd2b6c84404e7f6

    SHA1

    af3c16d7e7b38d3c5db07c063a957424f9bd1154

    SHA256

    889ac990db99d28a082a3ea1748ab7e6a02256befb3d3e9e92c20c9ecee76a0b

    SHA512

    d1f2845c21e9e6249763ae304f0f725904c562ec17a19c09b745c2713fd19b5590c69df0547761cefadd60f38e9550bb07922452d21a7654f4aae8a3ee426188

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    70cbd4788b64514629b3e0e2734633b5

    SHA1

    c44309b7e99a61cbc92fea28303ddaa837f3868a

    SHA256

    edfdc9ba63dc774d77e0ed6dd84e23fbc39ccf5ea89a2cbdc0112bf2ff3cf280

    SHA512

    4e63592bd223231721503a7fcdee710e7908b0554df719a9bfb682dad4b2184628b48f51893fda15fb26d98eb6f8e7929a264639b220f35e27079accec478c2e

  • memory/1396-127-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1796-112-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2232-136-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2232-138-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2564-145-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2700-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2700-154-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3716-117-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4036-131-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/5096-152-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB