Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 10:39
Behavioral task
behavioral1
Sample
4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe
Resource
win10v2004-20240426-en
General
-
Target
4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe
-
Size
2.7MB
-
MD5
7a09c18527253aef3889cd14d036f4dc
-
SHA1
e751c0c5bded024beed87e9ecca48b993aa86132
-
SHA256
4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af
-
SHA512
18c60ceb54997b39a57e64de2d4f8d665307a4656f5b197cb996fa9bcd0ad74d4731090ff9d567f09818e706c8bec2abc242c3a49a908642e9fde1a586862f3c
-
SSDEEP
49152:CWBj/cjFA0c4mB5jR8MXfS1gjxk6MGQI3fScAi4G0P8teFMFccZ:McSMeg2/S14x/FMOI
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\Windows\\CleanTemp.exe" CleanTemp.exe -
Executes dropped EXE 5 IoCs
pid Process 860 sg.tmp 3120 CleanTemp64.exe 3008 CleanTemp64.exe 2056 sg.tmp 1344 CleanTemp.exe -
resource yara_rule behavioral2/memory/4508-0-0x0000000000400000-0x0000000000573000-memory.dmp upx behavioral2/memory/2116-8-0x0000000000400000-0x0000000000573000-memory.dmp upx behavioral2/files/0x000700000002342c-24.dat upx behavioral2/memory/3120-25-0x0000000000400000-0x0000000000573000-memory.dmp upx behavioral2/memory/3008-37-0x0000000000400000-0x0000000000573000-memory.dmp upx behavioral2/memory/3008-35-0x0000000000400000-0x0000000000573000-memory.dmp upx behavioral2/files/0x000700000002342b-54.dat upx behavioral2/memory/3120-58-0x0000000000400000-0x0000000000573000-memory.dmp upx behavioral2/memory/4508-59-0x0000000000400000-0x0000000000573000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CleanTemp.exe sg.tmp File opened for modification C:\Windows\CleanTemp.exe sg.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main CleanTemp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.2345.com/?knetboy365" CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Microsoft\Internet Explorer\Main CleanTemp.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?knetboy365" CleanTemp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?knetboy365" CleanTemp.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTML\shell\open\command\ = "C:\\Program Files\\Opera\\launcher.exe http://www.2345.com/?knetboy365" CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTTP CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTTP\shell CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTTP\shell\open CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTML CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTTP\shell\open\command CleanTemp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTTP\shell\open\command\ = "C:\\Program Files\\Opera\\launcher.exe http://www.2345.com/?knetboy365" CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTTPS\shell\open\command CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTTPS\shell CleanTemp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTTPS\shell\open\command\ = "C:\\Program Files\\Opera\\launcher.exe https://www.2345.com/?knetboy365" CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTML\shell\open\command CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTML\shell CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTML\shell\open CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTTPS\shell\open CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Opera.HTTPS CleanTemp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3120 CleanTemp64.exe 3120 CleanTemp64.exe 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeBackupPrivilege 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeRestorePrivilege 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: 33 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeIncBasePriorityPrivilege 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeCreateGlobalPrivilege 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: 33 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeIncBasePriorityPrivilege 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: 33 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeIncBasePriorityPrivilege 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeBackupPrivilege 2116 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeRestorePrivilege 2116 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: 33 2116 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeIncBasePriorityPrivilege 2116 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: 33 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeIncBasePriorityPrivilege 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeRestorePrivilege 860 sg.tmp Token: 35 860 sg.tmp Token: SeSecurityPrivilege 860 sg.tmp Token: SeSecurityPrivilege 860 sg.tmp Token: 33 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeIncBasePriorityPrivilege 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeBackupPrivilege 3120 CleanTemp64.exe Token: SeRestorePrivilege 3120 CleanTemp64.exe Token: 33 3120 CleanTemp64.exe Token: SeIncBasePriorityPrivilege 3120 CleanTemp64.exe Token: SeCreateGlobalPrivilege 3120 CleanTemp64.exe Token: 33 3120 CleanTemp64.exe Token: SeIncBasePriorityPrivilege 3120 CleanTemp64.exe Token: 33 3120 CleanTemp64.exe Token: SeIncBasePriorityPrivilege 3120 CleanTemp64.exe Token: SeBackupPrivilege 3008 CleanTemp64.exe Token: SeRestorePrivilege 3008 CleanTemp64.exe Token: 33 3008 CleanTemp64.exe Token: SeIncBasePriorityPrivilege 3008 CleanTemp64.exe Token: 33 3120 CleanTemp64.exe Token: SeIncBasePriorityPrivilege 3120 CleanTemp64.exe Token: SeRestorePrivilege 2056 sg.tmp Token: 35 2056 sg.tmp Token: SeSecurityPrivilege 2056 sg.tmp Token: SeSecurityPrivilege 2056 sg.tmp Token: 33 3120 CleanTemp64.exe Token: SeIncBasePriorityPrivilege 3120 CleanTemp64.exe Token: SeDebugPrivilege 3120 CleanTemp64.exe Token: SeDebugPrivilege 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4508 wrote to memory of 1604 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 83 PID 4508 wrote to memory of 1604 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 83 PID 4508 wrote to memory of 2116 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 85 PID 4508 wrote to memory of 2116 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 85 PID 4508 wrote to memory of 2116 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 85 PID 4508 wrote to memory of 860 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 86 PID 4508 wrote to memory of 860 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 86 PID 4508 wrote to memory of 860 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 86 PID 4508 wrote to memory of 3120 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 88 PID 4508 wrote to memory of 3120 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 88 PID 4508 wrote to memory of 3120 4508 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 88 PID 3120 wrote to memory of 2696 3120 CleanTemp64.exe 89 PID 3120 wrote to memory of 2696 3120 CleanTemp64.exe 89 PID 3120 wrote to memory of 3008 3120 CleanTemp64.exe 92 PID 3120 wrote to memory of 3008 3120 CleanTemp64.exe 92 PID 3120 wrote to memory of 3008 3120 CleanTemp64.exe 92 PID 3120 wrote to memory of 2056 3120 CleanTemp64.exe 93 PID 3120 wrote to memory of 2056 3120 CleanTemp64.exe 93 PID 3120 wrote to memory of 2056 3120 CleanTemp64.exe 93 PID 3120 wrote to memory of 1344 3120 CleanTemp64.exe 96 PID 3120 wrote to memory of 1344 3120 CleanTemp64.exe 96 PID 1344 wrote to memory of 1524 1344 CleanTemp.exe 97 PID 1344 wrote to memory of 1524 1344 CleanTemp.exe 97 PID 1344 wrote to memory of 2752 1344 CleanTemp.exe 99 PID 1344 wrote to memory of 2752 1344 CleanTemp.exe 99 PID 1344 wrote to memory of 1920 1344 CleanTemp.exe 102 PID 1344 wrote to memory of 1920 1344 CleanTemp.exe 102 PID 1344 wrote to memory of 716 1344 CleanTemp.exe 104 PID 1344 wrote to memory of 716 1344 CleanTemp.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe"C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c set2⤵PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exePECMD**pecmd-cmd* PUTF -dd -skipb=992256 -len=1794721 "C:\Users\Admin\AppData\Local\Temp\~8528266711000047943.tmp",,C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\~3399468933783304159~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\~8528266711000047943.tmp" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\CleanTemp"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe"C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c set3⤵PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exePECMD**pecmd-cmd* PUTF -dd -skipb=992256 -len=323825 "C:\Users\Admin\AppData\Local\Temp\~6986566738483976704.tmp",,C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\~5060108065255324345~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\~6986566738483976704.tmp" -y -aos -o"C:\Windows"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\CleanTemp.exe"C:\Windows\CleanTemp.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "%USERPROFILE%\AppData\Local\Temp"4⤵PID:1524
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "%USERPROFILE%\AppData\Local\Temp"4⤵PID:2752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache"4⤵PID:1920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "%USERPROFILE%\AppData\Local\Microsoft\Windows\INetCache"4⤵PID:716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5db451afc8f2dea22e0d49bd076bb304a
SHA1ffabf0a1748c583457da493e61baab486e970ae1
SHA2566afce61f2ba18cee2a5ce204d10c006f5f50b497c3b54616cbe8762077c54400
SHA5120b6be6143dbf1d859c6b61f2564166aa6a2a7b471e039c85614d010fae3c4d3903acf0749e709ee4bc05bd4dca47f683453691238fd41218492655cb6513b8a1
-
Filesize
1.3MB
MD5381dcd0f69d0262cac902f14b2761e10
SHA130c05bdaef2b05a24b20aea8d24308ee8e0c323a
SHA2565f51505242592d9d8c0d2419f96c3cdf56676f01f06333ea8bed54a4f9b2728b
SHA512426156e60533b6af3104ff429179fbb6279729922dd9f3198d1220157b56ea2f6627d1dc3506fed5f9176c7186862c468745c9d56f8174570c6af991e3aeacba
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516
-
Filesize
316KB
MD5aff3a05583a5e932acb381963ae9a8eb
SHA1b98ae67d2fea845f676448417fe99feea91949bf
SHA2563a92e844169baea0a76a62f04b7e261f00ea7ac99bcc4ac1373dfd032bc19fef
SHA512f976b12317e9097a54f19b6b2a264bddc60c55936f97ed5baed9965e580f9a07d62a5a47b696b5f73432d6de10e6d272d5e496e5e45cbc0c1820cb9c73d8b867
-
Filesize
1.7MB
MD5cf29f292833a8ea8d29e7af680ea39c3
SHA1a52dd7ab84b58a6057d29b7636f9804fbef7122d
SHA256499c8cd9377e1d02d173102dfca53258a27bc79420d1e0b78e3a92a1079780b7
SHA512da6a0567658c7917b9680120b3209ba363a05d0e9f7f324990556b86c36d9b20fd925446854957989f6632030a80db76f00bd2b517e7a94dbfaa202d340f9811
-
Filesize
135B
MD5f36df2253a25fa93328c414ea6465e76
SHA1bcbf8efef835f0d1675185b35f12355a5e3df900
SHA2560951df47f9436996d4416bc3cea78ee7a9d546091f752d90521ba8403dc9fa8f
SHA51229fa662fcda73ace6bb59cfd925c483f34fbe0462aa0fca632be72bda633b6478cb53b6fbbe736ed941580beb7fb8719246a3120009b7dc1778b83896d9c9ea9
-
Filesize
143B
MD5a986dd59d1791d23fe12c212f9841986
SHA1098ecbb2a59de11712b920dc17572f1426ffeadc
SHA2564c99f0fcd1b4cceb529dd0f573d07a95f68eab644bde63bd5b7269a6fe46305e
SHA51254b8382a72dd52362fa307cbf54ec32e1319a18ea85af4937055dd45407b1d4f1de80b23ac6990b83f52b85a8728aa38cd4add1fca9c39127265e6df090c1716
-
Filesize
337KB
MD52aea8c280c0a0ffd00ee7feb3c041c3f
SHA11d1c5e4a3b027fa91bb13dfdca555d193bb30439
SHA2563aedd982d3efee614853797ee7befd31d5d3fe1f3e816bc7bbe467201f62ab9b
SHA512062ef76f035f3a628de82392761cada616d8d4f5c605b4d69fb9f34bb07dfbc75967da919e33d2f97cc89fc5aed0c2fbb7618c377e9d98c5effea25cecf16d39