Analysis
-
max time kernel
35s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 10:56
Behavioral task
behavioral1
Sample
office自动激活.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
office自动激活.exe
Resource
win10v2004-20240226-en
Errors
General
-
Target
office自动激活.exe
-
Size
10.2MB
-
MD5
6a3b07a0a09474805e1f62d001b74f6e
-
SHA1
c9ff6bfa4bf835bd89b83e62b57c11856a22e8ea
-
SHA256
257079c22c264fd97bd7e9556fc8031fa51ea854ce24ff7f7d4cb501481ad0f5
-
SHA512
9dbeb7268eef265d2ab68a6add65b4aa8cc5da664121faab4c726cdce60044a01375618a45cea3ad6227b8f2cdc790a02218c7887c493584e2bdb909624812bd
-
SSDEEP
196608:LqTF0DfyGgm0sKYu/PaQ9wBdnpkYRM6YDu8QcBW7W2c:nDfDg8Q9c66uFBW7W2c
Malware Config
Signatures
-
Loads dropped DLL 13 IoCs
Processes:
office自动激活.exepid process 4120 office自动激活.exe 4120 office自动激活.exe 4120 office自动激活.exe 4120 office自动激活.exe 4120 office自动激活.exe 4120 office自动激活.exe 4120 office自动激活.exe 4120 office自动激活.exe 4120 office自动激活.exe 4120 office自动激活.exe 4120 office自动激活.exe 4120 office自动激活.exe 4120 office自动激活.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "221" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
shutdown.exedescription pid process Token: SeShutdownPrivilege 404 shutdown.exe Token: SeRemoteShutdownPrivilege 404 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 5028 LogonUI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
office自动激活.exeoffice自动激活.execmd.exedescription pid process target process PID 3460 wrote to memory of 4120 3460 office自动激活.exe office自动激活.exe PID 3460 wrote to memory of 4120 3460 office自动激活.exe office自动激活.exe PID 4120 wrote to memory of 1248 4120 office自动激活.exe cmd.exe PID 4120 wrote to memory of 1248 4120 office自动激活.exe cmd.exe PID 1248 wrote to memory of 404 1248 cmd.exe shutdown.exe PID 1248 wrote to memory of 404 1248 cmd.exe shutdown.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\office自动激活.exe"C:\Users\Admin\AppData\Local\Temp\office自动激活.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\office自动激活.exe"C:\Users\Admin\AppData\Local\Temp\office自动激活.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c shutdown /s /t 03⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\system32\shutdown.exeshutdown /s /t 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa398a855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5028
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5f34eb034aa4a9735218686590cba2e8b
SHA12bc20acdcb201676b77a66fa7ec6b53fa2644713
SHA2569d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1
SHA512d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af
-
Filesize
36KB
MD5135359d350f72ad4bf716b764d39e749
SHA12e59d9bbcce356f0fece56c9c4917a5cacec63d7
SHA25634048abaa070ecc13b318cea31425f4ca3edd133d350318ac65259e6058c8b32
SHA512cf23513d63ab2192c78cae98bd3fea67d933212b630be111fa7e03be3e92af38e247eb2d3804437fd0fda70fdc87916cd24cf1d3911e9f3bfb2cc4ab72b459ba
-
Filesize
81KB
MD586d1b2a9070cd7d52124126a357ff067
SHA118e30446fe51ced706f62c3544a8c8fdc08de503
SHA25662173a8fadd4bf4dd71ab89ea718754aa31620244372f0c5bbbae102e641a60e
SHA5127db4b7e0c518a02ae901f4b24e3860122acc67e38e73f98f993fe99eb20bb3aa539db1ed40e63d6021861b54f34a5f5a364907ffd7da182adea68bbdd5c2b535
-
Filesize
120KB
MD51635a0c5a72df5ae64072cbb0065aebe
SHA1c975865208b3369e71e3464bbcc87b65718b2b1f
SHA2561ea3dd3df393fa9b27bf6595be4ac859064cd8ef9908a12378a6021bba1cb177
SHA5126e34346ea8a0aacc29ccd480035da66e280830a7f3d220fd2f12d4cfa3e1c03955d58c0b95c2674aea698a36a1b674325d3588483505874c2ce018135320ff99
-
Filesize
154KB
MD57447efd8d71e8a1929be0fac722b42dc
SHA16080c1b84c2dcbf03dcc2d95306615ff5fce49a6
SHA25660793c8592193cfbd00fd3e5263be4315d650ba4f9e4fda9c45a10642fd998be
SHA512c6295d45ed6c4f7534c1a38d47ddc55fea8b9f62bbdc0743e4d22e8ad0484984f8ab077b73e683d0a92d11bf6588a1ae395456cfa57da94bb2a6c4a1b07984de
-
Filesize
77KB
MD5819166054fec07efcd1062f13c2147ee
SHA193868ebcd6e013fda9cd96d8065a1d70a66a2a26
SHA256e6deb751039cd5424a139708475ce83f9c042d43e650765a716cb4a924b07e4f
SHA512da3a440c94cb99b8af7d2bc8f8f0631ae9c112bd04badf200edbf7ea0c48d012843b4a9fb9f1e6d3a9674fd3d4eb6f0fa78fd1121fad1f01f3b981028538b666
-
Filesize
812KB
MD55bb4ab674888db901045c11d8326b7ae
SHA12e5ba79ec5fd8981f972d40360d79ae91e8bc117
SHA25648d6750e1f9b3a711f11a3868f8becadaac3ced0104416a01a35405a3dd7c9dc
SHA512ea1ecaff769a6469b2603fa8d503f5f15fc68d3a4ce59263c180087f62aa05365d7cccb62e6223d33267fdfc3a59e3eee0149efbd2c9ae56d49c3899aa612099
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
4.3MB
MD563a1fa9259a35eaeac04174cecb90048
SHA10dc0c91bcd6f69b80dcdd7e4020365dd7853885a
SHA25614b06796f288bc6599e458fb23a944ab0c843e9868058f02a91d4606533505ed
SHA512896caa053f48b1e4102e0f41a7d13d932a746eea69a894ae564ef5a84ef50890514deca6496e915aae40a500955220dbc1b1016fe0b8bcdde0ad81b2917dea8b
-
Filesize
653KB
MD565dd753f51cd492211986e7b700983ef
SHA1f5b469ec29a4be76bc479b2219202f7d25a261e2
SHA256c3b33ba6c4f646151aed4172562309d9f44a83858ddfd84b2d894a8b7da72b1e
SHA5128bd505e504110e40fa4973feff2fae17edc310a1ce1dc78b6af7972efdd93348087e6f16296bfd57abfdbbe49af769178f063bb0aa1dee661c08659f47a6216d
-
Filesize
131KB
MD5ceb06a956b276cea73098d145fa64712
SHA16f0ba21f0325acc7cf6bf9f099d9a86470a786bf
SHA256c8ec6429d243aef1f78969863be23d59273fa6303760a173ab36ab71d5676005
SHA51205bab4a293e4c7efa85fa2491c32f299afd46fdb079dcb7ee2cc4c31024e01286daaf4aead5082fc1fd0d4169b2d1be589d1670fcf875b06c6f15f634e0c6f34
-
Filesize
29KB
MD5a653f35d05d2f6debc5d34daddd3dfa1
SHA11a2ceec28ea44388f412420425665c3781af2435
SHA256db85f2f94d4994283e1055057372594538ae11020389d966e45607413851d9e9
SHA5125aede99c3be25b1a962261b183ae7a7fb92cb0cb866065dc9cd7bb5ff6f41cc8813d2cc9de54670a27b3ad07a33b833eaa95a5b46dad7763ca97dfa0c1ce54c9
-
Filesize
53KB
MD5107e00bc4ccab2ca49c58f18a945910f
SHA19dc580b5d4bf6a99a77756323db9054e6e24786b
SHA2562acc132055622ca87750cd8ed362cdcda2176c7fa82f8aba2fa77a8adf111971
SHA5125aac9997cdedd1f53f10fb8c8862560cb6ebff793e1f84d443ea29bf2a45f40895d127e9bb4c17b0e59149eff072719e1a634794dc03e79593e324d62bb152e0
-
Filesize
52KB
MD573f7c9b45b7e299e4a806ab68e7b5b01
SHA10d23a9e8b689fd63232006fd81ff00ed0f3825cc
SHA2566df759808d1dacaa4c7a07c1003771f9bf7061f86d4eed21c93428963f6553da
SHA51263baf05937b328c118b11e09c83f377ca9a57c6f443c679163f34b5e0e1730ccf39b31a836209203642bc2bc23ae15992485a9bc80b406cf2af2847c9847f2d9
-
Filesize
130KB
MD500e5da545c6a4979a6577f8f091e85e1
SHA1a31a2c85e272234584dacf36f405d102d9c43c05
SHA256ac483d60a565cc9cbf91a6f37ea516b2162a45d255888d50fbbb7e5ff12086ee
SHA5129e4f834f56007f84e8b4ec1c16fb916e68c3baadab1a3f6b82faf5360c57697dc69be86f3c2ea6e30f95e7c32413babbe5d29422d559c99e6cf4242357a85f31