Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe
Resource
win10v2004-20240508-en
General
-
Target
4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe
-
Size
280KB
-
MD5
a0934dec48467d574a0305c2fd90faf1
-
SHA1
9528a35509c43f9feae2df884d35373621afb811
-
SHA256
4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf
-
SHA512
b8bf95008c79962b740b52bc64774ac335ede2826c24d022e8699b26f904e33577bb4f41e16e0e0b4bb5b96ef4c4e3fe47f92dde1f4324b9910aeae3b2d9674a
-
SSDEEP
6144:GQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:GQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2708 lsassys.exe 2844 lsassys.exe -
Loads dropped DLL 4 IoCs
pid Process 1732 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe 1732 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe 1732 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe 2708 lsassys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\lsassys.exe\" /START \"%1\" %*" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\shell\open\command 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\shell 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt\shell\open\command 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt\shell\open\command\IsolatedCommand = "\"%1\" %*" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt\shell\runas\command\IsolatedCommand = "\"%1\" %*" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\ = "halnt" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\lsassys.exe\" /START \"%1\" %*" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\shell\runas 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt\shell 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt\shell\runas\command\ = "\"%1\" %*" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\shell\open 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt\DefaultIcon\ = "%1" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt\Content-Type = "application/x-msdownload" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt\shell\runas\command 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt\ = "Application" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt\shell\runas 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\DefaultIcon 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\DefaultIcon\ = "%1" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt\shell\open 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\shell\runas\command 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\halnt\DefaultIcon 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2708 lsassys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2708 1732 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe 28 PID 1732 wrote to memory of 2708 1732 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe 28 PID 1732 wrote to memory of 2708 1732 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe 28 PID 1732 wrote to memory of 2708 1732 4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe 28 PID 2708 wrote to memory of 2844 2708 lsassys.exe 29 PID 2708 wrote to memory of 2844 2708 lsassys.exe 29 PID 2708 wrote to memory of 2844 2708 lsassys.exe 29 PID 2708 wrote to memory of 2844 2708 lsassys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe"C:\Users\Admin\AppData\Local\Temp\4b1d45ca937326cf2a5df042d80056d1188e1063f18b06a627eccb81ee387baf.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\lsassys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\lsassys.exe"3⤵
- Executes dropped EXE
PID:2844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5338b98bdc4cb8c0fee63f301c3a97a72
SHA1366797ff41d6792fd66e33d7d0fd386610b05456
SHA256f405f1afdf8b3786e8ad219b77cc765fb8503ab03b42c2af6aa8fc3e548e1882
SHA512f8088012cbb868394d4d1081b982ddbdd7bbc60528c504e752ae46d44107b903c02b19a607574e4a6bb7a702ab1c80ce11b7588fb3d82c1d45950c6eb93872d8