Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-06-2024 09:26
Behavioral task
behavioral1
Sample
77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe
Resource
win11-20240508-en
General
-
Target
77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe
-
Size
4.1MB
-
MD5
c6e5f3f5ba9ae8fb70f73fae8b2172fa
-
SHA1
9719bb8ddd55e4d5105685a2a3ac5b80c01b4ac8
-
SHA256
77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977
-
SHA512
b8c82c9a1b3428604efda7e9083e396cab41b126769ad6d26d60b9ea432f14023a56cdbaab27cda46f6c95346f3efdb2abd5ae5b46afa9abd6c663a26cd25a4b
-
SSDEEP
49152:Pmmk1H6gBnOpek8EZp5OPycC5rcQq8oy7auZzyDxItd1Eh5qwlRxvNHhYNVTKG5j:Pmu4nOkO5v5w/8LJ79q8cQVeWC/3Mn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 412 kjarrvuqnhvxummpvwuzchhfllldxis-elevate.exe -
resource yara_rule behavioral2/memory/1456-0-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-4-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/files/0x000100000002aa0f-11.dat upx behavioral2/memory/412-16-0x00007FF633710000-0x00007FF635019000-memory.dmp upx behavioral2/memory/412-15-0x00007FF633710000-0x00007FF635019000-memory.dmp upx behavioral2/memory/3756-19-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/3756-31-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/1456-33-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-34-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/1456-35-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-36-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-37-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-39-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/1456-38-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/412-40-0x00007FF633710000-0x00007FF635019000-memory.dmp upx behavioral2/memory/1456-41-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-42-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/1456-43-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-44-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/1456-45-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-46-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-48-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/1456-47-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/1456-49-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-50-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/1456-51-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-52-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/1456-53-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-54-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/1456-55-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-56-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/1456-57-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-58-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/1456-59-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-60-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/1456-61-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx behavioral2/memory/2568-62-0x00007FF7A57D0000-0x00007FF7A70D9000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe = "11001" 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe = "11001" 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3756 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe 3756 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1456 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2568 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe 2568 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe 2568 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe 2568 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe 2568 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2568 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe 2568 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe 2568 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe 2568 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe 2568 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2568 1456 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe 80 PID 1456 wrote to memory of 2568 1456 77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe"C:\Users\Admin\AppData\Local\Temp\77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe"C:\Users\Admin\AppData\Local\Temp\77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe" -gpipe \\.\pipe\PCommand97Getscreen.me -gui2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe"C:\Users\Admin\AppData\Local\Temp\77d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977.exe" -cpipe \\.\pipe\PCommand96Getscreen.me -cmem 0000pipe0PCommand96Getscreen0meoyfae5wo24tj4da -child2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3756
-
-
C:\ProgramData\Getscreen.me\kjarrvuqnhvxummpvwuzchhfllldxis-elevate.exe"C:\ProgramData\Getscreen.me\kjarrvuqnhvxummpvwuzchhfllldxis-elevate.exe" -elevate \\.\pipe\elevateGS512kjarrvuqnhvxummpvwuzchhfllldxis1⤵
- Executes dropped EXE
PID:412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5c6e5f3f5ba9ae8fb70f73fae8b2172fa
SHA19719bb8ddd55e4d5105685a2a3ac5b80c01b4ac8
SHA25677d6b48b175a9ece403bc236ec744801c67ff6addcb712c36754237cc2e41977
SHA512b8c82c9a1b3428604efda7e9083e396cab41b126769ad6d26d60b9ea432f14023a56cdbaab27cda46f6c95346f3efdb2abd5ae5b46afa9abd6c663a26cd25a4b
-
Filesize
719B
MD533285a264cdcdf1ce9666110591665db
SHA12d2d1aa8627bcd0ff0c25fc4d07e5706b56a272b
SHA256cc1b0a86a3bcdf7e6d629224c877c8408bb3d457b682944ed99eb8b267a13b40
SHA51241a54de8d5c29d686e0676141ff80d2fa17ef6a464d8d13dc6f0eddcaf144025704a42a1f01adbe46ccf8c8950261fe27e37c2c0b65d6722d0ea1f660acfad88
-
Filesize
3KB
MD5ab95220c0aba615bcd8f50a5c60f4327
SHA169fd13d1859d9c1167b4ed5d332f57fa5e4a1780
SHA256470489eb041b191a250d923538a174380a0958162b07f410720820f400c55fbf
SHA512d6d79038e6d7636572a3b32db1bce48651f699e23dc8e3c0e89ee6ed8be629be7a2cb39ca8c7774167339fd2a617291b8ba42ece940f54e6cc0660b7c3f1719f
-
Filesize
261B
MD505d49467dd22f2acec547e99591ceecd
SHA18f22fb325de3ed6201abe1c7d703c1bba02bcb97
SHA256e3f3daf8eb008f211e5d203b305a3dedadb87cc08a12ce38ae3ecf0416f75137
SHA5122981e267b6a4c2ff8c97be20875359ad6ee649489d3254292c8fe9dfe1c4027a0dc77cbb26a3d00c01bd0cbb34d9d4c65fbc1c44b6023391c3e8f3ba4119605e
-
Filesize
16.0MB
MD576e060e929a27a8f50a5ea6edfc52356
SHA191b7bc99d759d84720b376f69bc934d75d9ec549
SHA25695f95f6678ad42de249fe02f78472b553837b1e2aecd2f43b5715fae9187feae
SHA512f1a361f28a87b18b8b5707bd3332e751ee30dfc5c9a32a4bbc39b7e8d5ac34385e96b49546003741a797c1a8e53537a91d5345dfcb1707bc65a483d458fd38fe