Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2024, 02:14

General

  • Target

    81f11327008a2a6d4f8b284a7c5c62965a8a5585b0b017d514f515abfa58c85b.exe

  • Size

    45KB

  • MD5

    5656b2485249835077aad5912b7994ec

  • SHA1

    178b9f050b572a3bc55bc5d2a11f2f486fd5884f

  • SHA256

    81f11327008a2a6d4f8b284a7c5c62965a8a5585b0b017d514f515abfa58c85b

  • SHA512

    7a13aa04e0d2d477d3c1a2fc565daa15445ec1efae81996a6c973a9d2a6741fa52f10f2c07fc5fe128a083e5dccb4a335325fde0434ff95f063fb2ceb60dd6e4

  • SSDEEP

    768:PmFQj8rM9whcqet8WfuzHVHFNNqDaG0XjqGoxhz/8szBnP7DFK+5nEI:FAwEmBGz1lNNqDaG0PoxhlzmI

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Detects executables built or packed with MPress PE compressor 20 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81f11327008a2a6d4f8b284a7c5c62965a8a5585b0b017d514f515abfa58c85b.exe
    "C:\Users\Admin\AppData\Local\Temp\81f11327008a2a6d4f8b284a7c5c62965a8a5585b0b017d514f515abfa58c85b.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4492
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3592
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:860
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2324
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3384
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2968
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:5104
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4244

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\winlogon.exe

          Filesize

          45KB

          MD5

          5656b2485249835077aad5912b7994ec

          SHA1

          178b9f050b572a3bc55bc5d2a11f2f486fd5884f

          SHA256

          81f11327008a2a6d4f8b284a7c5c62965a8a5585b0b017d514f515abfa58c85b

          SHA512

          7a13aa04e0d2d477d3c1a2fc565daa15445ec1efae81996a6c973a9d2a6741fa52f10f2c07fc5fe128a083e5dccb4a335325fde0434ff95f063fb2ceb60dd6e4

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE

          Filesize

          45KB

          MD5

          e46f6b5aa1855c46c898e03b69578125

          SHA1

          42515dd9a15c8ce58ddae1991ffbdc31a41c4ad1

          SHA256

          a3429b05663b29de318df217c18aa362cc20886c7a547ea5f81fe6b8e867055a

          SHA512

          620d886bd69f750e34c20d8625fe3fbc16c55f9de8e6ca7ed082425d51d632d47d2eafe325644434de7e4902686bda1812afa4bf557b738c24520e3283b403b2

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE

          Filesize

          45KB

          MD5

          6767c4e367e1443688760a6a9667101e

          SHA1

          904e82e567d5a5dc4c32daec53a7c250a41d0aec

          SHA256

          ac3b4a42a1f4cf72da5a8a77cf587867f7d14fc79a3e7ce50cfabcd7f46216f4

          SHA512

          30fecd57d075cf3ed6783bb63a63651d63114212a586ac721718318cbb7e53ab3dc0814a40ee45f702850bdca026b9365ff7f7993461d5beb2e8f5f772e904e3

        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE

          Filesize

          45KB

          MD5

          98b2f61304c54628faf83067c51d91aa

          SHA1

          bb91855ed7cce0d16d67a0c5ee88e450863a7ec8

          SHA256

          e8b9728cb69091410b3e53a2e49efa5383a7e1616f0fec9279466f51f43064c9

          SHA512

          8a028c06faf0accb8c29399e47d160f6e60d1132a7f98536563dce9fb4dd2da8f420039a58e6a54b789b32440e97a422fa03d4c6cdddf1ed8ffabbe5b1972dd2

        • C:\Windows\SysWOW64\IExplorer.exe

          Filesize

          45KB

          MD5

          78e3acea76f16551444890ef8864618d

          SHA1

          203bd4a09c9b008d6dc2967eff24c07425e79e86

          SHA256

          4c2ad8f598b1d78f7910396bd165b812ca03b5ace32138e4915c31b951bf8da3

          SHA512

          988a7ee50c061eb79b156e8f19d026652f286d41082d5f091970998fe4397a4327f7b923c64533619e3f39ea40ab6655efe23d988bf508bfd398a34b1e9f2b46

        • C:\Windows\xk.exe

          Filesize

          45KB

          MD5

          7bd3bb37852a541d95f3298dc1bcb754

          SHA1

          db55911ffa61ea029c644192ef06fee29e603d4a

          SHA256

          d2e98076e0cdf08dbdd77739a492b3619a33d2ce822cf103947fb20caed53a2a

          SHA512

          f735266438a3a860d7dd5e6eefd99659d630dbfabf24cefac2693505ae441dc5a8542d3d893c8cc15af798e3a07e9484d82d322455f88c4355750810cf87a768

        • memory/860-115-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/860-119-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2324-125-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2968-140-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2968-136-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/3384-133-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/3592-108-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/3592-114-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/4244-151-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/4244-154-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/4492-0-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/4492-155-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/5104-147-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/5104-146-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB