Analysis
-
max time kernel
153s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 21:30
Behavioral task
behavioral1
Sample
459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe
Resource
win10v2004-20240226-en
General
-
Target
459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe
-
Size
1.1MB
-
MD5
049335eccd56ed5291fa5e5dfcfae6de
-
SHA1
885ec5677bf07b6c90efd92d384fb972c2b58ac9
-
SHA256
459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af
-
SHA512
0998ce06ee8517f54318eb347171142969877a9a8722d09143ab4125dd7d8fa4180ecbe3405a535678458a1f503c51d7f2a03ccaa34f1992bb788fd4fa4bd913
-
SSDEEP
12288:2snAsoSezcq1WOg2mb9G+sVlYfUXRPgOvvGPt11Gtg/kKnBJ6:dnAFzP0g+IYfUhDvv+titgM276
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" MusaLLaT.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" MusaLLaT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe -
UPX dump on OEP (original entry point) 6 IoCs
resource yara_rule behavioral2/memory/792-0-0x0000000000400000-0x00000000004E4000-memory.dmp UPX behavioral2/memory/792-3-0x0000000000400000-0x00000000004E4000-memory.dmp UPX behavioral2/files/0x0008000000023260-8.dat UPX behavioral2/memory/792-12-0x0000000000400000-0x00000000004E4000-memory.dmp UPX behavioral2/memory/3304-18-0x0000000000400000-0x00000000004E4000-memory.dmp UPX behavioral2/memory/3304-19-0x0000000000400000-0x00000000004E4000-memory.dmp UPX -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\WINDOWS\system32\drivers\etc\hosts MusaLLaT.exe File opened for modification C:\WINDOWS\system32\drivers\etc\hosts MusaLLaT.exe -
Executes dropped EXE 1 IoCs
pid Process 3304 MusaLLaT.exe -
resource yara_rule behavioral2/memory/792-0-0x0000000000400000-0x00000000004E4000-memory.dmp upx behavioral2/memory/792-3-0x0000000000400000-0x00000000004E4000-memory.dmp upx behavioral2/files/0x0008000000023260-8.dat upx behavioral2/memory/792-12-0x0000000000400000-0x00000000004E4000-memory.dmp upx behavioral2/memory/3304-18-0x0000000000400000-0x00000000004E4000-memory.dmp upx behavioral2/memory/3304-19-0x0000000000400000-0x00000000004E4000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" MusaLLaT.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MusaLLaT = "C:\\Users\\Admin\\AppData\\Roaming\\MusaLLaT.exe" MusaLLaT.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" MusaLLaT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 792 459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe Token: SeBackupPrivilege 3304 MusaLLaT.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 792 459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe 3304 MusaLLaT.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 792 wrote to memory of 3304 792 459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe 90 PID 792 wrote to memory of 3304 792 459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe 90 PID 792 wrote to memory of 3304 792 459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe 90 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" MusaLLaT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe"C:\Users\Admin\AppData\Local\Temp\459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:792 -
C:\Users\Admin\AppData\Roaming\MusaLLaT.exeC:\Users\Admin\AppData\Roaming\MusaLLaT.exe2⤵
- UAC bypass
- Windows security bypass
- Drops file in Drivers directory
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3868 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:3864
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5049335eccd56ed5291fa5e5dfcfae6de
SHA1885ec5677bf07b6c90efd92d384fb972c2b58ac9
SHA256459880395f07c30402cbf8e31883fbc85637298604788b7e96b460c39fa612af
SHA5120998ce06ee8517f54318eb347171142969877a9a8722d09143ab4125dd7d8fa4180ecbe3405a535678458a1f503c51d7f2a03ccaa34f1992bb788fd4fa4bd913