Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 20:05

General

  • Target

    34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe

  • Size

    91KB

  • MD5

    f0a63c666cb73fb5d97b2e945b1bfef6

  • SHA1

    953008051f8a4b3a4766850a4351d655a045e5bd

  • SHA256

    34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211

  • SHA512

    eadd974a9b5427b274ed0136b27c4b59f4624d09b6fac2698a189a2450f70d7df9a8fa168e61e3f6fe99329c06d069d54679ad30fa67307d4d536b683eaf37d0

  • SSDEEP

    1536:zAwEmBZ04faWmtN4nic+6GAAwEmBZ04faWmtN4nic+6GU:zGms4Eton0AGms4Eton0U

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Detects executables built or packed with MPress PE compressor 21 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe
    "C:\Users\Admin\AppData\Local\Temp\34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1732
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2524
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2756
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2340
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1764
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:348
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1116
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    b941593922bf12ad2615eeea8d358dcc

    SHA1

    6823e35cea1a7fc76986c279a0dfff9897e9a078

    SHA256

    f120a2c17ff1e6bcff725c63615f23b283d88a58f9e2597b631c06a02bce0a33

    SHA512

    fb459a97b72d3742708391d5fc180a865550541b3a1ef8b24f0eec5c4008c179540e872ce344bd7be1a2719d4258c084ddf905195d07f1a32d961ee4cb895365

  • C:\Users\Admin\AppData\Local\services.exe

    Filesize

    91KB

    MD5

    f0a63c666cb73fb5d97b2e945b1bfef6

    SHA1

    953008051f8a4b3a4766850a4351d655a045e5bd

    SHA256

    34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211

    SHA512

    eadd974a9b5427b274ed0136b27c4b59f4624d09b6fac2698a189a2450f70d7df9a8fa168e61e3f6fe99329c06d069d54679ad30fa67307d4d536b683eaf37d0

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    880619e01f0a53b2713fc31d5baec4ad

    SHA1

    ee146cac745f32fff74cf5737d33cc17606b3914

    SHA256

    fbb3d4dd94203274aad9b42d4c76f3b82bcc4e1b0dcea5e875ce2af6e66f1186

    SHA512

    d8cc3bf0f95a984be9f8d85f135d986d18893de0685a7083b4b37d443fb525b31b50fef00f2f49f295b192141d8ae6d46342a962c3612613302328a6598783d7

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    4b5b170c185bdc4c41759d585cc79fb5

    SHA1

    cfcba7896d0c67a38c63833929ed9a517e8da673

    SHA256

    91bde7499222fc1b64d25e4c381924426f5cdcaa76f9ec70818a63e3008313f3

    SHA512

    92af5434bbcc1d84fd5dab84b4ad992944697b2d47fbd62ebd9180d5d0cca200eabce932fbfbf47513202c09d37622fe89eb9d5e167604b92d59d53a9d3637da

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    85de26eebe62c3765e4193b9f4841877

    SHA1

    652421d88f8717a600d003938f2fb389fc410025

    SHA256

    7d7ef06c14db7e9d128ae2c08b4b835f9962b03efe11ca54077f9180a1dbf8c6

    SHA512

    d9a2f414c87be351b35b99917e84918b8e0a84d5a0543d81d97bde43a33a04c461f39ac3dc35f12a9489889740d9339e1ac0e7018c0d7390f6186a78003c5937

  • \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    842261dc83b694ab9a7597775809e75e

    SHA1

    73979bf381e809e7f769dbdda81850e508309fd8

    SHA256

    c918f92cf3e79877776dae606f26b99f6804a70170110be585c9d8ed9b6ca16c

    SHA512

    9ae05eb19b6cc97e021c1ecbb931ef94fc253a9431145d64ad5cf2fd586e3eff31e15f7f3e19bdd17b06e4d61af44aa2308e47bf3b228870b0530f925b74a349

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    373f68325df92e70945a4c290e70ffc5

    SHA1

    14c86233beec332dda4035af7185f51f7795cb4d

    SHA256

    0bf6eee4c64e8232ea989e3dd3941140c762e3727ff5d30ffc4d5c9afcaec17f

    SHA512

    19843b3dc456b29762a2cf575aef5a66e24d0c0c03374832a3e56217bef1098793b4b4857640a2ecb514dd5022fb8c1c42f054dcf2132365d37c9ceba3f8720e

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    eda68a11083d5ef4138a33709e21a532

    SHA1

    e5c8271861a955cba5dba9631d7dde0f282523f5

    SHA256

    f85ce3b8ab9b4b6d6ae0b16676d73222fb224f20f17a2de3098af99009783d35

    SHA512

    ce7fda5fba89db586f5ae70c0957b548a8bf69ceba6be9f9efcc7bb3cca5d520d751c90b6d82dfc0e14b6b643f910fbe68081f1ab5642e3e24a66588c6377f5f

  • memory/348-160-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/348-162-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/840-185-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1116-175-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1732-109-0x0000000001DD0000-0x0000000001DFE000-memory.dmp

    Filesize

    184KB

  • memory/1732-135-0x0000000001DD0000-0x0000000001DFE000-memory.dmp

    Filesize

    184KB

  • memory/1732-134-0x0000000001DD0000-0x0000000001DFE000-memory.dmp

    Filesize

    184KB

  • memory/1732-186-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1732-110-0x0000000001DD0000-0x0000000001DFE000-memory.dmp

    Filesize

    184KB

  • memory/1732-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1732-159-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1764-151-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2340-139-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2524-111-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2524-116-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2756-128-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB