Analysis
-
max time kernel
20s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 09:36
Behavioral task
behavioral1
Sample
HorrorTubbies 1.0.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
HorrorTubbies 1.0.exe
Resource
win10v2004-20240709-en
Errors
General
-
Target
HorrorTubbies 1.0.exe
-
Size
11.5MB
-
MD5
cbefa3dd01682c7ae01476a35c069ca8
-
SHA1
0a7fde7402d314993d0b77b87b796f480c8bbec4
-
SHA256
9a8a71e84dbbcea6ca2286d811db5d2df586d01e13654b034f77ffd6dbed599a
-
SHA512
41a1dff4610230d1cf72c0c42b6c7eef8a12c991cb42ed28cd2268f20f1978b14fba9e17081cdbe411963bc7dcd3273046d1ddc7427f6d9cc117ea592833ed8d
-
SSDEEP
196608:knW3NrRSIGB4e6rVwKQ8QNeL8W6sXh9rcWdTXfxo5FKKxuAUKPZ7CwI7qMh:kn/r6CKENjsXr9TX5rKRCwI7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral2/memory/1716-0-0x0000000000400000-0x00000000014D1000-memory.dmp upx behavioral2/memory/1716-14-0x0000000000400000-0x00000000014D1000-memory.dmp upx behavioral2/memory/1716-28-0x0000000000400000-0x00000000014D1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mbrsetup = "c:\\windows\\winbase_base_procid_none\\secureloc0x65\\mbrsetup.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gdifuncs = "c:\\windows\\winbase_base_procid_none\\secureloc0x65\\gdifuncs.exe" reg.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\Desktop\Wallpaper = "c:\\bg.bmp" reg.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\winbase_base_procid_none\secureloc0x65\mbrsetup.exe cmd.exe File created \??\c:\windows\winbase_base_procid_none\secureloc0x65\gdifuncs.exe cmd.exe File opened for modification \??\c:\windows\winbase_base_procid_none\secureloc0x65\gdifuncs.exe cmd.exe File created \??\c:\windows\winbase_base_procid_none\secureloc0x65\mainbgtheme.wav cmd.exe File opened for modification \??\c:\windows\winbase_base_procid_none\secureloc0x65\mainbgtheme.wav cmd.exe File created \??\c:\windows\winbase_base_procid_none\secureloc0x65\mbrsetup.exe cmd.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "207" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe -
Modifies registry key 1 TTPs 5 IoCs
pid Process 1964 reg.exe 4152 reg.exe 2968 reg.exe 4156 reg.exe 4176 reg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3148 shutdown.exe Token: SeRemoteShutdownPrivilege 3148 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 868 LogonUI.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1716 wrote to memory of 332 1716 HorrorTubbies 1.0.exe 87 PID 1716 wrote to memory of 332 1716 HorrorTubbies 1.0.exe 87 PID 1716 wrote to memory of 332 1716 HorrorTubbies 1.0.exe 87 PID 332 wrote to memory of 4176 332 cmd.exe 89 PID 332 wrote to memory of 4176 332 cmd.exe 89 PID 332 wrote to memory of 4176 332 cmd.exe 89 PID 332 wrote to memory of 1964 332 cmd.exe 90 PID 332 wrote to memory of 1964 332 cmd.exe 90 PID 332 wrote to memory of 1964 332 cmd.exe 90 PID 332 wrote to memory of 1396 332 cmd.exe 91 PID 332 wrote to memory of 1396 332 cmd.exe 91 PID 332 wrote to memory of 1396 332 cmd.exe 91 PID 332 wrote to memory of 5000 332 cmd.exe 92 PID 332 wrote to memory of 5000 332 cmd.exe 92 PID 332 wrote to memory of 5000 332 cmd.exe 92 PID 332 wrote to memory of 4152 332 cmd.exe 93 PID 332 wrote to memory of 4152 332 cmd.exe 93 PID 332 wrote to memory of 4152 332 cmd.exe 93 PID 332 wrote to memory of 2968 332 cmd.exe 94 PID 332 wrote to memory of 2968 332 cmd.exe 94 PID 332 wrote to memory of 2968 332 cmd.exe 94 PID 332 wrote to memory of 1268 332 cmd.exe 95 PID 332 wrote to memory of 1268 332 cmd.exe 95 PID 332 wrote to memory of 1268 332 cmd.exe 95 PID 332 wrote to memory of 4156 332 cmd.exe 96 PID 332 wrote to memory of 4156 332 cmd.exe 96 PID 332 wrote to memory of 4156 332 cmd.exe 96 PID 332 wrote to memory of 1648 332 cmd.exe 97 PID 332 wrote to memory of 1648 332 cmd.exe 97 PID 332 wrote to memory of 1648 332 cmd.exe 97 PID 332 wrote to memory of 3148 332 cmd.exe 98 PID 332 wrote to memory of 3148 332 cmd.exe 98 PID 332 wrote to memory of 3148 332 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\HorrorTubbies 1.0.exe"C:\Users\Admin\AppData\Local\Temp\HorrorTubbies 1.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8CBF.tmp\HorrorTubies.bat""2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v mbrsetup /d c:\windows\winbase_base_procid_none\secureloc0x65\mbrsetup.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:4176
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v gdifuncs /d c:\windows\winbase_base_procid_none\secureloc0x65\gdifuncs.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1964
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d c:\bg.bmp /f3⤵
- Sets desktop wallpaper using registry
PID:1396
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵PID:5000
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop /v NoChangingWallPaper /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:4152
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:2968
-
-
C:\Windows\SysWOW64\reg.exeReg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f3⤵PID:1268
-
-
C:\Windows\SysWOW64\reg.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:4156
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoControlPanel" /t REG_DWORD /d "1" /f3⤵PID:1648
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /r /t 003⤵
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39b2055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:868
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f014698e88eda534c88ce46a17e34d3c
SHA15f33f606179fea1404144d60af54fb829ea108b5
SHA25635eda9f76ede828a68e030a5b966fbf6a8c3f67146099eb0a866fb492733c909
SHA51279360bdc41762c105fecb07ca97fb4336394d2189f111b7040643d02c12481561aaf6b47c91c685cb7e4396c1a37d8c8eff5d4965baafe83894948316b35805f
-
Filesize
2.2MB
MD5a91e5b7686d4f631a2bdf654a3a491f1
SHA1d5760f5c7463b588b0c74bbc86237aed136b9fe9
SHA25645991d6379452ead78a54e3be31eb3fe9c6ae386737482192ded081832044aea
SHA51286cee44d58c7d9ed51caffb6cb6b55184a3c4653dc76ca41f4bb8a7c5bef9b67cf7f920db2111c1a838930bf9171ff49e17e042d9d0ce13205f13e7a364e1a3d
-
Filesize
76KB
MD59b104d42649fa52651a2ec25d7e48322
SHA1d9fe22ef9daf5055519ebb9e4137a7b6b5ffc030
SHA25623aef8bc6d0dcad2089fd08ec5932aba5feab3972b07583fa50d4c794eca5af9
SHA51255794cbd02f8678fdc44dced755ba4cf9d4ed63a30bded6635dc5403ffa2435339422288d48a8ef31fe523b080359b051e86ec8f6823b891e83ed1495fa5daa8
-
Filesize
13.1MB
MD51c723b3b9420e04cb8845af8b62a37fa
SHA13331a0f04c851194405eb9a9ff49c76bfa3d4db0
SHA2566831f471ee3363e981e6a1eb0d722f092b33c9b73c91f9f2a9aafa5cb4c56b29
SHA51241f4005ec2a7e0ee8e0e5f52b9d97f25a64a25bb0f00c85c07c643e4e63ea361b4d86733a0cf719b30ea6af225c4fcaca494f22e8e2f73cda9db906c5a0f12ae
-
Filesize
1.3MB
MD54f9777b4f603a437abedb856d09d42ba
SHA19a50bdb720e937ae6a8fd4140233b600414b393e
SHA256c5309feb33af8626132eb1a44e528c3317b5499a87170044eadc56ae82b1bacd
SHA512c6971d5256feb8ebd75b758055843870fd1beede3430efc82f4e3f0dae56d9b9241b0ac8c653d5f5ab3fe61a80729c4e096b169d16d2e09ccb7efcc0be8d49a8