Analysis

  • max time kernel
    92s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/08/2024, 23:06

General

  • Target

    4c81438241fba94d32a13a9f7f4d5d1887600a742546787e0531b22dc942c665.exe

  • Size

    164KB

  • MD5

    cd5e5d579084a9859e65daa2c2b06021

  • SHA1

    22493fe3de1cc7283142a29d5feabd28d231e49b

  • SHA256

    4c81438241fba94d32a13a9f7f4d5d1887600a742546787e0531b22dc942c665

  • SHA512

    fb563fac4aa82655d9cca655cce845a886c6892840e8312187bc2cf95bac1f906be370fadf3d82b8e133bc378caa7f256d0e833a02f4f1fd7a1d8b9a44a72b69

  • SSDEEP

    3072:Ax/zF/ulxEf0++protYf3soixGNdQQVlxDZiYWuw1WKt:AxLFQcb+hoyEoi4Ndxd4uwI

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c81438241fba94d32a13a9f7f4d5d1887600a742546787e0531b22dc942c665.exe
    "C:\Users\Admin\AppData\Local\Temp\4c81438241fba94d32a13a9f7f4d5d1887600a742546787e0531b22dc942c665.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1704
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:764
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3144
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2292
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1852
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:116
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:748
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    164KB

    MD5

    3979c7eecbb7e5bf239a63f447646412

    SHA1

    1b422a9c22060c9ced699212d6561c76bbfa1a22

    SHA256

    10ca292cb7e009d23b69a04107d99c34f13c978f577cd5ea27db339858df947a

    SHA512

    fcb75fa301d762c5e7c5f93607f7fd059e07d7553a8e0af811b32deebb2ccc142599ecacb446e441e00db3c41acb2688aec974340b9d01e47c00e3dfbbe10415

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    164KB

    MD5

    fca52f5887eda6ee4de7534ce590e7d2

    SHA1

    092786b22af4574776b4b1aac49b3be634e5791d

    SHA256

    e17e1c1b7c8bcfe8b22c7d4b4d1448a61bb6f04b6ef3c7a5344f1ed285fca5e1

    SHA512

    3e288b018134ea27de8902ccb908551f0f39bc1dbdc830ad341542d18627e4917eaf6d6d9ba14057c14024da533a51b4631fb3ddd8f6cef47733e656bb21de07

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    164KB

    MD5

    1d491bd2db0217d211e4c15cebbbd5ff

    SHA1

    5743ca6c3f2248c8ceac7614674b66ca5624fb9c

    SHA256

    2550ef3057729d185a8750b257b77f960f970ecfdd9edb18044176bcbb89981a

    SHA512

    bbd673a35d0efd6bffaa204cb216828a0808ad6f0b163e62ad78900429c8469561d7d2d6bb2b02708a468285fef99468315817841783c95e20deed47aec138c4

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    164KB

    MD5

    3eccdcfb3e757b0596ee558ba9ef183e

    SHA1

    3907df1b804eeee6aa9be5f5d392fed6f1698ce4

    SHA256

    c0e7bd8cbeb6ff0f6752e64c2a6edec9d85231526b03f900f2b5811beaf4b131

    SHA512

    d588923408eafd5a4bd114bbb2ee8784cf21f713e159a57d614ca2374f63ab27f0dbce51f871e6adc901163950d1465fa588da4055b4fae3e1ace068be3b312f

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    164KB

    MD5

    4c039dc38e3e129f18700f903dfa8f35

    SHA1

    28d6706d09e00e791a90c474271f5a18df76304c

    SHA256

    87f5ce23541ecc944266fc2f94a4396ca3e637331a7f15ffd96e6d44161dd4dc

    SHA512

    90dc32c2703ea4d9804ef1ee5a3edf82636f2fc01201dce6dffb4cfb8a5d165951901c142d1c1d53e6b6389b99b0384aa2f12d0b25f97794c9c7de8857cc58d5

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    164KB

    MD5

    cd5e5d579084a9859e65daa2c2b06021

    SHA1

    22493fe3de1cc7283142a29d5feabd28d231e49b

    SHA256

    4c81438241fba94d32a13a9f7f4d5d1887600a742546787e0531b22dc942c665

    SHA512

    fb563fac4aa82655d9cca655cce845a886c6892840e8312187bc2cf95bac1f906be370fadf3d82b8e133bc378caa7f256d0e833a02f4f1fd7a1d8b9a44a72b69

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    164KB

    MD5

    e236f562486b51a838ac7ee171a29ccb

    SHA1

    d9e8377a9578e45fab52cdba6f7d612f8258ae12

    SHA256

    cebb3469e35494c79601dbacd415f684804e40708f9151dcdd2c7c4722f04005

    SHA512

    554c16d5785e6698c24f96c171f7b9fd2c9dbe1c21ce18b4672f240a23d5e953ba0a2869498eb8b7a313ba9eddcc12b0279aaf3e6c4cb0c0f32dd6cae3a7e24a

  • C:\Windows\xk.exe

    Filesize

    164KB

    MD5

    092e3e7c3e3e4eddc574703c69d714cc

    SHA1

    d8da5a5ac1cbea2e056b440280307ae3c7a48fc8

    SHA256

    def2ced534944eb5dc501e5c8b92b273b267025bd1341cd7723cc9a4c7d4d64d

    SHA512

    19536b3e69846aacdede45a0dc8542b2592382937286719ede225ab8ab5f2288a0433c6fd9b26fc6e4792bced6004a77a766ae14395eb2a3cf163c756a9113f4