Analysis

  • max time kernel
    70s
  • max time network
    74s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 21:52

General

  • Target

    WinToolkit.exe

  • Size

    17.1MB

  • MD5

    86e3765bd385c07ee8130bcc8818b0f7

  • SHA1

    3132600be547a702097dbd92d852c0e2d9893086

  • SHA256

    9df3185347ef7d85e2252dbb233369bd1183bf969e65413d07867cb6975509ab

  • SHA512

    ebca9fc505e6357349c92e971fcc55a2e3db2fac1abe0bac22a7d296e10957f9c28cef2c76841dc8ef8bd2bf497bec144df6284cb2c8628d738b3627670ae1e0

  • SSDEEP

    393216:Rn2R47DAB2HsdCjoZO/0Va7yMDudoP65kL2FA3CBcTeN4fKp0bm1QHSxsjO9Iva3:Rn2R47DAB2HsdCjoZO/0Va7yMDudoP6X

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 15 IoCs
  • Modifies registry class 3 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WinToolkit.exe
    "C:\Users\Admin\AppData\Local\Temp\WinToolkit.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Windows\regedit.exe
      "C:\Windows\regedit.exe" /s "C:\Users\Admin\AppData\Local\Temp\\cert.reg"
      2⤵
      • Runs .reg file with regedit
      PID:1704
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" "http://www.ntlite.com/"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3172
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3172 CREDAT:17410 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3652
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\BCD00000000"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1812
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4164
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\SAM"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1296
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:692
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1092
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1272
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2168
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3088
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4324
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4328
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\SAM"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4748
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1260
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4420
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3028
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:516
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4424
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3092
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4924
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\SAM"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4828
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Windows\System32\reg.exe
        "C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4312
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe"
      2⤵
        PID:748
        • C:\Windows\System32\reg.exe
          "C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2224
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe"
        2⤵
          PID:960
          • C:\Windows\System32\reg.exe
            "C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2912
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe"
          2⤵
            PID:532
            • C:\Windows\System32\reg.exe
              "C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"
              3⤵
                PID:4996
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd.exe"
              2⤵
                PID:1120
                • C:\Windows\System32\reg.exe
                  "C:\Windows\System32\reg.exe" unload "HKLM\SAM"
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4748
              • C:\Windows\SYSTEM32\cmd.exe
                "cmd.exe"
                2⤵
                  PID:4544
                  • C:\Windows\System32\reg.exe
                    "C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1720
                • C:\Windows\SYSTEM32\cmd.exe
                  "cmd.exe"
                  2⤵
                    PID:1704
                    • C:\Windows\System32\reg.exe
                      "C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2824
                  • C:\Windows\SYSTEM32\cmd.exe
                    "cmd.exe"
                    2⤵
                      PID:1756
                      • C:\Windows\System32\reg.exe
                        "C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"
                        3⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3112
                    • C:\Windows\SYSTEM32\cmd.exe
                      "cmd.exe"
                      2⤵
                        PID:2640
                        • C:\Windows\System32\reg.exe
                          "C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"
                          3⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:516
                      • C:\Windows\SYSTEM32\cmd.exe
                        "cmd.exe"
                        2⤵
                          PID:4792
                          • C:\Windows\System32\reg.exe
                            "C:\Windows\System32\reg.exe" unload "HKLM\SAM"
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4964
                        • C:\Windows\SYSTEM32\cmd.exe
                          "cmd.exe"
                          2⤵
                            PID:2428
                            • C:\Windows\System32\reg.exe
                              "C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2776
                          • C:\Windows\SYSTEM32\cmd.exe
                            "cmd.exe"
                            2⤵
                              PID:3696
                              • C:\Windows\System32\reg.exe
                                "C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:464
                            • C:\Windows\SYSTEM32\cmd.exe
                              "cmd.exe"
                              2⤵
                                PID:1064
                                • C:\Windows\System32\reg.exe
                                  "C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1956
                              • C:\Windows\SYSTEM32\cmd.exe
                                "cmd.exe"
                                2⤵
                                  PID:3740
                                  • C:\Windows\System32\reg.exe
                                    "C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"
                                    3⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1852
                                • C:\Windows\SYSTEM32\cmd.exe
                                  "cmd.exe"
                                  2⤵
                                    PID:5080
                                    • C:\Windows\System32\reg.exe
                                      "C:\Windows\System32\reg.exe" unload "HKLM\SAM"
                                      3⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4868
                                  • C:\Windows\SYSTEM32\cmd.exe
                                    "cmd.exe"
                                    2⤵
                                      PID:812
                                      • C:\Windows\System32\reg.exe
                                        "C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"
                                        3⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2456
                                    • C:\Windows\SYSTEM32\cmd.exe
                                      "cmd.exe"
                                      2⤵
                                        PID:4512
                                        • C:\Windows\System32\reg.exe
                                          "C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"
                                          3⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1512
                                      • C:\Windows\SYSTEM32\cmd.exe
                                        "cmd.exe"
                                        2⤵
                                          PID:212
                                          • C:\Windows\System32\reg.exe
                                            "C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"
                                            3⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3472
                                        • C:\Windows\SYSTEM32\cmd.exe
                                          "cmd.exe"
                                          2⤵
                                            PID:1968
                                            • C:\Windows\System32\reg.exe
                                              "C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"
                                              3⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3540
                                          • C:\Windows\SYSTEM32\cmd.exe
                                            "cmd.exe"
                                            2⤵
                                              PID:3844
                                              • C:\Windows\System32\reg.exe
                                                "C:\Windows\System32\reg.exe" unload "HKLM\SAM"
                                                3⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4236
                                            • C:\Windows\SYSTEM32\cmd.exe
                                              "cmd.exe"
                                              2⤵
                                                PID:2540
                                                • C:\Windows\System32\reg.exe
                                                  "C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"
                                                  3⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4312
                                              • C:\Windows\SYSTEM32\cmd.exe
                                                "cmd.exe"
                                                2⤵
                                                  PID:2224
                                                  • C:\Windows\System32\reg.exe
                                                    "C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"
                                                    3⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1424
                                                • C:\Windows\SYSTEM32\cmd.exe
                                                  "cmd.exe"
                                                  2⤵
                                                    PID:4932
                                                    • C:\Windows\System32\reg.exe
                                                      "C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"
                                                      3⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3960
                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                    "cmd.exe"
                                                    2⤵
                                                      PID:1556
                                                      • C:\Windows\System32\reg.exe
                                                        "C:\Windows\System32\reg.exe" unload "HKLM\HARDWARE"
                                                        3⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1572
                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                      "cmd.exe"
                                                      2⤵
                                                        PID:3812
                                                        • C:\Windows\System32\reg.exe
                                                          "C:\Windows\System32\reg.exe" unload "HKLM\SAM"
                                                          3⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4260
                                                      • C:\Windows\SYSTEM32\cmd.exe
                                                        "cmd.exe"
                                                        2⤵
                                                          PID:4488
                                                          • C:\Windows\System32\reg.exe
                                                            "C:\Windows\System32\reg.exe" unload "HKLM\SECURITY"
                                                            3⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:3652
                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                          "cmd.exe"
                                                          2⤵
                                                            PID:2436
                                                            • C:\Windows\System32\reg.exe
                                                              "C:\Windows\System32\reg.exe" unload "HKLM\SOFTWARE"
                                                              3⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:3120
                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                            "cmd.exe"
                                                            2⤵
                                                              PID:2440
                                                              • C:\Windows\System32\reg.exe
                                                                "C:\Windows\System32\reg.exe" unload "HKLM\SYSTEM"
                                                                3⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:3696

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Local\Temp\Settings.txt

                                                            Filesize

                                                            758B

                                                            MD5

                                                            f10a581b464275113e8a2fbdecd22432

                                                            SHA1

                                                            ea25fed8bf2d1c69a37f8d1460bf4e5be9665ab8

                                                            SHA256

                                                            36cc04c9df6a9a535bbd8930564146eb5ce3f51a207fe77b2e6d10df875a5212

                                                            SHA512

                                                            4e5e4092b2de2938b215514857e0879c96a3bb1da590630b227ef6692eedb879be1af4d2a655d7ecea547adb1b688b9675f92bae2bd5ccd0d682d586e091c7c1

                                                          • C:\Users\Admin\AppData\Local\Temp\Settings.txt

                                                            Filesize

                                                            832B

                                                            MD5

                                                            74acdc20b4af6a000e3a621d1a6bc084

                                                            SHA1

                                                            1f5262a49201a447c989db711644e3b1d4b7127e

                                                            SHA256

                                                            06c7743d39374b91cad0e3f281d969d575cfb3b6645b7b3473d9c97434b18342

                                                            SHA512

                                                            34083100974d0f0f48ff26e9759a8e7a48babd5db5a6ce14f43edbc5a7b1c99f28eb8992bb28acb657d7c88b786710e060dcd80be052235bfd5ffaf48920f5c0

                                                          • C:\Users\Admin\AppData\Local\Temp\Settings.txt

                                                            Filesize

                                                            832B

                                                            MD5

                                                            428fe4538571c7735863c1b679c8cf6c

                                                            SHA1

                                                            ad0fdef268f220026166b9b6fb9c3994b1582166

                                                            SHA256

                                                            4eef18c3849474921ed2b2a899bce15340746f43672e31ac66e27c83fd741196

                                                            SHA512

                                                            e3f0115c04dac0ebb8628c200db1720dac60ee552634fe8830296ea91277b3d55a53e15f0f11cd6b75d2d05a1d5fcb1bcf15b13b0a77b6255a6518e2200a4186

                                                          • C:\Users\Admin\AppData\Local\Temp\cert.reg

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            1e841f473f5ae2fd69fe63b97313e546

                                                            SHA1

                                                            66a48acec7eae0387f09686c4bdcd6f6dcc447b5

                                                            SHA256

                                                            8bc6102c6eacb53b9e57cb3a73246635fa25b7c6d32dc59439beb2d2240b44f9

                                                            SHA512

                                                            02018267a6289326c4d44a60cc38b66c94fdbdb35142a461810f0f61374947a503d9495cbdfa44af0a20c234bd388f5bca835d3dc2bde6994e83914b28d6484c

                                                          • memory/1116-15-0x00007FFF2EB40000-0x00007FFF2F601000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/1116-17-0x000001E779580000-0x000001E779729000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/1116-9-0x00007FFF2EB40000-0x00007FFF2F601000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/1116-11-0x00007FFF2EB43000-0x00007FFF2EB45000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/1116-12-0x00007FFF2EB40000-0x00007FFF2F601000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/1116-13-0x00007FFF2EB40000-0x00007FFF2F601000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/1116-0-0x00007FFF2EB43000-0x00007FFF2EB45000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/1116-14-0x000001E779580000-0x000001E779729000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/1116-16-0x00007FFF2EB40000-0x00007FFF2F601000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/1116-8-0x00007FFF2EB40000-0x00007FFF2F601000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/1116-106-0x000001E779580000-0x000001E779729000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/1116-131-0x000001E779580000-0x000001E779729000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/1116-7-0x00007FFF2EB40000-0x00007FFF2F601000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/1116-142-0x000001E779580000-0x000001E779729000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/1116-2-0x00007FFF2EB40000-0x00007FFF2F601000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/1116-157-0x000001E779580000-0x000001E779729000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/1116-1-0x000001E775DF0000-0x000001E776F04000-memory.dmp

                                                            Filesize

                                                            17.1MB

                                                          • memory/1116-180-0x000001E779580000-0x000001E779729000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/1116-181-0x00007FFF2EB40000-0x00007FFF2F601000-memory.dmp

                                                            Filesize

                                                            10.8MB