Analysis

  • max time kernel
    101s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 10:14

General

  • Target

    b377b603f77df3e1bf46289a39233ee0N.exe

  • Size

    91KB

  • MD5

    b377b603f77df3e1bf46289a39233ee0

  • SHA1

    5ef26c740b005833d1f480f3fe5067cf23d30ae0

  • SHA256

    9af65f6d0d95d63012c7e3462047c901fe4c2ed2a28e4f1250fe238552f333da

  • SHA512

    9a0d6a722eb88f49aed1d50702265eba23442d683ae275eee6a0fb0f326b6ffe6f89f0a2aa2a22164e18396fe4efc36d0ba04243cdcd0e71a1bbbe0d47247240

  • SSDEEP

    1536:1AwEmBT4JzRJwEeUW7f12xULgJz7AwEmBT4JzRJwEeUW7f12xULgJzRD:1Gml41LBu7f1WN7Gml41LBu7f1WNRD

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b377b603f77df3e1bf46289a39233ee0N.exe
    "C:\Users\Admin\AppData\Local\Temp\b377b603f77df3e1bf46289a39233ee0N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:540
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1476
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:532
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1100
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4152
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1932
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3180
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    5d9f7724fbf2bdc04ec0f50426ef9c07

    SHA1

    0308c3a3b17ad9917eb0555488bdec218562d535

    SHA256

    1f844e07ec1cfb350e71661ef289abf68b5e920db936225123877be7c72c25b4

    SHA512

    11c1aff3b3f606716d68751e141b4de9addfc848d9b0cfd901806fee130e288e6ce611d581a06cf5f38dbfea49c82f39c06f7693062da7d90f1ad189a1cdf6a0

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    1e49e869a1e7e6350acb0191e4594c91

    SHA1

    b06bbc9c2518a4e73d098a37086766b5233ddb55

    SHA256

    a5bcb6c256dc804e3e73c97601819951bc45a464e8c2d4b5c5f865a885b97774

    SHA512

    b761fb8723c735af7bbc7e1713639f89f8dd634002bcd105e1c4dee7cb3457ff31df89e169b86f5d0ea3c4165e5ab3bacb561d24f8c4960f3410fdbc96704b41

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    d93ce8e43af0bd28a3a692650a5a3a28

    SHA1

    a6cf4c5d751042081a3e57ae703787c2461e9fa2

    SHA256

    281751d919ef8716d9b1040e5938cc004c324db5503c06899ac72e70819667b4

    SHA512

    ac6356896d54e9b3f162f9d9b8bc473cc435b1e8c4fa43f79217b0044fc783117de4055ada0224b2b6f3f4b79fcadc85286bcc724b8ad6ad48a5491bbb4d0c7f

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    0cd5b0dc75e2a4272a1ac182461cfda0

    SHA1

    6b09b37f214f3eccf09e318fec0d475efe718425

    SHA256

    2f6cd976aac6222c3fa3f094c4378d58e664be30586c49dedd9ec3fcbfd174b8

    SHA512

    b544b1fffccf997afac659214ca301c0509982ff5ff436886be0a5b58a19d91654ada465ed87ee9ffdc4e616d156d21cb192e46652c5823c1103b301405e1c2c

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    b377b603f77df3e1bf46289a39233ee0

    SHA1

    5ef26c740b005833d1f480f3fe5067cf23d30ae0

    SHA256

    9af65f6d0d95d63012c7e3462047c901fe4c2ed2a28e4f1250fe238552f333da

    SHA512

    9a0d6a722eb88f49aed1d50702265eba23442d683ae275eee6a0fb0f326b6ffe6f89f0a2aa2a22164e18396fe4efc36d0ba04243cdcd0e71a1bbbe0d47247240

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    761df5751d6061226423d2750ee7177c

    SHA1

    5ec6bcefe881adb89cbfd73f2bdba994c72ae987

    SHA256

    381738a166050ce018d8af106ff830d316151ea1e25c82149ad40b3187fb6a75

    SHA512

    8561a9a483ec493d448619fae5b62497c89078e47a6dee446497f6c14ecc471c943af0211d5c291a003390e96b7ebed0e6cca09fbc1f8ae3c6efa4c4172c009d

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    a1ab7a095a4c0e326e932c1379e9d2cb

    SHA1

    8600abe7ed17aed9022f58ab4ed01f0f03b2df31

    SHA256

    05ea024cd14ca33358e1b041ef4fec325b085a7a6e3e8f3e97981aea46cffc44

    SHA512

    3ff407255c6539eadbbd0b27f9d20646d932cbb105b609e23d019d9d6088c1841a01f7e0338529d26e452395bfd87f00f3877ea3e8cee1284763c6b9c48e6e17

  • memory/532-120-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/540-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/540-153-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1100-124-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1476-114-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1932-137-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3180-146-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4152-130-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4844-148-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4844-151-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB