Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
b377b603f77df3e1bf46289a39233ee0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b377b603f77df3e1bf46289a39233ee0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b377b603f77df3e1bf46289a39233ee0N.exe
-
Size
91KB
-
MD5
b377b603f77df3e1bf46289a39233ee0
-
SHA1
5ef26c740b005833d1f480f3fe5067cf23d30ae0
-
SHA256
9af65f6d0d95d63012c7e3462047c901fe4c2ed2a28e4f1250fe238552f333da
-
SHA512
9a0d6a722eb88f49aed1d50702265eba23442d683ae275eee6a0fb0f326b6ffe6f89f0a2aa2a22164e18396fe4efc36d0ba04243cdcd0e71a1bbbe0d47247240
-
SSDEEP
1536:1AwEmBT4JzRJwEeUW7f12xULgJz7AwEmBT4JzRJwEeUW7f12xULgJzRD:1Gml41LBu7f1WN7Gml41LBu7f1WNRD
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" b377b603f77df3e1bf46289a39233ee0N.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" b377b603f77df3e1bf46289a39233ee0N.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b377b603f77df3e1bf46289a39233ee0N.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b377b603f77df3e1bf46289a39233ee0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b377b603f77df3e1bf46289a39233ee0N.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 1476 xk.exe 532 IExplorer.exe 1100 WINLOGON.EXE 4152 CSRSS.EXE 1932 SERVICES.EXE 3180 LSASS.EXE 4844 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b377b603f77df3e1bf46289a39233ee0N.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" b377b603f77df3e1bf46289a39233ee0N.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell.exe b377b603f77df3e1bf46289a39233ee0N.exe File created C:\Windows\SysWOW64\Mig2.scr b377b603f77df3e1bf46289a39233ee0N.exe File created C:\Windows\SysWOW64\IExplorer.exe b377b603f77df3e1bf46289a39233ee0N.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe b377b603f77df3e1bf46289a39233ee0N.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr b377b603f77df3e1bf46289a39233ee0N.exe File opened for modification C:\Windows\SysWOW64\shell.exe b377b603f77df3e1bf46289a39233ee0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe b377b603f77df3e1bf46289a39233ee0N.exe File created C:\Windows\xk.exe b377b603f77df3e1bf46289a39233ee0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b377b603f77df3e1bf46289a39233ee0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop\ b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" b377b603f77df3e1bf46289a39233ee0N.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b377b603f77df3e1bf46289a39233ee0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b377b603f77df3e1bf46289a39233ee0N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 540 b377b603f77df3e1bf46289a39233ee0N.exe 540 b377b603f77df3e1bf46289a39233ee0N.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 540 b377b603f77df3e1bf46289a39233ee0N.exe 1476 xk.exe 532 IExplorer.exe 1100 WINLOGON.EXE 4152 CSRSS.EXE 1932 SERVICES.EXE 3180 LSASS.EXE 4844 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 540 wrote to memory of 1476 540 b377b603f77df3e1bf46289a39233ee0N.exe 84 PID 540 wrote to memory of 1476 540 b377b603f77df3e1bf46289a39233ee0N.exe 84 PID 540 wrote to memory of 1476 540 b377b603f77df3e1bf46289a39233ee0N.exe 84 PID 540 wrote to memory of 532 540 b377b603f77df3e1bf46289a39233ee0N.exe 85 PID 540 wrote to memory of 532 540 b377b603f77df3e1bf46289a39233ee0N.exe 85 PID 540 wrote to memory of 532 540 b377b603f77df3e1bf46289a39233ee0N.exe 85 PID 540 wrote to memory of 1100 540 b377b603f77df3e1bf46289a39233ee0N.exe 86 PID 540 wrote to memory of 1100 540 b377b603f77df3e1bf46289a39233ee0N.exe 86 PID 540 wrote to memory of 1100 540 b377b603f77df3e1bf46289a39233ee0N.exe 86 PID 540 wrote to memory of 4152 540 b377b603f77df3e1bf46289a39233ee0N.exe 87 PID 540 wrote to memory of 4152 540 b377b603f77df3e1bf46289a39233ee0N.exe 87 PID 540 wrote to memory of 4152 540 b377b603f77df3e1bf46289a39233ee0N.exe 87 PID 540 wrote to memory of 1932 540 b377b603f77df3e1bf46289a39233ee0N.exe 89 PID 540 wrote to memory of 1932 540 b377b603f77df3e1bf46289a39233ee0N.exe 89 PID 540 wrote to memory of 1932 540 b377b603f77df3e1bf46289a39233ee0N.exe 89 PID 540 wrote to memory of 3180 540 b377b603f77df3e1bf46289a39233ee0N.exe 90 PID 540 wrote to memory of 3180 540 b377b603f77df3e1bf46289a39233ee0N.exe 90 PID 540 wrote to memory of 3180 540 b377b603f77df3e1bf46289a39233ee0N.exe 90 PID 540 wrote to memory of 4844 540 b377b603f77df3e1bf46289a39233ee0N.exe 91 PID 540 wrote to memory of 4844 540 b377b603f77df3e1bf46289a39233ee0N.exe 91 PID 540 wrote to memory of 4844 540 b377b603f77df3e1bf46289a39233ee0N.exe 91 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b377b603f77df3e1bf46289a39233ee0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b377b603f77df3e1bf46289a39233ee0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer b377b603f77df3e1bf46289a39233ee0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" b377b603f77df3e1bf46289a39233ee0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b377b603f77df3e1bf46289a39233ee0N.exe"C:\Users\Admin\AppData\Local\Temp\b377b603f77df3e1bf46289a39233ee0N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:540 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:532
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1100
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4152
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1932
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3180
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4844
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD55d9f7724fbf2bdc04ec0f50426ef9c07
SHA10308c3a3b17ad9917eb0555488bdec218562d535
SHA2561f844e07ec1cfb350e71661ef289abf68b5e920db936225123877be7c72c25b4
SHA51211c1aff3b3f606716d68751e141b4de9addfc848d9b0cfd901806fee130e288e6ce611d581a06cf5f38dbfea49c82f39c06f7693062da7d90f1ad189a1cdf6a0
-
Filesize
91KB
MD51e49e869a1e7e6350acb0191e4594c91
SHA1b06bbc9c2518a4e73d098a37086766b5233ddb55
SHA256a5bcb6c256dc804e3e73c97601819951bc45a464e8c2d4b5c5f865a885b97774
SHA512b761fb8723c735af7bbc7e1713639f89f8dd634002bcd105e1c4dee7cb3457ff31df89e169b86f5d0ea3c4165e5ab3bacb561d24f8c4960f3410fdbc96704b41
-
Filesize
91KB
MD5d93ce8e43af0bd28a3a692650a5a3a28
SHA1a6cf4c5d751042081a3e57ae703787c2461e9fa2
SHA256281751d919ef8716d9b1040e5938cc004c324db5503c06899ac72e70819667b4
SHA512ac6356896d54e9b3f162f9d9b8bc473cc435b1e8c4fa43f79217b0044fc783117de4055ada0224b2b6f3f4b79fcadc85286bcc724b8ad6ad48a5491bbb4d0c7f
-
Filesize
91KB
MD50cd5b0dc75e2a4272a1ac182461cfda0
SHA16b09b37f214f3eccf09e318fec0d475efe718425
SHA2562f6cd976aac6222c3fa3f094c4378d58e664be30586c49dedd9ec3fcbfd174b8
SHA512b544b1fffccf997afac659214ca301c0509982ff5ff436886be0a5b58a19d91654ada465ed87ee9ffdc4e616d156d21cb192e46652c5823c1103b301405e1c2c
-
Filesize
91KB
MD5b377b603f77df3e1bf46289a39233ee0
SHA15ef26c740b005833d1f480f3fe5067cf23d30ae0
SHA2569af65f6d0d95d63012c7e3462047c901fe4c2ed2a28e4f1250fe238552f333da
SHA5129a0d6a722eb88f49aed1d50702265eba23442d683ae275eee6a0fb0f326b6ffe6f89f0a2aa2a22164e18396fe4efc36d0ba04243cdcd0e71a1bbbe0d47247240
-
Filesize
91KB
MD5761df5751d6061226423d2750ee7177c
SHA15ec6bcefe881adb89cbfd73f2bdba994c72ae987
SHA256381738a166050ce018d8af106ff830d316151ea1e25c82149ad40b3187fb6a75
SHA5128561a9a483ec493d448619fae5b62497c89078e47a6dee446497f6c14ecc471c943af0211d5c291a003390e96b7ebed0e6cca09fbc1f8ae3c6efa4c4172c009d
-
Filesize
91KB
MD5a1ab7a095a4c0e326e932c1379e9d2cb
SHA18600abe7ed17aed9022f58ab4ed01f0f03b2df31
SHA25605ea024cd14ca33358e1b041ef4fec325b085a7a6e3e8f3e97981aea46cffc44
SHA5123ff407255c6539eadbbd0b27f9d20646d932cbb105b609e23d019d9d6088c1841a01f7e0338529d26e452395bfd87f00f3877ea3e8cee1284763c6b9c48e6e17