Analysis

  • max time kernel
    105s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 21:07

General

  • Target

    489b9f9eb3059677c5d0d32554172bf0N.exe

  • Size

    91KB

  • MD5

    489b9f9eb3059677c5d0d32554172bf0

  • SHA1

    ab97bb8b2a8c7507bd762b569d0228706f6e54ef

  • SHA256

    d655522f4894624950eab7e21cfa6c927c70d9048aa25aa55e8c3fe8f8acd2ac

  • SHA512

    46ccc5f8b2d3ffe8bedae9026938f39c4bc5224585c743b70711caea2ed632a5be460ffec59e5dd795e925ac3ada7d800990ad9ed00d4ad9203c87a79efe3777

  • SSDEEP

    1536:XJRtlEnBHHIgabuYotV/JbJCX5SBijEJRtlEnBHHIgabuYotV/JbJCX5SBiE:XvtYxOuYotvYQIjEvtYxOuYotvYQIE

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\489b9f9eb3059677c5d0d32554172bf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\489b9f9eb3059677c5d0d32554172bf0N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3468
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:372
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2340
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:384
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3200
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4092
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:5064
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    e325e06da92472c1c0205324c03e7f4d

    SHA1

    a16daa2b73d8920e70b7f72bd781ad8f2038540f

    SHA256

    2a08d24a4893e72316ad0e7a5f920c944dd4417cdf92928527fe6102328fe20c

    SHA512

    5b69d033e51a869a2d0855e79bc61eb93cb6c7172f702289017405853273c65c13d97da738a1352fd352e870f8d9c7bc44bbc3b4ef5c722e48618fb63be002d4

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    1729b4e9ffb6e54d299371978aea2238

    SHA1

    902f592ea15468274ba2ce49c036ee06a864f653

    SHA256

    0ea17a10982f54a05c801cbcdc7530ddccc7ff315caf978849467fdc2ed9bf37

    SHA512

    972581dbc7ef8b13347e7ee4c180ef18ac6f96d3de6d32b12373983da0f772c5761827fef1ff39af09805bb1baafe3ea0266bfa649ed5e6f124391e9b2dc4dfc

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    7381c3b5dd7f8e4156a8a47ba1685006

    SHA1

    31e74046fa61e446ad3e9f20496a883999be2b73

    SHA256

    bac41a591614c30f89289168308f389d1c4e8314dbace7aadb9f1c32bd99f79d

    SHA512

    89190e242898838b43d72d7fbee5658e1d01fbb086c21650faeeac790895c7abb9f1fe98a650ae0e1bd89fa48ba26d42d422d162ae9df3486b65fa824ff633fe

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    95bfdd74e399432ffac8239b85d22ec6

    SHA1

    9a2bdeeb2c581ef3807819d9ea043565250e3201

    SHA256

    a0d47d42b1c4f1b3ff01cb9aa724ad79757105ef31b41eaa0093ccc75b42a409

    SHA512

    e8fce12ced754e30b0bd31a14035c703b6fa4bf196978731d8ea7190d43bb2fc8981f0ce69cf17c9f5bde78acadce446fbc2aa0a2a05fe0e9afb1412cc97a966

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    c6920bf2c3efcc8c7dd845faef7ca310

    SHA1

    223155aea3f6afd99883d60585f67a461b7c5389

    SHA256

    790706b19f702fe3bf659551ad2beaf6833a8491fa70dcfd421a4125f793bdef

    SHA512

    da95e6c233e64ac6942bdb18c7e3ca145da57ce346d8ba4fd03c8977e7e25be4ca814afc02d922baf20dcbb13b3deabe4313a302352c74594366d276e66f3861

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    489b9f9eb3059677c5d0d32554172bf0

    SHA1

    ab97bb8b2a8c7507bd762b569d0228706f6e54ef

    SHA256

    d655522f4894624950eab7e21cfa6c927c70d9048aa25aa55e8c3fe8f8acd2ac

    SHA512

    46ccc5f8b2d3ffe8bedae9026938f39c4bc5224585c743b70711caea2ed632a5be460ffec59e5dd795e925ac3ada7d800990ad9ed00d4ad9203c87a79efe3777

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    1d90611fa9af24cc9ecf7a2d8d3f874c

    SHA1

    1e0aece78fbb677e1c6b92838a04de8c0bfc1c98

    SHA256

    1100854c2d061c468d79cb3195f939e7233a818be8b0da162e2427b1a9088bd7

    SHA512

    d95211520529fbbb92a08d0f9407c01c78e02bac87891bbb0231a0d181c07d2c0c54fa1be10aa8e39062409fc76007d862a767bcf7cad2979acdef17ab034a5c

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    c0e45867ddec5f08e85e79c11297a36b

    SHA1

    7aa5f761f36a873d5ce311ceaba4f9a020d46c22

    SHA256

    e23a63f59c0bd440986417011a52ebf5ef2d27d5daf773215b2cdc50ae8dcab3

    SHA512

    5ff8919f624ecbd12664a4d1ac1c4bcb1b294fdb39eaad45489b0b26c4351b63ae532f2175695a5653d57c2b85c25350060d6e79ec534e75bc8c3fff1fff65c5

  • memory/372-113-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/384-125-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2340-119-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3028-154-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3200-132-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3468-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3468-156-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4092-136-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4092-140-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/5064-149-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB