Analysis

  • max time kernel
    103s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 12:40

General

  • Target

    ffdd6cbf5a3a6998bd8260f2a093afd0N.exe

  • Size

    91KB

  • MD5

    ffdd6cbf5a3a6998bd8260f2a093afd0

  • SHA1

    7ed2d8f62176a287461a035e89aed29aa7dd4411

  • SHA256

    41bdfc53b9cbdb047bf48ae94a89e31eca93cd439c27e52aa261197fe1772934

  • SHA512

    7396323ccd1c131bec9dd1af9934d8bbb397fce2c62adf2b3f48d0a9e510d4bd0e3b492ad7a46e87f9bcffa456f562e5ff3ac3699846c1a60022f1af6e38bd59

  • SSDEEP

    1536:FAwEmBGz1lNNqDaG0PoxhlzmKAwEmBGz1lNNqDaG0Poxhlzm/:FGmUXNQDaG0A8KGmUXNQDaG0A8/

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffdd6cbf5a3a6998bd8260f2a093afd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ffdd6cbf5a3a6998bd8260f2a093afd0N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3508
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3192
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2252
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1184
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4764
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:228
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3456
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3848

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

          Filesize

          91KB

          MD5

          98e100e9637f5452ee4da47b90a18a79

          SHA1

          0ae3bccf5b6786f453d99bb0d7276e8cefea5f7e

          SHA256

          3b0f00f2d31d8dd38da09a5c6fc148f73b321d71e598844eaf06f73f5d037da0

          SHA512

          378248996d1be7ba37833696a0b665ce9f4275c101945b59be5736777c2fac96ce8d8701f80c293a0a5a6dc73ac909c72da590f5ee85f7f0919fb58443da1a15

        • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

          Filesize

          91KB

          MD5

          a979edd4d9aab26eb7d522b652c6bfa1

          SHA1

          d71ea1fc83a6590f4cd4a4a3a2a0d6bcb4fe5a54

          SHA256

          f322147e67ccee89771b9311d2fcab127c641c079ddea2cb48f6d4d03ce1957b

          SHA512

          9dc92ac6d05ad8aa6a59368d68336a72f06ab9899c4532648c90841821e5189ed65892da14c383fda58a81ed0bccf0fdae31dd4fde765671e94ae48b0d917211

        • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

          Filesize

          91KB

          MD5

          008ae98b5fdc58d915c8357a0aef1f4a

          SHA1

          ec6f601c186ec81b26b4b28841e85466bc7484ed

          SHA256

          1f411e584606f9fe5b84f591172c504a3cafe5833ed0982fa3f89aafb15efcd0

          SHA512

          122bed7e940301ee1b1485399d612b96ddd0560d832e0fa62c6661bbfdef9b8bf2f9997cbeca73af51389f3f4225e5488aa8e04d7ffd8cbfb2e18db4dee26e96

        • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

          Filesize

          91KB

          MD5

          d29da8b4259c77e04c71cce04425021f

          SHA1

          7e1f110e5ef2ed6b7905d6d63b225a4a4fc46888

          SHA256

          23b5372df28e306521a4b279c34efebc7f1f43bd404e2be1dd1a470121a298d1

          SHA512

          08d9fb01a2dfbc16eb0fc25b88e0f41465d4efe87045ed67441ea69474e9ecd18d4dc6669c8f9187ef0117c9848e481a4c0bb207114f71a9e343360f289a7142

        • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

          Filesize

          91KB

          MD5

          7c7549d12bb25f1ee86980d9a78e3315

          SHA1

          c1be1ebaf41a778339c971f747c6213d801a5986

          SHA256

          757f90d0d9e5daa6cd460255ade01279dc1d1e353a606bc8b55b803ada726e2e

          SHA512

          0d280a3d982f0facc37d263dcee99d0dadf27fbeda3643ae9acf6450dfb93d63989ed03da4a0625ef365311e94866a677438bf455f4d43aed9fba8221ae98fe6

        • C:\Users\Admin\AppData\Local\winlogon.exe

          Filesize

          91KB

          MD5

          ffdd6cbf5a3a6998bd8260f2a093afd0

          SHA1

          7ed2d8f62176a287461a035e89aed29aa7dd4411

          SHA256

          41bdfc53b9cbdb047bf48ae94a89e31eca93cd439c27e52aa261197fe1772934

          SHA512

          7396323ccd1c131bec9dd1af9934d8bbb397fce2c62adf2b3f48d0a9e510d4bd0e3b492ad7a46e87f9bcffa456f562e5ff3ac3699846c1a60022f1af6e38bd59

        • C:\Windows\SysWOW64\IExplorer.exe

          Filesize

          91KB

          MD5

          b95f9816fa8d253e8035ea28df32c1e2

          SHA1

          c74fe30dbc49c05fc14ffac939a33a4fedd80500

          SHA256

          9dc257e6be058c758aec50da72269f14a47d3aa1a80e391f8e93a2709f7dc8a9

          SHA512

          49d12a6e00e6edd8aa487e6ce7f451adff6609c23a63ebe42ab59517d191b4322133f58458cf4a32836e47d3de2073ec3ee499817cfb2e9544f70b3f9c0e5308

        • C:\Windows\xk.exe

          Filesize

          91KB

          MD5

          fb9ade2e555c1ed3bc19ce2ea484935c

          SHA1

          f5201e6c172f806f19d63da256ebac460b174367

          SHA256

          5a069ff47e8f2df0b9b6716de89107972dceb014c2d3a2074d0121e5a45fd3a9

          SHA512

          f0912b60fa2f4584c3d3b28918b242fc1c1957c20e00815343b34795e37172fa4367e56cf611aaf03d518b51dba0b805807c479ed4371ae106c2aea37e87592d

        • memory/228-140-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/228-135-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1184-124-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2252-117-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/3192-114-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/3456-146-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/3508-0-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/3508-155-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/3848-153-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/4764-131-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB