Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 21:20
Behavioral task
behavioral1
Sample
5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe
Resource
win7-20240704-en
General
-
Target
5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe
-
Size
176KB
-
MD5
14d0ff15f0af156ac70bfe66d080aadb
-
SHA1
9c372cdd1ee5925efb1828d399a05a0bc755db2f
-
SHA256
5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2
-
SHA512
1aa7a99b3d586ee0044df6a3d2d8b00b3fffdf35730d8661df6e0a3070db1d76396e10f690e40aa1d0f0b31443c99cb871f4f0491aa284c31fcccd895f679e8e
-
SSDEEP
3072:H86wLHW98aGEbxeE5hf1jNi+FnA8PJi7K9tOa9txNoK/Gm52222222222222:lwK97FbwEFBxruKrOarxNP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe -
Executes dropped EXE 2 IoCs
pid Process 3148 lsassys.exe 432 lsassys.exe -
resource yara_rule behavioral2/memory/3720-0-0x0000000000330000-0x0000000000398000-memory.dmp upx behavioral2/files/0x0007000000023410-11.dat upx behavioral2/memory/3720-49-0x0000000000330000-0x0000000000398000-memory.dmp upx behavioral2/memory/3148-47-0x0000000000AE0000-0x0000000000B48000-memory.dmp upx behavioral2/memory/432-52-0x0000000000AE0000-0x0000000000B48000-memory.dmp upx behavioral2/memory/3148-53-0x0000000000AE0000-0x0000000000B48000-memory.dmp upx behavioral2/memory/432-54-0x0000000000AE0000-0x0000000000B48000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsassys.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe\shell 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\lsassys.exe\" /START \"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt\DefaultIcon\ = "%1" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt\shell\runas 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe\ = "halnt" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe\shell\open\command 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt\DefaultIcon 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt\shell\runas\command\ = "\"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe\shell\runas 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt\shell 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt\shell\runas\command 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt\ = "Application" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt\shell\open\command 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt\shell\open 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt\Content-Type = "application/x-msdownload" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt\shell\runas\command\IsolatedCommand = "\"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe\DefaultIcon 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe\Content-Type = "application/x-msdownload" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\lsassys.exe\" /START \"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\halnt\shell\open\command\IsolatedCommand = "\"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe\DefaultIcon\ = "%1" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe\shell\open 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.exe\shell\runas\command 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3148 lsassys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3720 wrote to memory of 3148 3720 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe 86 PID 3720 wrote to memory of 3148 3720 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe 86 PID 3720 wrote to memory of 3148 3720 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe 86 PID 3148 wrote to memory of 432 3148 lsassys.exe 87 PID 3148 wrote to memory of 432 3148 lsassys.exe 87 PID 3148 wrote to memory of 432 3148 lsassys.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe"C:\Users\Admin\AppData\Local\Temp\5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"3⤵
- Executes dropped EXE
PID:432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5aa8dd64caafd3283250b8c23b03fcc39
SHA1c68ca0cfcd81f0df805d05ce05bf3870174d7713
SHA256e6e5e16ef9418ab073bf833545e0bb3c9c9f6a866731aa48bf2328b982e949cc
SHA512491b369bcd06a72ad13e71c04ad4b5d823d897a956fe661f69cd0f4e58f486709246df3c919d2330682f755225027d0a572959de17c3d2f6ad1bb8f26042c542