Overview
overview
7Static
static
1WinX/Group...op.lnk
windows7-x64
3WinX/Group...op.lnk
windows10-2004-x64
7WinX/Group...un.lnk
windows7-x64
3WinX/Group...un.lnk
windows10-2004-x64
7WinX/Group...ch.lnk
windows7-x64
3WinX/Group...ch.lnk
windows10-2004-x64
7WinX/Group...er.lnk
windows7-x64
3WinX/Group...er.lnk
windows10-2004-x64
7WinX/Group...el.lnk
windows7-x64
3WinX/Group...el.lnk
windows10-2004-x64
3WinX/Group...er.lnk
windows7-x64
3WinX/Group...er.lnk
windows10-2004-x64
7WinX/Group...ll.lnk
windows7-x64
3WinX/Group...ll.lnk
windows10-2004-x64
7WinX/Group...ll.lnk
windows7-x64
3WinX/Group...ll.lnk
windows10-2004-x64
7WinX/Group...nt.lnk
windows7-x64
5WinX/Group...nt.lnk
windows10-2004-x64
7WinX/Group...nt.lnk
windows7-x64
5WinX/Group...nt.lnk
windows10-2004-x64
7WinX/Group...us.lnk
windows7-x64
3WinX/Group...us.lnk
windows10-2004-x64
3WinX/Group...er.lnk
windows7-x64
5WinX/Group...er.lnk
windows10-2004-x64
7WinX/Group...ut.lnk
windows7-x64
3WinX/Group...ut.lnk
windows10-2004-x64
3WinX/Group...er.lnk
windows7-x64
5WinX/Group...er.lnk
windows10-2004-x64
7WinX/Group...ep.lnk
windows7-x64
3WinX/Group...ep.lnk
windows10-2004-x64
3WinX/Group...er.lnk
windows7-x64
3WinX/Group...er.lnk
windows10-2004-x64
7Analysis
-
max time kernel
138s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
WinX/Group1/1 - Desktop.lnk
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
WinX/Group1/1 - Desktop.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
WinX/Group2/1 - Run.lnk
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
WinX/Group2/1 - Run.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
WinX/Group2/2 - Search.lnk
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
WinX/Group2/2 - Search.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
WinX/Group2/3 - Windows Explorer.lnk
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
WinX/Group2/3 - Windows Explorer.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
WinX/Group2/4 - Control Panel.lnk
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
WinX/Group2/4 - Control Panel.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
WinX/Group2/5 - Task Manager.lnk
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
WinX/Group2/5 - Task Manager.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
WinX/Group3/01a - Windows PowerShell.lnk
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
WinX/Group3/01a - Windows PowerShell.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
WinX/Group3/02a - Windows PowerShell.lnk
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
WinX/Group3/02a - Windows PowerShell.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
WinX/Group3/03 - Computer Management.lnk
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
WinX/Group3/03 - Computer Management.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
WinX/Group3/04 - Disk Management.lnk
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
WinX/Group3/04 - Disk Management.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
WinX/Group3/04-1 - NetworkStatus.lnk
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
WinX/Group3/04-1 - NetworkStatus.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
WinX/Group3/05 - Device Manager.lnk
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
WinX/Group3/05 - Device Manager.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
WinX/Group3/06 - SystemAbout.lnk
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
WinX/Group3/06 - SystemAbout.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
WinX/Group3/07 - Event Viewer.lnk
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
WinX/Group3/07 - Event Viewer.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
WinX/Group3/08 - PowerAndSleep.lnk
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
WinX/Group3/08 - PowerAndSleep.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
WinX/Group3/09 - Mobility Center.lnk
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
WinX/Group3/09 - Mobility Center.lnk
Resource
win10v2004-20240802-en
General
-
Target
WinX/Group3/05 - Device Manager.lnk
-
Size
1KB
-
MD5
3f72e09755a27abf3293f20c512699e5
-
SHA1
cba8433ccdd99437530efadc288392315c1a00a4
-
SHA256
114cea7ba8fa1dd3141d64bb728337e78e4a3de7577d674eed53bab5a9d48b3f
-
SHA512
f9c426700a4cc4b8f55d05a5d119678839d6c1b33568781b9113667cccfa4608e79a4a01dce46b397959f77b4e66b370b0ed75ca8274b0831d3ef1a5069a9387
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\devmgmt.msc mmc.exe -
Drops file in Windows directory 57 IoCs
description ioc Process File created C:\Windows\INF\c_scmvolume.PNF mmc.exe File created C:\Windows\INF\c_fsactivitymonitor.PNF mmc.exe File created C:\Windows\INF\c_fssystemrecovery.PNF mmc.exe File created C:\Windows\INF\c_fsreplication.PNF mmc.exe File created C:\Windows\INF\c_linedisplay.PNF mmc.exe File created C:\Windows\INF\c_volume.PNF mmc.exe File created C:\Windows\INF\c_fsopenfilebackup.PNF mmc.exe File created C:\Windows\INF\c_mcx.PNF mmc.exe File created C:\Windows\INF\c_cashdrawer.PNF mmc.exe File created C:\Windows\INF\xusb22.PNF mmc.exe File created C:\Windows\INF\c_fsinfrastructure.PNF mmc.exe File created C:\Windows\INF\c_smrvolume.PNF mmc.exe File created C:\Windows\INF\c_proximity.PNF mmc.exe File created C:\Windows\INF\c_fsphysicalquotamgmt.PNF mmc.exe File created C:\Windows\INF\c_fsquotamgmt.PNF mmc.exe File created C:\Windows\INF\wsdprint.PNF mmc.exe File created C:\Windows\INF\c_fscopyprotection.PNF mmc.exe File created C:\Windows\INF\c_fsantivirus.PNF mmc.exe File created C:\Windows\INF\c_computeaccelerator.PNF mmc.exe File created C:\Windows\INF\c_firmware.PNF mmc.exe File created C:\Windows\INF\remoteposdrv.PNF mmc.exe File created C:\Windows\INF\c_magneticstripereader.PNF mmc.exe File created C:\Windows\INF\c_netdriver.PNF mmc.exe File created C:\Windows\INF\c_fscontinuousbackup.PNF mmc.exe File created C:\Windows\INF\rawsilo.PNF mmc.exe File created C:\Windows\INF\c_barcodescanner.PNF mmc.exe File created C:\Windows\INF\c_sslaccel.PNF mmc.exe File created C:\Windows\INF\c_fssystem.PNF mmc.exe File created C:\Windows\INF\PerceptionSimulationSixDof.PNF mmc.exe File created C:\Windows\INF\dc1-controller.PNF mmc.exe File created C:\Windows\INF\c_monitor.PNF mmc.exe File created C:\Windows\INF\miradisp.PNF mmc.exe File created C:\Windows\INF\c_fscompression.PNF mmc.exe File created C:\Windows\INF\c_fsvirtualization.PNF mmc.exe File created C:\Windows\INF\c_fsundelete.PNF mmc.exe File created C:\Windows\INF\c_processor.PNF mmc.exe File created C:\Windows\INF\oposdrv.PNF mmc.exe File created C:\Windows\INF\c_extension.PNF mmc.exe File created C:\Windows\INF\c_fshsm.PNF mmc.exe File created C:\Windows\INF\c_diskdrive.PNF mmc.exe File created C:\Windows\INF\c_media.PNF mmc.exe File created C:\Windows\INF\c_fssecurityenhancer.PNF mmc.exe File created C:\Windows\INF\c_scmdisk.PNF mmc.exe File created C:\Windows\INF\c_swcomponent.PNF mmc.exe File created C:\Windows\INF\c_receiptprinter.PNF mmc.exe File created C:\Windows\INF\c_fscfsmetadataserver.PNF mmc.exe File created C:\Windows\INF\c_ucm.PNF mmc.exe File created C:\Windows\INF\c_display.PNF mmc.exe File created C:\Windows\INF\ts_generic.PNF mmc.exe File created C:\Windows\INF\rdcameradriver.PNF mmc.exe File created C:\Windows\INF\c_camera.PNF mmc.exe File created C:\Windows\INF\digitalmediadevice.PNF mmc.exe File created C:\Windows\INF\c_smrdisk.PNF mmc.exe File created C:\Windows\INF\c_apo.PNF mmc.exe File created C:\Windows\INF\c_fscontentscreener.PNF mmc.exe File created C:\Windows\INF\c_fsencryption.PNF mmc.exe File created C:\Windows\INF\c_holographic.PNF mmc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Checks SCSI registry key(s) 3 TTPs 20 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName mmc.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1836 mmc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 3876 control.exe Token: SeCreatePagefilePrivilege 3876 control.exe Token: 33 1836 mmc.exe Token: SeIncBasePriorityPrivilege 1836 mmc.exe Token: 33 1836 mmc.exe Token: SeIncBasePriorityPrivilege 1836 mmc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1836 mmc.exe 1836 mmc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3876 3044 cmd.exe 87 PID 3044 wrote to memory of 3876 3044 cmd.exe 87 PID 3876 wrote to memory of 1836 3876 control.exe 89 PID 3876 wrote to memory of 1836 3876 control.exe 89
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\WinX\Group3\05 - Device Manager.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\control.exe"C:\Windows\system32\control.exe" /name Microsoft.DeviceManager2⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" C:\Windows\system32\devmgmt.msc3⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1836
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:724