Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 10:48

General

  • Target

    9f38a3599f2a77096afdae705a4f2c20N.exe

  • Size

    1.3MB

  • MD5

    9f38a3599f2a77096afdae705a4f2c20

  • SHA1

    bc23df08278b94bbcaf63a78b3c6b49b27229584

  • SHA256

    be1b293c4e68993bf3ee8c99bb70849f5448a339439228de8f6febbc31acc0bf

  • SHA512

    3c63b6ffa38e79e55afd66e269daa78859c55ca3d456d13db34ba33b4455543dcef2b2aa1bafdebe6a4c3c217a031b1ed5527df8c77f5a21c915786567985d39

  • SSDEEP

    12288:gXgvmzFHi0mo5aH0qMzd58Y7FQPJQPDHvd:gXgvOHi0mGaH0qSdvFC4V

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 26 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f38a3599f2a77096afdae705a4f2c20N.exe
    "C:\Users\Admin\AppData\Local\Temp\9f38a3599f2a77096afdae705a4f2c20N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Hijack Execution Flow: Executable Installer File Permissions Weakness
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:5080
    • C:\Users\Admin\AppData\Local\Temp\xcmkx.exe
      "C:\Users\Admin\AppData\Local\Temp\xcmkx.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Impair Defenses: Safe Mode Boot
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:2368
    • C:\Users\Admin\AppData\Local\Temp\xcmkx.exe
      "C:\Users\Admin\AppData\Local\Temp\xcmkx.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • System policy modification
      PID:2856
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\xcmkxyeepiyjrxibrejtrefllwp.qye

      Filesize

      280B

      MD5

      a3b091f4d04d027ab390c74ca12cecfc

      SHA1

      26e7d9accc5f3c740b12796ee8046fd1fa807b3a

      SHA256

      ec70b2e69bd4ef2097643ba6afcd3d3871daad1c2b3b18f65d1c173b749abf63

      SHA512

      508fefd1f286765aef221a9d2a9de4ff60594c7694e9c5ea041e24ff71e4d7b976f000c1de3a72c0b0191855006fb0815a9822cab88bc27ab127587563cbc20e

    • C:\Program Files (x86)\xcmkxyeepiyjrxibrejtrefllwp.qye

      Filesize

      280B

      MD5

      431edba19fa3821173b2cfebdb4a0bc6

      SHA1

      150726b962a1748a0c9312c9f105225d0c203504

      SHA256

      c770a067d1ddc29a8fb6d160f636d4382ed9ce4bfd99c1764dcf6f047c07a4af

      SHA512

      ca262b2eaa4b5437ee857a0a42c08b816929621508272776c04abf89b6d6021d62329661977760eb2c2810968cea090566c667212d04cd2808f3caf89f01c093

    • C:\Program Files (x86)\xcmkxyeepiyjrxibrejtrefllwp.qye

      Filesize

      280B

      MD5

      4d329c704327049eda289f0e34e19a90

      SHA1

      5b47dafb560ca7e0e09e75c1e77d5ad3b7ff3158

      SHA256

      b9c4a99c3440e79e65faf6824f83aea0bfec4da927f1b36ad4bf0d4483e45869

      SHA512

      28116ab6879752ad2fdfc533c6c922ce3f54251bd796151d88bf8c4b162e3a86a040f29e049e96d5390b47335b14e7d601ed6c17b233ce784466c8ccd524f12a

    • C:\Program Files (x86)\xcmkxyeepiyjrxibrejtrefllwp.qye

      Filesize

      280B

      MD5

      2f961f0f10a59f05a73017cd1166c645

      SHA1

      dd8ca0c0c1a21077fc8fb9eb5416098d36fb4757

      SHA256

      e7159df45560ddc21cf2c464faa9ff8aa0d45bddc4db1e8334a67b890d554e4a

      SHA512

      aea2d35fd31a2036522cae4562db8e28c9a458c0f28db721b95d6042de6a6b4f66ede3d6394e18f3ea39756f361aa3af8218e7abb429c4ca9423b59adff474c4

    • C:\Program Files (x86)\xcmkxyeepiyjrxibrejtrefllwp.qye

      Filesize

      280B

      MD5

      9144557d7249c50c598351236d72405a

      SHA1

      39946742810c9fdd9829199ed81abbbd5ef92f04

      SHA256

      6b47c9abf1465329b3de54d63e1c31f87628df1eec4207bce5075f142d42f48d

      SHA512

      bb0050bc6cead7e5779170f31bdfdf1ee867672d56b118aacfcb8f91ca8ec4c10ccae6697f320122929a09f464f32d990a65dd6af685c50a3f7182e4d5e42089

    • C:\Users\Admin\AppData\Local\Temp\xcmkx.exe

      Filesize

      2.1MB

      MD5

      9d75b2942db527a2253369746e176eca

      SHA1

      c5f7e631a18c4519e3698b7f280d56060aa65017

      SHA256

      38842d9038a287223ad9fc0cf740e3487954fac79651acfb0e05853762e64834

      SHA512

      a0e99af42240f7b8b9593adc9c55a1495d08a34c55d2a51b4f647344ccd330b612def0bfe54f17754d91bd1f1629a1ac208625933874581a164678ea821f0db9

    • C:\Users\Admin\AppData\Local\ukfomypawabxqhdhigwraykbmimnjctptusidm.wny

      Filesize

      4KB

      MD5

      7ca4eef77b367f533553e453e73fe8d8

      SHA1

      03e70718f3e41d273591836206ac279bdfd7103e

      SHA256

      bc7bf2a5d96138f9f76cce165e377500c73c3f01417c72292ec9ad89c1927c4e

      SHA512

      58a7bdd02b853dba85062f7e85c97a54e957b0d411cb4522e3657024f97c96e70ccba650e8b0c74c6e194c951ea3c66262b591561dc2242eb47337231241eb68

    • C:\Users\Admin\AppData\Local\xcmkxyeepiyjrxibrejtrefllwp.qye

      Filesize

      280B

      MD5

      3e743d916a1b791fc742e9850014d8c6

      SHA1

      1cc98d87f81af57b5507f6aa1690c9cf6a730707

      SHA256

      7caf02e366903ee2ad707e330968e0df6ffb295802f14253dc56f70f8a0ae82e

      SHA512

      0d14ed5598fe107c26f99ce429399a2d887384979d2832c06d2ee27f351256a37215e99cdfc075a215e566e96c91a018e49b7911234505d10ae04889abb61949

    • C:\Users\Admin\AppData\Local\xcmkxyeepiyjrxibrejtrefllwp.qye

      Filesize

      280B

      MD5

      02acf910a7600f7e9f7f877c71be5717

      SHA1

      c2b035819e4ad71d3c7902c1454ef552a3addd02

      SHA256

      4559ee03365e1baf93a3f1d989c44aed2cd4ac92596927c8a0d84000c7255b58

      SHA512

      b4b86f487114aed4111d0384b7eeb7bbaf51ee7f4f1a930154a1c41a41cb505b975028fd14606f73de467a8f004f5b839fd38bb751f3f4b642445a73e95047a9