Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13/09/2024, 19:44 UTC

Errors

Reason
Machine shutdown

General

  • Target

    Server.exe

  • Size

    93KB

  • MD5

    deb54ef342e3a0ec27127a3e7d652d26

  • SHA1

    e06df21ee97e502b70dc7bde782eb74207903eda

  • SHA256

    9147c7836fe827450e7f0d66e8337fbd07928a0ea19f428db38657fbdffd2075

  • SHA512

    a0a3b05849e2601c35f41f5bd6a281c012e16dc496bb6f6037cfa539dc4dc2e3d1d5bd8fdcf782a800096682cd8969316913ebd226d07a8eb66025980ca48a3f

  • SSDEEP

    1536:z9PTr1IDavlZhbSKl9YdjEwzGi1dDUDSgS:z9PSDavlZIQmqi1da3

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Drops startup file 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    "C:\Users\Admin\AppData\Local\Temp\Server.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3756
    • C:\ProgramData\server.exe
      "C:\ProgramData\server.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5608
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\ProgramData\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:3464
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall delete allowedprogram "C:\ProgramData\server.exe"
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:3436
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\ProgramData\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:4300
      • C:\Windows\SysWOW64\Shutdown.exe
        Shutdown -r
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5488
      • C:\Users\Admin\AppData\Local\Temp\tmp8BAC.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp8BAC.tmp.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5140
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService
    1⤵
      PID:4768
    • C:\Windows\System32\PickerHost.exe
      C:\Windows\System32\PickerHost.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:5660
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa3a1a855 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:556

    Network

    • flag-us
      DNS
      else-treatment.gl.at.ply.gg
      server.exe
      Remote address:
      8.8.8.8:53
      Request
      else-treatment.gl.at.ply.gg
      IN A
      Response
      else-treatment.gl.at.ply.gg
      IN A
      147.185.221.22
    • flag-us
      DNS
      22.221.185.147.in-addr.arpa
      server.exe
      Remote address:
      8.8.8.8:53
      Request
      22.221.185.147.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      self.events.data.microsoft.com
      server.exe
      Remote address:
      8.8.8.8:53
      Request
      self.events.data.microsoft.com
      IN A
      Response
      self.events.data.microsoft.com
      IN CNAME
      self-events-data.trafficmanager.net
      self-events-data.trafficmanager.net
      IN CNAME
      onedscolprdeus03.eastus.cloudapp.azure.com
      onedscolprdeus03.eastus.cloudapp.azure.com
      IN A
      20.42.73.24
    • flag-us
      DNS
      24.73.42.20.in-addr.arpa
      server.exe
      Remote address:
      8.8.8.8:53
      Request
      24.73.42.20.in-addr.arpa
      IN PTR
      Response
    • 147.185.221.22:31932
      else-treatment.gl.at.ply.gg
      server.exe
      4.7kB
      79.2kB
      75
      107
    • 147.185.221.22:31932
      else-treatment.gl.at.ply.gg
      server.exe
      1.0kB
      976 B
      18
      22
    • 147.185.221.22:31932
      else-treatment.gl.at.ply.gg
      server.exe
      819 B
      52 B
      12
      1
    • 8.8.8.8:53
      else-treatment.gl.at.ply.gg
      dns
      server.exe
      292 B
      569 B
      4
      4

      DNS Request

      else-treatment.gl.at.ply.gg

      DNS Response

      147.185.221.22

      DNS Request

      22.221.185.147.in-addr.arpa

      DNS Request

      self.events.data.microsoft.com

      DNS Response

      20.42.73.24

      DNS Request

      24.73.42.20.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\server.exe

      Filesize

      93KB

      MD5

      deb54ef342e3a0ec27127a3e7d652d26

      SHA1

      e06df21ee97e502b70dc7bde782eb74207903eda

      SHA256

      9147c7836fe827450e7f0d66e8337fbd07928a0ea19f428db38657fbdffd2075

      SHA512

      a0a3b05849e2601c35f41f5bd6a281c012e16dc496bb6f6037cfa539dc4dc2e3d1d5bd8fdcf782a800096682cd8969316913ebd226d07a8eb66025980ca48a3f

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\server.exe.log

      Filesize

      408B

      MD5

      593f806d2255a76afcad5d4a8395781b

      SHA1

      3990edff12ef61875bb4206b25a97a9440a8998c

      SHA256

      beb8b3a764b3e94cc547be84090345e833be03d95d680ad4d75734ccd6485757

      SHA512

      97440ebd7f8aac1030fe83c7f32a40a986d0fa6faec2c8b8cfbce093a3f27e7626c0b6e768ce6c753ac4dddc4227057b3a6e1d5a652d1f4a9cf64fa8efbad017

    • C:\Users\Admin\AppData\Local\Temp\tmp8BAC.tmp.exe

      Filesize

      28KB

      MD5

      6c2210ba180f0e1b9d831c3c6c14c8b4

      SHA1

      00bebdf704f4cabf254583c6ad87c6e72872b61a

      SHA256

      501c36ac282029ccf7950a4957d4c10ea72fe18f0ad8d6daeabfe628fa4070a7

      SHA512

      26a63ad05199cf45acd7519fbc63945097b4c4a89bb2cdfa4f87ba004e1ce106220b0b99419e656de26d164265b3868a9ce541c71b05d4e4db1a9a1343130e9b

    • C:\Users\Admin\AppData\Roaming\app

      Filesize

      5B

      MD5

      bbcd2be775370c1e106e66d077a93f3b

      SHA1

      a44b6a98f30e3275fc304bc3b29e0eab8ae47f20

      SHA256

      a7aa76f137ba550c381cfb8e5195a01963ae49db167e1cd1e0a8b902ed81eda1

      SHA512

      bb6e0d1f24253a9525fd538debf8ca68eb7078cb8539140c184331a854ecdea192fbcc314c4154a0a474c9aec41a79efeb8150922454c3c9e71eeb5297ae2f72

    • memory/3756-0-0x0000000074F91000-0x0000000074F92000-memory.dmp

      Filesize

      4KB

    • memory/3756-14-0x0000000074F90000-0x0000000075541000-memory.dmp

      Filesize

      5.7MB

    • memory/3756-2-0x0000000074F90000-0x0000000075541000-memory.dmp

      Filesize

      5.7MB

    • memory/3756-1-0x0000000074F90000-0x0000000075541000-memory.dmp

      Filesize

      5.7MB

    • memory/5140-53-0x00000000058A0000-0x0000000005E46000-memory.dmp

      Filesize

      5.6MB

    • memory/5140-51-0x0000000000780000-0x000000000078E000-memory.dmp

      Filesize

      56KB

    • memory/5140-52-0x0000000005250000-0x00000000052EC000-memory.dmp

      Filesize

      624KB

    • memory/5140-54-0x0000000005390000-0x0000000005422000-memory.dmp

      Filesize

      584KB

    • memory/5140-55-0x00000000052F0000-0x00000000052FA000-memory.dmp

      Filesize

      40KB

    • memory/5140-56-0x0000000005520000-0x0000000005576000-memory.dmp

      Filesize

      344KB

    • memory/5608-39-0x0000000074F90000-0x0000000075541000-memory.dmp

      Filesize

      5.7MB

    • memory/5608-16-0x0000000074F90000-0x0000000075541000-memory.dmp

      Filesize

      5.7MB

    • memory/5608-15-0x0000000074F90000-0x0000000075541000-memory.dmp

      Filesize

      5.7MB

    • memory/5608-57-0x0000000074F90000-0x0000000075541000-memory.dmp

      Filesize

      5.7MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.