Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:24

General

  • Target

    f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe

  • Size

    91KB

  • MD5

    af90cf445fd9666a30271f431e4934c0

  • SHA1

    1be90f45f3fb6a0b10ad23a51f0e6552791475d1

  • SHA256

    f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40

  • SHA512

    a713ea79d38bf0050a74e4076ff8478e926c4203616c9ef9ff6eab2ece795177d0df1e45bcd1e02fb81a5798baf341b81204ab9f25bb5db87f8dc2d9160cf9bc

  • SSDEEP

    1536:FAwEmBGz1lNNqDaG0PoxhlzmUAwEmBGz1lNNqDaG0Poxhlzm3:FGmUXNQDaG0A8UGmUXNQDaG0A83

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe
    "C:\Users\Admin\AppData\Local\Temp\f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1744
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2344
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1872
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2436
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2856
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2884
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:784
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    a35e982f98b9c1a02f4d6c811e43fa32

    SHA1

    64f2f887c968de16b0477bbe677ae0a517fd983f

    SHA256

    0767c8d243f05320a1ff303e21a6527bf31b3d7afc6c0ffc5a8fbd3da7bf7656

    SHA512

    d222e10a0e3982f3545dfb8f696de2d17b80bd8d682bdd899c65afe54586c9d7e10bc9ca96881785cc1057ce27959a59e867b089dca4e90f478cf3be48f8ed70

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    af90cf445fd9666a30271f431e4934c0

    SHA1

    1be90f45f3fb6a0b10ad23a51f0e6552791475d1

    SHA256

    f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40

    SHA512

    a713ea79d38bf0050a74e4076ff8478e926c4203616c9ef9ff6eab2ece795177d0df1e45bcd1e02fb81a5798baf341b81204ab9f25bb5db87f8dc2d9160cf9bc

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    bfc7633dbac1eba92be95e3d77042251

    SHA1

    7c2fca7f452b786b916770269fdd6803a01f053b

    SHA256

    bca3da9c928ba038262c1dbd03be55258b9d51f97f442290e9914872b3080b48

    SHA512

    eecef8d4f08436acf7a169090defeddeefab56f1be95667dfdce1fa6788383c8e993c9224e1d3d61edd31e683eb7634084ac3a4ab014a49c3057028224148a4e

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    43c8dc5121cdd6e2c2d6560bc54e8c21

    SHA1

    b68a5e9f523b6f113a776a64d7268b23fd67f792

    SHA256

    112baeda48ee54140d245348ba7f1c0f3a147696795dcd59e6087f77f626680f

    SHA512

    88d9de35078fc75b8eff289e71ac179ad3e6cf60a2121258bcf959d4080ea6c58bcbf22f4e3925819944c993535312dc87d2d70e2b2009286f4f64e2ead43431

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    d0eedf0c3b23102c7c3d07e4f75569d3

    SHA1

    5946273b6092cba1fc5496965303fba00470fd11

    SHA256

    ecab1706fb3df2b6cd11f4e701266bd69b0533e274fd6793af58ebec1cf5def9

    SHA512

    b13387eed7f253ce2fda62e3ae2961df92f3f61d172aa9d9ef917f1430217baeee83a877625243693cd542265128be40a8eff48b9f0042e621e699100d301c43

  • \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    e7b09a499c3e4fad53c3c85b1bfa3c79

    SHA1

    1fb02457ac32dbf2dc21ad0c8a4231f3cc011abe

    SHA256

    58a5173cc77db2ba5aead7544b7ce9a545c0fc6386d7e5247a153d13339a385e

    SHA512

    cccb85844a59eb934cfb7c9fc44f22483b432f5e9ccd310337cd66423e28b3cbcfa55b96844325f3b28ea6396ff95d531b8a0dc72cfd693c65c1f6df2d9c9be7

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    ba17166a06fc84469dbfe8c21074994d

    SHA1

    d6d256c5c3e38146e81ea36bebf5ceadc354259c

    SHA256

    a1f14b055b9ba19c898fd8cb26bc8ac5c8a34810d049a02b2e818184a80e0fcf

    SHA512

    3eb5f0d9df5b108c34a5d32474087900f63a198c464864bc2de5ee0ea4c24be141960b581a02f7499b96dad555c1fad10b1e977bf21c88dfa26405726f2fa849

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    3cdcfb42a04d3bd97444f62363b5d5ff

    SHA1

    e43522cb8425dc86da71eb327ac2378fd7b5037a

    SHA256

    406edf921b731150a64743201160aa3cb5de1811182fb233c5bdea6a26bb0a66

    SHA512

    059027a25ba13b8690d51f439f8afae3d05bb1f24f222dd48d0a6fb40f64a43baab34d19157212b187e4ecd524635641dcaedc992da4af96e5dab36f4cd1816f

  • memory/784-175-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1208-184-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1744-139-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1744-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1744-155-0x0000000000510000-0x000000000053E000-memory.dmp

    Filesize

    184KB

  • memory/1744-168-0x0000000000510000-0x000000000053E000-memory.dmp

    Filesize

    184KB

  • memory/1744-121-0x0000000000510000-0x000000000053E000-memory.dmp

    Filesize

    184KB

  • memory/1744-106-0x0000000000510000-0x000000000053E000-memory.dmp

    Filesize

    184KB

  • memory/1744-185-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1872-125-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2344-115-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2436-136-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2856-150-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2884-161-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2884-159-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB