Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:24

General

  • Target

    f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe

  • Size

    91KB

  • MD5

    af90cf445fd9666a30271f431e4934c0

  • SHA1

    1be90f45f3fb6a0b10ad23a51f0e6552791475d1

  • SHA256

    f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40

  • SHA512

    a713ea79d38bf0050a74e4076ff8478e926c4203616c9ef9ff6eab2ece795177d0df1e45bcd1e02fb81a5798baf341b81204ab9f25bb5db87f8dc2d9160cf9bc

  • SSDEEP

    1536:FAwEmBGz1lNNqDaG0PoxhlzmUAwEmBGz1lNNqDaG0Poxhlzm3:FGmUXNQDaG0A8UGmUXNQDaG0A83

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe
    "C:\Users\Admin\AppData\Local\Temp\f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3940
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4156
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4180
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3608
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2396
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4620
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1776
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    945aeb686de446b6fa12268c4d2a2d65

    SHA1

    0fdb64d481f8f6c1253ad5a9a15a6872d99e9d7e

    SHA256

    adea3f8b4005eb2f1226394499c4cfeb8fef2b77495740187e9a4e19228feba8

    SHA512

    c79aa1e01d852b1efe02b6afa0a4e5ae644d437ac30dba65b3f141672a29053c7333ef41572ad847e1881d8ce196e0f733c2d8ab57c5c22d0e5beb8bce7f6382

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    bdfda761b25b1d338e36d4b5512d17ae

    SHA1

    6568aaace434f8644a0f42e784dce35b9642e808

    SHA256

    5ca1d763a3b0edacd42dcc76ef2f21d479b1fc91d88a9faebc39e45b3b6f5b3a

    SHA512

    9f85335bbdff5cf4fe996559b6e9c5e8a55bf884754139342ec68a5e7cb8481299e309e2dc964276e0a1063a751bd9ff09f0ec49f7cdd2985a4952750ba1dba7

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    a4ed292a111c81d309c3ed1cb18de870

    SHA1

    13cb321f0092807a3efa1a687c019b5b953b5d87

    SHA256

    9e238b9f2f6a76a127bf33e4e6323b99c806c54e7f5425fe10d2f3545ab8989c

    SHA512

    5cbfe18fd24f57e61cb0bd5c3ab23a9a34d779984784c5e638681fb36fa5cecc6df8b74462a9c2192ae15ecef0da5d1216ce8cabea4af24140e8f80535541d2c

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    f430b459ff726536b1bb0cc55ebe7e25

    SHA1

    3dd28d8bfec7132f91353ac10f43d166818e73e5

    SHA256

    b9db7a39d92d666b4e30f4a6e3a59b52ec6b87c1ef9bd45d343024d275b93fcb

    SHA512

    0139324f53346699ea7d087a14a98cd7353563c3f40c7250c22b16d65f919323854c30143fd92a946f8d2bc793069c29c57fe4f3e966293d358b4b515da78d84

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    29e911fe09744d1abfa72b743be6bc01

    SHA1

    3c226f8f3d4cfc94f8e3efaf1f855f57f8bb74be

    SHA256

    1c7daf793a1e12b47b7b42e4b3e88765824eb39119495cbf0e8a410bc5d268d8

    SHA512

    32cd8c9725f5ba58e10efc055d0331f9b59894289dd3dd5a113dddfdc9cdf8e6083bb2241dcd8cdbf086a0b6a1a5ed58e75cbe4949aa26e0dce0e468d004d4c3

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    af90cf445fd9666a30271f431e4934c0

    SHA1

    1be90f45f3fb6a0b10ad23a51f0e6552791475d1

    SHA256

    f29d1821bc0049850121f7106184415474d719adea5d6ec0b3301212fcb05f40

    SHA512

    a713ea79d38bf0050a74e4076ff8478e926c4203616c9ef9ff6eab2ece795177d0df1e45bcd1e02fb81a5798baf341b81204ab9f25bb5db87f8dc2d9160cf9bc

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    fed2f19935d7fd1f7bb82aa792a4a127

    SHA1

    0fde36f072eae4eaa5aaa056eb29d1a55ef222f6

    SHA256

    4ca4b190fe8126c68ff83b014b1b155c85c463c46cd3ab97bd46568b58947306

    SHA512

    48f031a2f9852e06968a741d3857442668dfbc1c09e71c45f26defba29d304f2b82eb5ff743b51bc362641eb2efda0712ab8bfd176b4e5ae1cf3b7da81785bd0

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    0b9a47b56b3522f5641754b5e8abbf33

    SHA1

    f282400784f077f692e52bd8813521a29ed7cedf

    SHA256

    a587d23ad0773368d2f1a8310910ac2185abbe059a5e99f750e9bb4b4e0b957e

    SHA512

    5e6d6b8eaacecb025690a454772a333aa9c778ece259710f4fa95946e50a7e944e1d93bb7f6b1a1e93abe26fc009145aaead58cd58b923b9d035b1cb9ad7e4bd

  • memory/1776-144-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2396-131-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3608-125-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3940-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3940-152-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4108-151-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4156-112-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4180-119-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4620-137-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB