Resubmissions

20/09/2024, 22:38

240920-2kmrxasdnn 6

Analysis

  • max time kernel
    57s
  • max time network
    60s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/09/2024, 22:38

Errors

Reason
Machine shutdown

General

  • Target

    misakaX-2.2-windows-edition.zip

  • Size

    77.2MB

  • MD5

    48bccb38ff7ca015961b34068ac81305

  • SHA1

    87a575196dc5a5aedd8b0dcc47e6768dd4859f38

  • SHA256

    35ce50d16718caf747a38faa9643b57aadf62c0d5dbd69cab304c378b4cc7291

  • SHA512

    2ba7aff6e0b08142ea61bdf23e44a55afbbdf58364949c6150aa1a4c0dc4c990795b75357d4268da29f31f96217bb4608e153ce7d72c9820e817dc99f785f5b6

  • SSDEEP

    1572864:Dw53Pspd69t7jXv7lqLWp/sxdgwWScIuYoP7yUGAeQj/g+50Lz3vVCC:Dw5fEd69t7jf7lqy0Hg/SsyUd/j/wz3l

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies data under HKEY_USERS 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\misakaX-2.2-windows-edition.zip
    1⤵
      PID:3804
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2496
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Windows\System32\SearchProtocolHost.exe
          "C:\Windows\System32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
          • Modifies data under HKEY_USERS
          PID:256
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 828 2724 2720 812 {0E5DCEC5-7795-4E38-9621-94DFD9F9A421}
          2⤵
            PID:2356
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x4 /state0:0xa3a0f855 /state1:0x41c64e6d
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:1084

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1488-32-0x00000291FD330000-0x00000291FD338000-memory.dmp

          Filesize

          32KB

        • memory/1488-16-0x00000291FCE40000-0x00000291FCE50000-memory.dmp

          Filesize

          64KB

        • memory/1488-0-0x00000291FCD40000-0x00000291FCD50000-memory.dmp

          Filesize

          64KB

        • memory/1488-39-0x00000291FE8F0000-0x00000291FE8F8000-memory.dmp

          Filesize

          32KB

        • memory/1488-40-0x00000291FE8E0000-0x00000291FE8E1000-memory.dmp

          Filesize

          4KB

        • memory/1488-42-0x00000291FD360000-0x00000291FD368000-memory.dmp

          Filesize

          32KB

        • memory/1488-43-0x00000291FD350000-0x00000291FD351000-memory.dmp

          Filesize

          4KB

        • memory/1488-45-0x00000291FD350000-0x00000291FD358000-memory.dmp

          Filesize

          32KB

        • memory/1488-48-0x00000291FD140000-0x00000291FD141000-memory.dmp

          Filesize

          4KB