Analysis

  • max time kernel
    93s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 23:22

General

  • Target

    1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe

  • Size

    45KB

  • MD5

    fc04ee8fd24f7b363731651f601b4cf0

  • SHA1

    54b37e1124d1a95b3786fb63acbee106b210d3ad

  • SHA256

    1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0db

  • SHA512

    93a38c2b3b5e8fc23cc4d77131da7ee06d6d1ea4eefb5c07cf9604d71a16044a1f3e4fc1b702c9cdbd91d92be57baa6d08ab1d6da42f885649e62eafe654e26f

  • SSDEEP

    768:xmFQj8rM9whcqet8Wfxd9Mmnfa+TAOBJgZiPGyilSniJO14ktp7DFK+5nE/:zAwEmBZ04faWmtN4nic+6G/

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe
    "C:\Users\Admin\AppData\Local\Temp\1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2044
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4484
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2160
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3544
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1720
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3688
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3284
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    45KB

    MD5

    69bd1181af6348317548d5717a12f4c1

    SHA1

    6c672d4cb220e745168244a08467cefea37729da

    SHA256

    218b2de5826ac9b7a12fcca3a537d9cc8ac0209211ac2b959671a098d438e434

    SHA512

    8f29ced49c9dedb172a14655db6f198e0dd2bee5ef4709733835763301b338c780fddd7dd2e691213191c5332a160de7ee7b4f898f0a74fc30040c31a2822cbc

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    45KB

    MD5

    a0e608ca39b5720553076c155807f36a

    SHA1

    4c3996d21dc5190ffea9fe82a4fb55a646c418f5

    SHA256

    f5d4de7637d217a78b5f12ca25421a800b772fd49a54f8578535bdc7edf3d403

    SHA512

    f65b1ea7b6a09d9a0b1fe9ea082974e8263d76033bf8952d37674873ebd76d665236eac454f3e5b77b1454fec6d38f2fc4d95265eed74b47b28619edd796eed4

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    45KB

    MD5

    9075fc2563b60499d84411d3af6346b1

    SHA1

    56d841c9b77980bfc6dd83a9dd95a3a7c49e5720

    SHA256

    704e8a41ce7e8bd7128e07ecdf2d07c1f645a8db82c94e441c09a05d33f5b624

    SHA512

    ce53642b20fdbf7cb48aa4a8e44275ce4eb0823f0c6c4621a49d1c12174fa88f29f6092d95aac87076565a65b39562d60899bcdfda3c7d8bdfaed64405f5712e

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    45KB

    MD5

    e25f3679afd7d25dcabcef92a70ee463

    SHA1

    24411031abccf3b3b3cbea443a4091a66722830f

    SHA256

    3f54527c9a2efc41f44238608e877a11233a6e41ac5c5c0fe9a1ab0c478ed5b1

    SHA512

    79db410dd55597eeda0267c355c875fa9aa32cc2957a0cac548b0cb89738f79be615cf6ffde88b4dc63df18a8a1959577208bedd43cebc44f6c8efdca4855e1f

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    45KB

    MD5

    329357452e6485ec209cbcbebb994d5e

    SHA1

    16944bc4de57ce189823eef2f1079f07fef04163

    SHA256

    5046dc3bfe018426564e34668d5269693591e7e6c86a0d128642207c49b65441

    SHA512

    7b4bed2d60376f70bdf5b669264ac082c812b21148c64dc3fecca601454450f934ce554ff5a4542f2abdf5b34afce75d6920e3706ee125c28631f3512a700e7b

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    45KB

    MD5

    fc04ee8fd24f7b363731651f601b4cf0

    SHA1

    54b37e1124d1a95b3786fb63acbee106b210d3ad

    SHA256

    1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0db

    SHA512

    93a38c2b3b5e8fc23cc4d77131da7ee06d6d1ea4eefb5c07cf9604d71a16044a1f3e4fc1b702c9cdbd91d92be57baa6d08ab1d6da42f885649e62eafe654e26f

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    45KB

    MD5

    928fefc71399bc622fc33d0835e08497

    SHA1

    b021aae341267f687bc00df844e4d4fa0cfb15bb

    SHA256

    5f4b5b68fba453379a565e1723b92d333b8fa68de1755d5b709b48c82f3b73b0

    SHA512

    f935f8fe506ea6360e9ec2f1a5aaff2a358217e8fd3a3c73b03807838f3d931e79b9756a6c03fd199178bd222233d0cb7b98bc5136b8893a530910e1edb33e29

  • C:\Windows\xk.exe

    Filesize

    45KB

    MD5

    b7a48b0409434c9d4e3b2a982db5dd37

    SHA1

    b47f6de7dc163a2c7c8c33599a6a43b4df1d2c30

    SHA256

    e923d1611c4d1548f6710bbf4fbed4ec44ab0f4f0a110237b63416a978a122c7

    SHA512

    550266ff1aa47fc6a0a92007366ce0a1b7f766265f38db24f4fd9a184cb0dca50a1797d1d82b4413544afe4437c238c9a8757e532734f1e91aa878344fcbf528

  • memory/1720-131-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2044-152-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2044-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2160-117-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3284-144-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3544-124-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3688-137-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4484-111-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4828-151-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB