Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 19:28

General

  • Target

    3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe

  • Size

    45KB

  • MD5

    b5ef5fa18f36ee17c985575be18947cc

  • SHA1

    1cb811d91db637d80e27b7364437b48797dc59e7

  • SHA256

    3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c

  • SHA512

    0ebfec1e8b477b09bcf66bd45f701369f962e89aea9b399df0fb98e15c7fceb609deb50b01195fde7f1c0eb80dc9911ffa5c4b50bb303be0e04d45e10a36f452

  • SSDEEP

    768:/mFQj8rM9whcqet8Wfb4JzRJwEIHU5U3rf12WmULgJs7DFK+5nEn:1AwEmBT4JzRJwEeUW7f12xULgJzn

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe
    "C:\Users\Admin\AppData\Local\Temp\3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2160
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3484
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1812
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4960
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2112
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1768
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:5040
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    45KB

    MD5

    d91c8e8d2e6a377ae4e168f1caf0759b

    SHA1

    74eb8223006d93260197ed2c550f6a6e9da20c0a

    SHA256

    b135ea2537274ae7af3555292a6acbcc3baed8747b1a077a7f8daadce365b715

    SHA512

    52800671d599fdd415782d0cb74e5945b9fb7ef8817da82e45518a00096e4ae41f359733c36d7f541d1cd56c81de9cd1388bb4a7b053a93add545324655b9bb4

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    45KB

    MD5

    31154212d43d31224e01f40376ce89b9

    SHA1

    4835e027b30dca89c072b5019ad987a79379efe8

    SHA256

    cca3aec1a17ff4741c0da92406dc0173a6e319972e4a52153ff26ea040d90aee

    SHA512

    5c9127f23bbd399584ee101fc4a1901340dcac32c6755118a1650fb189ba2a51b4a7870186179ca0a97c19b573a92edf0e014c4260c5219b56368a11bdc669de

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    45KB

    MD5

    d81d470767f687545ee641c8585a39bc

    SHA1

    624f559a86fceab3a912d13f2e6dec186c4f92c4

    SHA256

    8883847596ec2a7294769ca6422da3a88f14eddcd7de20c0e98dbbd04aeef831

    SHA512

    5ad5202d29f15872694c754058f1a618069b9ec0846f1fef69d27d6616760365f0336909b66159ca30739f6722d8ed07dc1c166905fdb5ed43b263c8d3df9985

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    45KB

    MD5

    eacb2b0c0886aedeba9c398dd348c03c

    SHA1

    35b6c8f45f09c5b54a84dbd76dddbe9146d360c1

    SHA256

    653612308134678067e8c48c0ed69a4b4a11d2293f0e63fd468632568414aac6

    SHA512

    c7571e2feead73c6f7a4dd055d1e74d066a9cc637778345a6c373fc2d2eceacbe6ca270a87a7a06f28073d0a1afdd33efdcf43133829b77a7de281672f7970de

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    45KB

    MD5

    bf6ca5260e8c8838c7f7151dd0701af2

    SHA1

    9a2b743e6d39c041123209c04dee8cf3ddb876b2

    SHA256

    71d4752061d75421fd66dff9b679c442882ef785fb96dc70015e2e43e4c79105

    SHA512

    ede7a73aaebe8fd92063df898afa60bae9dfe956332b0cdf0778feebdffc623fd1eb810f659e109c5c2afc803fb3d9d954d4c35b60321f5e9db7e45fa31d6600

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    45KB

    MD5

    b5ef5fa18f36ee17c985575be18947cc

    SHA1

    1cb811d91db637d80e27b7364437b48797dc59e7

    SHA256

    3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c

    SHA512

    0ebfec1e8b477b09bcf66bd45f701369f962e89aea9b399df0fb98e15c7fceb609deb50b01195fde7f1c0eb80dc9911ffa5c4b50bb303be0e04d45e10a36f452

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    45KB

    MD5

    aa92f875c753071f0ccb5445a06312e7

    SHA1

    7e8f733f987ce255f9d0c706ae44c879aa648b6d

    SHA256

    652416c0d4b6493f48f8e79f14c3d5b33d222791f19909a02816e25992691cd1

    SHA512

    395c5eac169698f12c0266979f9d3ec8636d8ccef97dcde89558ea23243298d74ce14f425264e7d904e3fd2631c9bd13f309d0337bd8fb122af8b561b982dca0

  • C:\Windows\xk.exe

    Filesize

    45KB

    MD5

    118b0610671081ab036149e8cc89e94c

    SHA1

    d7e1e6c1e53c84dbcff84f4d8939bf92b5994ebe

    SHA256

    06da3c372184ae411294e9d1dac3ba2dc4085994b70502ffef153844e1c4bfb0

    SHA512

    73613f2be27af922db44eebae71ca9f05975fc65c392e55e968ab7de33a9fa4638c809780fa6d4b61f2d1c6592a2824e692c7559f831e526e525cc55ac3a3676

  • memory/1768-137-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1812-117-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2112-132-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2160-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2160-152-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3484-113-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4776-151-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4960-124-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4960-122-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/5040-144-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB