Analysis

  • max time kernel
    114s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 21:16

General

  • Target

    43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe

  • Size

    45KB

  • MD5

    097b86281d6791d219db3e87794fb060

  • SHA1

    1a6cc5a02809ed2d5e58b61a4f8ba5607e9a42c1

  • SHA256

    43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7b

  • SHA512

    9cf82bd2c88d26f38ffb29976ed4a70f59d6ede7c053aab3260f16f5b5bdcc3b2f2549e9409133b13d8f12b58bd2a5a4af34277f2d2bf84024cc13ba0e92828a

  • SSDEEP

    768:/mFQj8rM9whcqet8Wfb4JzRJwEIHU5U3rf12WmULgJs7DFK+5nECb:1AwEmBT4JzRJwEeUW7f12xULgJzCb

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe
    "C:\Users\Admin\AppData\Local\Temp\43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1556
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3472
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4692
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3668
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:5004
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3992
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2452
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4328
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4288,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=3780 /prefetch:8
    1⤵
      PID:3440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

      Filesize

      45KB

      MD5

      8fe7fe051aed3808cd164aef3696c4e5

      SHA1

      2a287934783495c38bc30be90a49cd56e9739eae

      SHA256

      0a66b40d8bd68cdecea558ddd05e5d5404b90c1fb6a18e9bbe246c5069b0f908

      SHA512

      6d9efd7f115d72a1a417dba62d8858a28bb9e6d7d0b501a034ce2abd83e3fdb15e1bcc834a16f39d66adbb465ea0082e31cf0900480eda6ad4b7897f4cc88ea1

    • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

      Filesize

      45KB

      MD5

      7d9223600478a36ec837b45328dd8488

      SHA1

      6e372b0d93ba44891a0b9e57ec796a4fdb26357e

      SHA256

      7c7f53ad94ebe31b6c881d95ccfe47bee48208414dbc01407a587b3d3ae96871

      SHA512

      276f9c4dd6b924324e5c6e8b4a7858bc8a169cd6377da8f590f437628ce616e6f72077a8ff51fb724d5543b4bef2e02c8f03090ccc52ac75b7b470540cbda29b

    • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

      Filesize

      45KB

      MD5

      5b7ee0db84fb70c76c0f4893ec5aeafd

      SHA1

      a5aeba4607f8394fa3a2054e1dec6c1db7dfd5c5

      SHA256

      89d3460cc64b14441096db197ee0d6b86fe8a7875309efdd7e429d929bb2f237

      SHA512

      256e165e5d2cc02a1ce46f8ec69cf9e1af7c21253c735f5ba44261696b4673fb0fd217c2565b42a0cd2cdebad91aad0e49f6b0b79effccac35360337783399b7

    • C:\Users\Admin\AppData\Local\winlogon.exe

      Filesize

      45KB

      MD5

      097b86281d6791d219db3e87794fb060

      SHA1

      1a6cc5a02809ed2d5e58b61a4f8ba5607e9a42c1

      SHA256

      43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7b

      SHA512

      9cf82bd2c88d26f38ffb29976ed4a70f59d6ede7c053aab3260f16f5b5bdcc3b2f2549e9409133b13d8f12b58bd2a5a4af34277f2d2bf84024cc13ba0e92828a

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE

      Filesize

      45KB

      MD5

      9afef5fdb7e28852e3d34c069484dfd2

      SHA1

      a34245577729ba48417484049c28b0c7bdd3d937

      SHA256

      b7d159bf381f97526870f43fd7dc6ee3a78de0ae6e22ece875894ce5fcd06531

      SHA512

      1fad1d5cef33d6655798f8a556b695a18faecfe40a574a86934df0cc434c0069289d715fd12fa193f47c22a5ca63f62163c41faf500887034f2e2a058801bec7

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE

      Filesize

      45KB

      MD5

      8718c01f79a541d883422db9972bf0ff

      SHA1

      e9d404f0590e483c5f519db49072327b3b306901

      SHA256

      fc53b0b0dba7f88e9fe34e05abed8336097ed37eca2918aeb5eddd4ac4121516

      SHA512

      7d7bc4d376fa217112e78bd42dd919d1de84d1b4e59cc14d839795b5ad08ddd7f1c550f686298323bdb03d682001326f33282db704b957095df695037e6ab0f2

    • C:\Windows\SysWOW64\IExplorer.exe

      Filesize

      45KB

      MD5

      e3ee2c03fa838aedd22b67b9e799c10b

      SHA1

      33a954fcef4c056424e5b9e0e2ebcd20f91be0e4

      SHA256

      a608d8edb7d012636fc4b112091f7884f57efbef5451420e69b1ab3be9d575cd

      SHA512

      e617734d39a0d081627e12f90cf5946179c6a88661b3cf1a539d97559ade9c4b787a9b2fb28c061f664473beb5e556e330af70ad6151d4e4763c4973ff910fab

    • C:\Windows\xk.exe

      Filesize

      45KB

      MD5

      190ea9a65b7fe6f76626f726d1dc243f

      SHA1

      b10ac7e48e7653ad342e5a37034b3d7da48a1d6f

      SHA256

      e2f5eade992a30ca10ff7c685f20ad33b059468964d61f4b8a476173beb6bd0a

      SHA512

      3c727d1e7b4474f7c76f53240bea9d8290d09a20539f2bde02245abedf9952f537712f6b2cc41c0025610d0b64e844c1aa1f6370ab20b801833068622bec4ca5

    • memory/1556-0-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1556-154-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2452-145-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3472-113-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3668-125-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3992-138-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4328-149-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4328-153-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4692-120-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/5004-131-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB