Resubmissions

21/09/2024, 01:26

240921-btxelayfjj 7

20/09/2024, 22:44

240920-2pam5ssflq 3

Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 01:26

General

  • Target

    The Injector lol made with c# ReIn2ct1.zip

  • Size

    14.1MB

  • MD5

    d0785a1784a9904f6a716618f4e8f878

  • SHA1

    df211857a3a310d1762b27b36c78af905636f2a5

  • SHA256

    213720c1d351d7ba4796a645e08b086fa309423e519d57dd15ad570f3301661a

  • SHA512

    2a50dc542ec9f8bc7006cec3072aa71d643e95afd8eb9b74bb3906571b4d32030d42530ccab17f47c4d115bce78948168f63fb54e2996ecb6b3ae13e29cc3143

  • SSDEEP

    393216:6rj5GryEtqLlVh4Jl8G/10GDO40KVQlifi9AfU/jp8bGhsvQJ:6rnVai8Gw6Kfgj8ssvQJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1.zip"
    1⤵
      PID:5016
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4868
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4732
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\" -ad -an -ai#7zMap28063:156:7zEvent5173
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2728
      • C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe
        "C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3916
      • C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe
        "C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:228
      • C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe
        "C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:5040
      • C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe
        "C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe" "C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\mm.dll"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2824
      • C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe
        "C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe" "C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2cs.dll"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1324
      • C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe
        "C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe" "C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\MainMode.dll"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4732
      • C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe
        "C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe" "C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\License"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4356

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ReIn2ct.exe.log

        Filesize

        847B

        MD5

        66a0a4aa01208ed3d53a5e131a8d030a

        SHA1

        ef5312ba2b46b51a4d04b574ca1789ac4ff4a6b1

        SHA256

        f0ab05c32d6af3c2b559dbce4dec025ce3e730655a2430ade520e89a557cace8

        SHA512

        626f0dcf0c6bcdc0fef25dc7da058003cf929fd9a39a9f447b79fb139a417532a46f8bca1ff2dbde09abfcd70f5fb4f8d059b1fe91977c377df2f5f751c84c5c

      • C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\License

        Filesize

        11B

        MD5

        d7959e8a48299a9276354ac9a706337d

        SHA1

        d1b43037b68e5c47464093d5e2d952e8c444f788

        SHA256

        d6056789b0061df4004f60e2e8a53fc8b2f6161fac4e289dcc43e0de812869a5

        SHA512

        08d324f58addff557f84117867ebadf2c36bb5072c4f1a374642a066dc1d70967163e2f6217204d93680fe34c515d674246f7d81e77977dc114a6ec7f8d00fad

      • C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2cs.dll

        Filesize

        5KB

        MD5

        da1c2daeab3db85f72fa3f0b950efba7

        SHA1

        cc231b3db93a65ec260fce0fc170d85d31df9fb8

        SHA256

        b124f8228761c5a0e8d512d222e98a333d9312f0575da1fc05ac8ac4c084510e

        SHA512

        3eee5416e6dc9cf7117f5c1bb06da309fc84d10c59a6e6504d121c64b8bc16c6ceb7be4bf9adecdb11af1033d49fa47b18e0cacf65ded65142ef1a64cf60aa23

      • C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1\ReIn2ct1\ReIn2ct.exe

        Filesize

        129KB

        MD5

        d84aaca1a705738bb6793fadf35487f5

        SHA1

        2fec4ba481036efbbdf5eeaeab27eeef689e795f

        SHA256

        5264694a8c8dc7f2366f89c8b29fd7bd876fb7761dd81dffb8d640ec1fed599f

        SHA512

        599c3bb7a635814b8cb2647360abe942cbf83e25a25c129c229ac836481eb49ba1185fbe3e0ae3f1282e97ccc593aa79a93c08e299c189d9062594b7c3c757ff

      • memory/3916-98-0x000002B271730000-0x000002B271738000-memory.dmp

        Filesize

        32KB

      • memory/4868-10-0x000001DCBA5D0000-0x000001DCBA5D1000-memory.dmp

        Filesize

        4KB

      • memory/4868-2-0x000001DCBA5D0000-0x000001DCBA5D1000-memory.dmp

        Filesize

        4KB

      • memory/4868-9-0x000001DCBA5D0000-0x000001DCBA5D1000-memory.dmp

        Filesize

        4KB

      • memory/4868-8-0x000001DCBA5D0000-0x000001DCBA5D1000-memory.dmp

        Filesize

        4KB

      • memory/4868-6-0x000001DCBA5D0000-0x000001DCBA5D1000-memory.dmp

        Filesize

        4KB

      • memory/4868-11-0x000001DCBA5D0000-0x000001DCBA5D1000-memory.dmp

        Filesize

        4KB

      • memory/4868-12-0x000001DCBA5D0000-0x000001DCBA5D1000-memory.dmp

        Filesize

        4KB

      • memory/4868-7-0x000001DCBA5D0000-0x000001DCBA5D1000-memory.dmp

        Filesize

        4KB

      • memory/4868-0-0x000001DCBA5D0000-0x000001DCBA5D1000-memory.dmp

        Filesize

        4KB

      • memory/4868-1-0x000001DCBA5D0000-0x000001DCBA5D1000-memory.dmp

        Filesize

        4KB