Analysis

  • max time kernel
    54s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 15:27

Errors

Reason
Machine shutdown

General

  • Target

    TheAltening.exe

  • Size

    120.8MB

  • MD5

    29689fef5edf0357ca6a07dffc7a71ea

  • SHA1

    8855b2d203833744323bd7b0cc7a8894998607d7

  • SHA256

    31c4ab99ebb574c221aa795161b959fed11a0e6908bf64385944873f293c5253

  • SHA512

    6c90ab9c0aecaffd966a722f290e5c9cc83b51b3da54bc247275debeecc8d8a028b2f9e4bcd182b832e1af1057de5c0d38b815f23e1a6716e76025d0a371bdd0

  • SSDEEP

    786432:uQ/HMKcIK3l8vVwEgNRajudstuB+chCkZ9xKX65/wfejMVJu:T/vvKepgmq2tuB+chCE9EQ1

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\TheAltening.exe
    "C:\Users\Admin\AppData\Local\Temp\TheAltening.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3652
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39ac055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4468

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\.net\TheAltening\hOHr51s9Bz0M1wb5lZYsR6q9KnUsh1I=\D3DCompiler_47_cor3.dll

          Filesize

          4.7MB

          MD5

          c4974c924b605bd322c4872d72de90d1

          SHA1

          20df9433eab24d3291696046646f493794b77cba

          SHA256

          71d766b4742ca9f7422bb2efc3dc03f2cee509a5a43d241e748cda7aaac24bf4

          SHA512

          3889648dbb4608ece9c68f1cd5b1601da5b795eade7910764dd4769090cdb209a39acf3986e6e7190745f3bc6b1477a52dfaccb96a7e799eafc0825e2c44a846

        • C:\Users\Admin\AppData\Local\Temp\.net\TheAltening\hOHr51s9Bz0M1wb5lZYsR6q9KnUsh1I=\PresentationNative_cor3.dll

          Filesize

          1.2MB

          MD5

          8e874bb782193fa45d027254e7d03244

          SHA1

          024ccc78d1d23050164e8cfdf141c921f42e0c74

          SHA256

          f75f98fbbb02dad69bcd8c69ec26eb3705dbd95dad996b58308b50e6c9904246

          SHA512

          3f3b0f93e5600c0671688317ee00d7a88411b80b7c4aa383d274af318782a66665409a528d484409bfe598c309ed54480c86a4d4e109dee5265351d5902d0c56

        • C:\Users\Admin\AppData\Local\Temp\.net\TheAltening\hOHr51s9Bz0M1wb5lZYsR6q9KnUsh1I=\clrjit.dll

          Filesize

          1.2MB

          MD5

          b2eb7b51bd58201cf498e83846e90110

          SHA1

          ca439759b5c5162e626d2b84ab55b93adc552e06

          SHA256

          180557694842854789457a872df849b2130098a9c2bfd70d201f77bec6f9fddb

          SHA512

          1a92064b3417b287246fadd88fea9138dfcc659283e063aab9305e424feac0d1b2c216be5f65ce7a95f0322ab3849478892ae407399aa6029a504c4c8a5884da

        • C:\Users\Admin\AppData\Local\Temp\.net\TheAltening\hOHr51s9Bz0M1wb5lZYsR6q9KnUsh1I=\coreclr.dll

          Filesize

          5.0MB

          MD5

          1c434dc8cb09095640c776385ba69691

          SHA1

          97fe8e25bebfb7d790768175a4625d07f3d4abfd

          SHA256

          3b3558c408c57be332c9595624f6d49413fe0dd43d3d5fa4626041851f77216a

          SHA512

          4bdb7c0e8571422927fbc8eec6d05959915748acce035fef336b32381922a0a54f029f959fb66cb96a89a024c11e2b94ee6948f618dd04d9ae87cc83f3f83ec8

        • C:\Users\Admin\AppData\Local\Temp\.net\TheAltening\hOHr51s9Bz0M1wb5lZYsR6q9KnUsh1I=\vcruntime140_cor3.dll

          Filesize

          95KB

          MD5

          f34eb034aa4a9735218686590cba2e8b

          SHA1

          2bc20acdcb201676b77a66fa7ec6b53fa2644713

          SHA256

          9d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1

          SHA512

          d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af

        • C:\Users\Admin\AppData\Local\Temp\.net\TheAltening\hOHr51s9Bz0M1wb5lZYsR6q9KnUsh1I=\wpfgfx_cor3.dll

          Filesize

          1.9MB

          MD5

          0c0be30d77de3f65e1c990b7d99143da

          SHA1

          fd9a4e456f56308d5bed48e7049de64e88a73833

          SHA256

          12a8b75ceecb6c5ce8ce81ad064aaf2bcb09d6338e5e03a7eddc57acd58e2a7d

          SHA512

          9a2a6acad9b21c3f093d4d72289f32ca6ebaee304c9a9e3ec9319558919452c3b2f23ea5e72c06c9af7a2a1ded0ce266e45f4fb9113d2bb3897320fcbdf7ebad

        • C:\Users\Admin\AppData\Local\Temp\TmpAFC8.tmp

          Filesize

          1KB

          MD5

          2f3de4f6d50debc5f7a35f6a0fb3ad88

          SHA1

          d0f2dcc536294e9cf364f1a2c08c9ecb2bcae02e

          SHA256

          cfc50ccc669a9ad9d4ec5980565235b71f8004c3659910ef1f82ae0119762882

          SHA512

          91bc8a527f858f77e39fa6adc220d719a223f55687f3ccdda0ced5f2298774e70fcb3a49cad20f158886399d4cd8e4cf247ae79df79fbc83c7142fb843c2c88e

        • C:\Users\Admin\AppData\Local\Temp\TmpBFC7.tmp

          Filesize

          1KB

          MD5

          d40a41a8d204d9353d85d7e926f9d25d

          SHA1

          698610c43c7e58218ac700d571a110ad152e5a6f

          SHA256

          ec0f6b35bbdfff51c56d44cc2524ab9126387fdefd6727a8974f313b9a3c2b04

          SHA512

          ce479718eb8fc93db3bca66e9d559b25d74dae9cfe26a8d106a891ee2a1b3c9f098ac7498713791dec4d62e955f3d7de291ef9d09fe3e50b1caf30bcd8a04f4f

        • memory/3652-68-0x0000020800930000-0x00000208009A1000-memory.dmp

          Filesize

          452KB

        • memory/3652-15-0x00007FFF9E4CA000-0x00007FFF9E4CB000-memory.dmp

          Filesize

          4KB

        • memory/3652-40-0x000002085CDE0000-0x000002085CDE4000-memory.dmp

          Filesize

          16KB

        • memory/3652-38-0x000002085CDB0000-0x000002085CDB4000-memory.dmp

          Filesize

          16KB

        • memory/3652-35-0x0000000180050000-0x00000001800CA000-memory.dmp

          Filesize

          488KB

        • memory/3652-21-0x0000000180110000-0x0000000180329000-memory.dmp

          Filesize

          2.1MB

        • memory/3652-45-0x00000644A00E0000-0x00000644A01CD000-memory.dmp

          Filesize

          948KB

        • memory/3652-48-0x00000644A0020000-0x00000644A0032000-memory.dmp

          Filesize

          72KB

        • memory/3652-54-0x00000644A0040000-0x00000644A005D000-memory.dmp

          Filesize

          116KB

        • memory/3652-51-0x000002087FED0000-0x000002087FF14000-memory.dmp

          Filesize

          272KB

        • memory/3652-24-0x000002085B5A0000-0x000002085B5AA000-memory.dmp

          Filesize

          40KB

        • memory/3652-26-0x000002087D720000-0x000002087D87B000-memory.dmp

          Filesize

          1.4MB

        • memory/3652-62-0x00000208006C0000-0x0000020800822000-memory.dmp

          Filesize

          1.4MB

        • memory/3652-65-0x0000020800590000-0x00000208005C2000-memory.dmp

          Filesize

          200KB

        • memory/3652-32-0x0000000080360000-0x0000000080BA1000-memory.dmp

          Filesize

          8.3MB

        • memory/3652-74-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

          Filesize

          5.1MB

        • memory/3652-29-0x00000644A0060000-0x00000644A00A5000-memory.dmp

          Filesize

          276KB

        • memory/3652-75-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

          Filesize

          5.1MB

        • memory/3652-18-0x00000001805C0000-0x0000000181517000-memory.dmp

          Filesize

          15.3MB

        • memory/3652-71-0x0000000180010000-0x000000018001D000-memory.dmp

          Filesize

          52KB

        • memory/3652-92-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

          Filesize

          5.1MB

        • memory/3652-93-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

          Filesize

          5.1MB

        • memory/3652-94-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

          Filesize

          5.1MB

        • memory/3652-96-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

          Filesize

          5.1MB

        • memory/3652-104-0x0000020803F30000-0x0000020803F36000-memory.dmp

          Filesize

          24KB

        • memory/3652-100-0x00000644A0C80000-0x00000644A18E6000-memory.dmp

          Filesize

          12.4MB

        • memory/3652-101-0x0000020808EA0000-0x0000020808F52000-memory.dmp

          Filesize

          712KB

        • memory/3652-12-0x000006448A000000-0x000006448A8F5000-memory.dmp

          Filesize

          9.0MB

        • memory/3652-109-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

          Filesize

          5.1MB