Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
gdifuncs.exe
Resource
win10v2004-20240802-en
General
-
Target
gdifuncs.exe
-
Size
5.5MB
-
MD5
f3811d1e35cea25136e52908349f2ba3
-
SHA1
c8060ef0a74de26fc17d61f4aa922856a13f902c
-
SHA256
3a11b4588634a176f193d65fae91c419cd4f530a5181e60e56bcfd29a33f9cb2
-
SHA512
c51f424f1e367c00fbdae9b49f0446c89ab58f6acadab847ab788fd4a91de89886451a8ea3d7818d22c80c1c99062826b221d5ff74bee1e9e8f25fdb3b7eeb22
-
SSDEEP
98304:VQz+04D+i4DBz2NHlruSSDllNmd+5z/Le7q2//Le7q2:VQS04D+i4DZmLclKez/Lkq4/Lkq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, wscript.exe \"C:\\windows\\winbase_base_procid_none\\secureloc0x65\\WinRapistI386.vbs\"" gdifuncs.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gdifuncs.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gdifuncs.exe -
Disables Task Manager via registry modification
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdifuncs.exe -
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Cursors\Arrow = "C:\\Windows\\winbase_base_procid_none\\secureloc0x65\\rcur.cur" gdifuncs.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Cursors\AppStarting = "C:\\Windows\\winbase_base_procid_none\\secureloc0x65\\rcur.cur" gdifuncs.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\Cursors\Hand = "C:\\Windows\\winbase_base_procid_none\\secureloc0x65\\rcur.cur" gdifuncs.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe 3840 gdifuncs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3840 gdifuncs.exe Token: SeDebugPrivilege 3840 gdifuncs.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gdifuncs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\gdifuncs.exe"C:\Users\Admin\AppData\Local\Temp\gdifuncs.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3840
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1