Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
gdifuncs.exe
Resource
win10v2004-20240910-en
General
-
Target
gdifuncs.exe
-
Size
5.5MB
-
MD5
595dc45fb94484094c8a27639f9f5738
-
SHA1
87e683d77617e670ddadc8bd9d2578044a2cfe0b
-
SHA256
9c23ff455d1025036ee79d4db881f41910d7db4be5aa00464096cd10a21edd05
-
SHA512
fb3bc6501b386ba33c5078d3987f9f5bb597db3a326952e3b9de8a8a67b9dd5e0cd6e7d6b7a608eddcf0fc8b6bb1822ba333ae437e5591836548a0477d29326a
-
SSDEEP
98304:HQz+04D+i4DBz2NHlruSSDllNmd+5z/Le7q2//Le7q2:HQS04D+i4DZmLclKez/Lkq4/Lkq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, wscript.exe \"C:\\windows\\winbase_base_procid_none\\secureloc0x65\\WinRapistI386.vbs\"" gdifuncs.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gdifuncs.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gdifuncs.exe -
Disables Task Manager via registry modification
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdifuncs.exe -
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\Cursors\Arrow = "C:\\Windows\\winbase_base_procid_none\\secureloc0x65\\rcur.cur" gdifuncs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\Cursors\AppStarting = "C:\\Windows\\winbase_base_procid_none\\secureloc0x65\\rcur.cur" gdifuncs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\Cursors\Hand = "C:\\Windows\\winbase_base_procid_none\\secureloc0x65\\rcur.cur" gdifuncs.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe 4368 gdifuncs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4368 gdifuncs.exe Token: SeDebugPrivilege 4368 gdifuncs.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gdifuncs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\gdifuncs.exe"C:\Users\Admin\AppData\Local\Temp\gdifuncs.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4368
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1