Analysis
-
max time kernel
39s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 22:35
Static task
static1
Behavioral task
behavioral1
Sample
02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe
-
Size
234KB
-
MD5
52388efef65151557e386d2829247b20
-
SHA1
3258e556cd6e3b6a7941dbe3494c060b63448557
-
SHA256
02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6
-
SHA512
dc829f5cdc3a8bf618aade862a3920bfc2e88146dd3d85d76e5cf4d36331ac43c6fc7944bd17178fc48fc97c013f9d1eb46c4e9a375c3b2f0708341e9cf4ee6f
-
SSDEEP
384:PJG14lR/NpKAN+UJfo8vJh/7neuwyv3ZUKcreuDreuwyv3ZUKcreuDj:RFtFe8vJtDeunUreufeunUreuP
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Winsys = "C:\\Windows\\system32\\winsock.exe /wininit" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win32 = "C:\\Windows\\system32\\winkernel32.exe /system" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Modifies WinLogon 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Micromerde Windobe Xnaze" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Vous utilisez Super Winmerde" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LogonPrompt = "Entre ton passss !" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Welcome = "Salut pti blairo !" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\winsock.exe 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe File opened for modification C:\Windows\SysWOW64\winsock.exe attrib.exe File created C:\Windows\SysWOW64\winkernel32.exe 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe File opened for modification C:\Windows\SysWOW64\winkernel32.exe attrib.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 2 IoCs
pid Process 1968 cmd.exe 1788 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Internet Explorer\Main 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "Vive Les Marmottes qui chantent !" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.webfmdr.com/B/" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "64" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2268 shutdown.exe Token: SeRemoteShutdownPrivilege 2268 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 228 LogonUI.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3728 wrote to memory of 1968 3728 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 83 PID 3728 wrote to memory of 1968 3728 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 83 PID 3728 wrote to memory of 1968 3728 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 83 PID 1968 wrote to memory of 2944 1968 cmd.exe 86 PID 1968 wrote to memory of 2944 1968 cmd.exe 86 PID 1968 wrote to memory of 2944 1968 cmd.exe 86 PID 3728 wrote to memory of 1788 3728 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 87 PID 3728 wrote to memory of 1788 3728 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 87 PID 3728 wrote to memory of 1788 3728 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 87 PID 1788 wrote to memory of 5060 1788 cmd.exe 90 PID 1788 wrote to memory of 5060 1788 cmd.exe 90 PID 1788 wrote to memory of 5060 1788 cmd.exe 90 PID 3728 wrote to memory of 2756 3728 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 92 PID 3728 wrote to memory of 2756 3728 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 92 PID 3728 wrote to memory of 2756 3728 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 92 PID 2756 wrote to memory of 2268 2756 cmd.exe 94 PID 2756 wrote to memory of 2268 2756 cmd.exe 94 PID 2756 wrote to memory of 2268 2756 cmd.exe 94 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoSizeChoice = "1" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoColorChoice = "1" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2944 attrib.exe 5060 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe"C:\Users\Admin\AppData\Local\Temp\02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s "C:\Windows\system32\winsock.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\attrib.exeattrib +h +s "C:\Windows\system32\winsock.exe"3⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s "C:\Windows\system32\winkernel32.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\attrib.exeattrib +h +s "C:\Windows\system32\winkernel32.exe"3⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c shutdown -r2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3925055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5f2e15b52a3cdc16e2e0a241e7b7af12b
SHA15fc354c6e2199d8178a7512ef16c56d2b87be372
SHA25693becf493f79d3a981b1ecdb6d4cf8bd13dcf980ebc6a2dc8e4a27e01c2e8c1f
SHA51261a155f138106fab98110fd8e204b9f33898fb25f32e46e1e60512a2a2a79fe5ce078f798db39db7ced47bfa411d681a7847768ab39a132ccaefd44d0786a740