Analysis
-
max time kernel
57s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 04:32
Static task
static1
Behavioral task
behavioral1
Sample
XLSmartApp.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XLSmartApp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
libcurl64.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
libcurl64.dll
Resource
win10v2004-20241007-en
General
-
Target
XLSmartApp.exe
-
Size
1.1MB
-
MD5
1a832e5e1574fc6176dc960c6aea3a85
-
SHA1
5c1c7f2b66e72d62c3d658ed2f1155b0bb39e13c
-
SHA256
8f39b7064e9a22e60bd463009d9cf19323323110783a644dfb5bb40da9001aa4
-
SHA512
a32ce2b3b1ba332c55a806a6831405dabbdcf1901977db01e7806098cc54debf0abed74db52206287431a97b2ba9e655a6d99500dc91785085d913e8eb64c473
-
SSDEEP
24576:l7ltJMTh3o77d03Cr7204Zfy7mpG0fh0lhSMXlsJnggfMJt7sw:VltJr77dff20YfBGT0ggfwOw
Malware Config
Extracted
Protocol: ftp- Host:
27.124.45.155 - Port:
21 - Username:
lz165404 - Password:
lz165404.
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" XLSmartApp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" XLSmartApp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\系统优化组件 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XLSmartApp.exe" XLSmartApp.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: XLSmartApp.exe File opened (read-only) \??\O: XLSmartApp.exe File opened (read-only) \??\Y: XLSmartApp.exe File opened (read-only) \??\L: XLSmartApp.exe File opened (read-only) \??\J: XLSmartApp.exe File opened (read-only) \??\Q: XLSmartApp.exe File opened (read-only) \??\S: XLSmartApp.exe File opened (read-only) \??\U: XLSmartApp.exe File opened (read-only) \??\X: XLSmartApp.exe File opened (read-only) \??\B: XLSmartApp.exe File opened (read-only) \??\V: XLSmartApp.exe File opened (read-only) \??\W: XLSmartApp.exe File opened (read-only) \??\Z: XLSmartApp.exe File opened (read-only) \??\K: XLSmartApp.exe File opened (read-only) \??\G: XLSmartApp.exe File opened (read-only) \??\H: XLSmartApp.exe File opened (read-only) \??\I: XLSmartApp.exe File opened (read-only) \??\M: XLSmartApp.exe File opened (read-only) \??\P: XLSmartApp.exe File opened (read-only) \??\R: XLSmartApp.exe File opened (read-only) \??\T: XLSmartApp.exe File opened (read-only) \??\E: XLSmartApp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ XLSmartApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString XLSmartApp.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe 2648 XLSmartApp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2648 XLSmartApp.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" XLSmartApp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" XLSmartApp.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XLSmartApp.exe"C:\Users\Admin\AppData\Local\Temp\XLSmartApp.exe"1⤵
- UAC bypass
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2648
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3