Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2024 17:16

General

  • Target

    9cf08152f1c39c41797195feaaec1e5d8276a4f78bd5636607146bec3abb8a02.exe

  • Size

    63KB

  • MD5

    d727c986e95a42f9719a160971c827ed

  • SHA1

    305e3050196c50ff0f17609182d6292e89fd676b

  • SHA256

    9cf08152f1c39c41797195feaaec1e5d8276a4f78bd5636607146bec3abb8a02

  • SHA512

    0c8d62389816c63723d7abafcccf0ee2556a3922c8b4790f670210f3f18a74368d94826f2ce733dcf3f6c45e9838a2387809d700215ac8f3efcda7d8d65d1cda

  • SSDEEP

    768:ZSxam3Usjr3RT594UPS8GGCMDDxW738HbFtnbcuyD7UVOQI5noRcAvcV4RP0U+t6:ZRsjd3GR2Dxy387Lnouy8VTGAG4RsfU

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9cf08152f1c39c41797195feaaec1e5d8276a4f78bd5636607146bec3abb8a02.exe
    "C:\Users\Admin\AppData\Local\Temp\9cf08152f1c39c41797195feaaec1e5d8276a4f78bd5636607146bec3abb8a02.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2800
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:896
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2828
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3608
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2036
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3080
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2884
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    63KB

    MD5

    16122d38f39a78d09b05efbe3b6b7547

    SHA1

    da91ddf01bdce9aebca871b9f54b9cc01a12e518

    SHA256

    e3ddfa38db0bba0fbddf4eec0e5646d021ebee9f0358e072fc0034abbe8eb91b

    SHA512

    fd2ada48efe1a9aa2e96c21201ccf64d1a31d0dfb0b6ed5fa56ced9ac475baeb3beae2424a9de507f008ba58a6f3c0f726045cdf1e5e03af1c673870ef9845f9

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    63KB

    MD5

    dd02fe3924ecb5d9361159917157acc9

    SHA1

    b291e8b9891c3ac3cccacf142bda86103773f642

    SHA256

    f7b5db496b0dfcb806897905a51bd1c2695ea325a075f2f3aae1c72f8a9b3b08

    SHA512

    e6793b11dd7da8215a0ce6301721d8245b2d42dcc70790e31fc92e02fcb84e804bb09863ef2ebd9ba31c4f935cfa6181c701bb9804e7dacc5ea52e5c2ee93f69

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    63KB

    MD5

    6d01c35c5328a4a65da375ab55341c85

    SHA1

    31d434fb57788261318186cc9e4b711feacdeb52

    SHA256

    afb69487d81f8a23a15dc4ef4acbfd5a3ccac10fbc9c965de29261c516fbbf20

    SHA512

    fec6de413528d6a498b26b026732132e2e84349a919654fd43defeea2b9446b9488bf0eeac2a2aade9d2bc6061517b5e3f582d45b851484203071ac80141a3bc

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    63KB

    MD5

    d727c986e95a42f9719a160971c827ed

    SHA1

    305e3050196c50ff0f17609182d6292e89fd676b

    SHA256

    9cf08152f1c39c41797195feaaec1e5d8276a4f78bd5636607146bec3abb8a02

    SHA512

    0c8d62389816c63723d7abafcccf0ee2556a3922c8b4790f670210f3f18a74368d94826f2ce733dcf3f6c45e9838a2387809d700215ac8f3efcda7d8d65d1cda

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE

    Filesize

    63KB

    MD5

    abb74cef109ca93fd99c7f9140219692

    SHA1

    6e9291ebb7d759ce1850a568736aee8a02602ba4

    SHA256

    07b56b9ff704ca3121bf6d25e4755803f39b7af597013c95df2b0a328e150109

    SHA512

    363c77683a84a024a682060f9624293ed6b1421d33fe0c3ed4125b6649c0ff9cabe7ac8ac5322a67218d4ca55fc4935ab2cf4b6f04ed38ef3ba2100ce1e2a21d

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE

    Filesize

    63KB

    MD5

    3f20c96d065589671caec00479ffbca5

    SHA1

    c49b828cbbe1c9953c0b6ec0ac6cf3b05874b9cd

    SHA256

    d147fe27f3d67d742aa441bd9e862b657d4e01d36f5bad8885853ca1d827c1dc

    SHA512

    1c0e26ab6b43bff69cfa6f1e5623a42c13ef5f4e536e0f158de19e37a20dd287f0d26b8f2b9869d8a7309efdf341dd552e54c31eda2dd89d306c32281eaa41a4

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    63KB

    MD5

    5e76e048714991b787d843900c492339

    SHA1

    770133d8f294d25bb7f9d269f68f8b9ab3b64ce0

    SHA256

    c2d47518ef41db1e8f372a8d1611ebd9728e17a67f5f345ae90488a2ca57a8dd

    SHA512

    f606ea71246566982a1e5388734e31ca293b60d034d448fabc04f8efb0dc88c6fc2268d341f097eca17d59ad69520ef34baac91fb52c0c79fbe9e72ed8f101e3

  • C:\Windows\xk.exe

    Filesize

    63KB

    MD5

    15ae49015ed4af9315f4b5e52d9c33a2

    SHA1

    c3cb5cb2b1fcda98f8a484fc79268ea71203b2f4

    SHA256

    0345063dc460f5c50c052bc106b90652c31c6ab007edab7d0dd0d1ae807ed0de

    SHA512

    827f843ce5b7321df2461b81b3072e05e33fd083e4bab6485a91a9e58a35ba847755f52b8eb6410e23a63409c062513445fcc3b53e4b0aadcc959eed53da65a3

  • memory/896-114-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2036-133-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2800-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2800-157-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2828-121-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2828-115-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2884-151-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3080-138-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3080-141-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3608-126-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4956-152-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4956-155-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB