Resubmissions
19-11-2024 17:09
241119-vn7sxsydpa 1019-11-2024 03:18
241119-dtmlhazapb 1019-11-2024 03:11
241119-dp3f6azgpp 1019-11-2024 03:07
241119-dmstyazgnj 10Analysis
-
max time kernel
53s -
platform
windows11-21h2_x64 -
resource
win11-20241007-es -
resource tags
arch:x64arch:x86image:win11-20241007-eslocale:es-esos:windows11-21h2-x64systemwindows -
submitted
19-11-2024 17:09
Static task
static1
Errors
General
-
Target
Recovery.exe
-
Size
107KB
-
MD5
d90957d3cd23fbe36dedf1de6faa40d7
-
SHA1
d4eaf5265a509389673f78621f2b8fad4469534b
-
SHA256
d5acc827ecfc0a6944eb3b7fe4e1de10c433f8bacbf9e5ac576a5fbd55219f36
-
SHA512
aee281bbeace797741126ccdb5b516bfb265b6630f16ffaf44ad840383e42ea11e5fe9b30518c2de652dfc2dfc8521523f99b8e39d79d28691e6049de843c12f
-
SSDEEP
3072:gL06G8Hl9Sfhw4mzbW/hg0cYpG1RgN1UeeXB:gL48F9S2NbAhg0cYpG1RgN1Ues
Malware Config
Signatures
-
Processes:
Recovery.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Recovery.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Recovery.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
Recovery.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Recovery.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
Recovery.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Recovery.exe -
Processes:
Recovery.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Recovery.exe -
Blocks application from running via registry modification 9 IoCs
Adds application to list of disallowed applications.
Processes:
Recovery.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\SOFTWARE\Microsoft\windows\CurrentVersion\Policies\Explorer\DisallowRun Recovery.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "ProcessHacker.exe" Recovery.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "Autoruns64.exe" Recovery.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "Autorunsc.exe" Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" Recovery.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "procexp64.exe" Recovery.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Autoruns.exe" Recovery.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "Autorunsc64.exe" Recovery.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "notepad.exe" Recovery.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
Recovery.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Recovery.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Possible privilege escalation attempt 6 IoCs
Processes:
icacls.exetakeown.exetakeown.exeicacls.exeicacls.exetakeown.exepid process 4888 icacls.exe 2316 takeown.exe 4252 takeown.exe 5056 icacls.exe 3148 icacls.exe 3724 takeown.exe -
Modifies file permissions 1 TTPs 6 IoCs
Processes:
takeown.exetakeown.exeicacls.exeicacls.exetakeown.exeicacls.exepid process 2316 takeown.exe 4252 takeown.exe 5056 icacls.exe 3148 icacls.exe 3724 takeown.exe 4888 icacls.exe -
Processes:
Recovery.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Recovery.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
Recovery.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AutoRestartShell = "0" Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\DisableCAD = "1" Recovery.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Recovery.exedescription ioc process File opened for modification \??\PhysicalDrive0 Recovery.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 1 IoCs
Processes:
Recovery.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Control Panel\Desktop\AutoColorization = "1" Recovery.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
Recovery.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "https://github.com/Joseantonio2354/Kawaii" Recovery.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
takeown.exetakeown.exetakeown.exeRecovery.exedescription pid process Token: SeTakeOwnershipPrivilege 2316 takeown.exe Token: SeTakeOwnershipPrivilege 4252 takeown.exe Token: SeTakeOwnershipPrivilege 3724 takeown.exe Token: SeDebugPrivilege 3912 Recovery.exe Token: SeDebugPrivilege 3912 Recovery.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Recovery.execmd.execmd.exedescription pid process target process PID 3912 wrote to memory of 3556 3912 Recovery.exe cmd.exe PID 3912 wrote to memory of 3556 3912 Recovery.exe cmd.exe PID 3912 wrote to memory of 2676 3912 Recovery.exe cmd.exe PID 3912 wrote to memory of 2676 3912 Recovery.exe cmd.exe PID 3556 wrote to memory of 2316 3556 cmd.exe takeown.exe PID 3556 wrote to memory of 2316 3556 cmd.exe takeown.exe PID 2676 wrote to memory of 4252 2676 cmd.exe takeown.exe PID 2676 wrote to memory of 4252 2676 cmd.exe takeown.exe PID 3556 wrote to memory of 3148 3556 cmd.exe icacls.exe PID 3556 wrote to memory of 3148 3556 cmd.exe icacls.exe PID 2676 wrote to memory of 5056 2676 cmd.exe icacls.exe PID 2676 wrote to memory of 5056 2676 cmd.exe icacls.exe PID 3556 wrote to memory of 3724 3556 cmd.exe takeown.exe PID 3556 wrote to memory of 3724 3556 cmd.exe takeown.exe PID 3556 wrote to memory of 4888 3556 cmd.exe icacls.exe PID 3556 wrote to memory of 4888 3556 cmd.exe icacls.exe -
System policy modification 1 TTPs 11 IoCs
Processes:
Recovery.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\UseDefaultTile = "1" Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFind = "1" Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecycleFiles = "1" Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy = "1" Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "1" Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPropertiesMyComputer = "1" Recovery.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Recovery.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Recovery.exe"C:\Users\Admin\AppData\Local\Temp\Recovery.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Blocks application from running via registry modification
- Disables RegEdit via registry modification
- Checks whether UAC is enabled
- Modifies WinLogon
- Writes to the Master Boot Record (MBR)
- Modifies Control Panel
- Modifies Internet Explorer start page
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3912 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k takeown /f C:\Windows\System32 && icacls C:\Windows\System32 /grant %username%:F && takeown /f C:\Windows\System32\drivers && icacls C:\Windows\System32\drivers /grant %username%:F && Exit2⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System323⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32 /grant Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3148
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\drivers3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\drivers /grant Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4888
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k takeown /f C:\Windows\System32\winlogon.exe && icacls C:\Windows\System32\winlogon.exe /grant %username%:F exit2⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\winlogon.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\winlogon.exe /grant Admin:F exit3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5056
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Pre-OS Boot
1Bootkit
1