Analysis
-
max time kernel
120s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 18:24
Behavioral task
behavioral1
Sample
0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe
Resource
win10v2004-20241007-en
General
-
Target
0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe
-
Size
1.5MB
-
MD5
ce218c18aae52502241895cffd1e79e0
-
SHA1
a9d6204f2f6bd024e9946f0b6ffc1447254e88a0
-
SHA256
0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109
-
SHA512
46b2928eaacfb7eb113a905863e973ce9b15fd55eb6cbf70581e3978c8425591d893d8bf98350b0823a22be11af756c7ec5e06e6e00ac1f5e66db5c215b58b9e
-
SSDEEP
12288:Y+Qf9NxkERr1JzrDTzz7wHxhW88KH6Yn77TCNp8jToZGrhR0ZooSR:Ox0j8KaYnfTYp8/oZMGZQ
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 10 IoCs
Processes:
reg.exereg.exereg.exereg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe = "C:\\Users\\Admin\\AppData\\Roaming\\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\winlogon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe -
Executes dropped EXE 3 IoCs
Processes:
winlogon.exewinlogon.exewinlogon.exepid Process 4876 winlogon.exe 1736 winlogon.exe 3456 winlogon.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
winlogon.exedescription pid Process procid_target PID 4876 set thread context of 1736 4876 winlogon.exe 88 PID 4876 set thread context of 3456 4876 winlogon.exe 89 -
Processes:
resource yara_rule behavioral2/memory/4748-0-0x0000000000400000-0x000000000058F000-memory.dmp upx behavioral2/files/0x0008000000023c8d-16.dat upx behavioral2/memory/4748-30-0x0000000000400000-0x000000000058F000-memory.dmp upx behavioral2/memory/1736-31-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1736-34-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3456-37-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1736-36-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3456-44-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3456-47-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3456-43-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/4876-49-0x0000000000400000-0x000000000058F000-memory.dmp upx behavioral2/memory/1736-52-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3456-53-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1736-54-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1736-56-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1736-58-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1736-61-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1736-77-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
reg.exewinlogon.execmd.execmd.exereg.exereg.exereg.execmd.exewinlogon.execmd.execmd.exe0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exereg.exewinlogon.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe -
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid Process 3468 reg.exe 4264 reg.exe 1540 reg.exe 5036 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
Processes:
winlogon.exewinlogon.exedescription pid Process Token: 1 1736 winlogon.exe Token: SeCreateTokenPrivilege 1736 winlogon.exe Token: SeAssignPrimaryTokenPrivilege 1736 winlogon.exe Token: SeLockMemoryPrivilege 1736 winlogon.exe Token: SeIncreaseQuotaPrivilege 1736 winlogon.exe Token: SeMachineAccountPrivilege 1736 winlogon.exe Token: SeTcbPrivilege 1736 winlogon.exe Token: SeSecurityPrivilege 1736 winlogon.exe Token: SeTakeOwnershipPrivilege 1736 winlogon.exe Token: SeLoadDriverPrivilege 1736 winlogon.exe Token: SeSystemProfilePrivilege 1736 winlogon.exe Token: SeSystemtimePrivilege 1736 winlogon.exe Token: SeProfSingleProcessPrivilege 1736 winlogon.exe Token: SeIncBasePriorityPrivilege 1736 winlogon.exe Token: SeCreatePagefilePrivilege 1736 winlogon.exe Token: SeCreatePermanentPrivilege 1736 winlogon.exe Token: SeBackupPrivilege 1736 winlogon.exe Token: SeRestorePrivilege 1736 winlogon.exe Token: SeShutdownPrivilege 1736 winlogon.exe Token: SeDebugPrivilege 1736 winlogon.exe Token: SeAuditPrivilege 1736 winlogon.exe Token: SeSystemEnvironmentPrivilege 1736 winlogon.exe Token: SeChangeNotifyPrivilege 1736 winlogon.exe Token: SeRemoteShutdownPrivilege 1736 winlogon.exe Token: SeUndockPrivilege 1736 winlogon.exe Token: SeSyncAgentPrivilege 1736 winlogon.exe Token: SeEnableDelegationPrivilege 1736 winlogon.exe Token: SeManageVolumePrivilege 1736 winlogon.exe Token: SeImpersonatePrivilege 1736 winlogon.exe Token: SeCreateGlobalPrivilege 1736 winlogon.exe Token: 31 1736 winlogon.exe Token: 32 1736 winlogon.exe Token: 33 1736 winlogon.exe Token: 34 1736 winlogon.exe Token: 35 1736 winlogon.exe Token: SeDebugPrivilege 3456 winlogon.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exewinlogon.exewinlogon.exewinlogon.exepid Process 4748 0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe 4876 winlogon.exe 1736 winlogon.exe 3456 winlogon.exe 1736 winlogon.exe 1736 winlogon.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.execmd.exewinlogon.exewinlogon.execmd.execmd.execmd.execmd.exedescription pid Process procid_target PID 4748 wrote to memory of 1044 4748 0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe 83 PID 4748 wrote to memory of 1044 4748 0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe 83 PID 4748 wrote to memory of 1044 4748 0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe 83 PID 1044 wrote to memory of 3240 1044 cmd.exe 86 PID 1044 wrote to memory of 3240 1044 cmd.exe 86 PID 1044 wrote to memory of 3240 1044 cmd.exe 86 PID 4748 wrote to memory of 4876 4748 0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe 87 PID 4748 wrote to memory of 4876 4748 0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe 87 PID 4748 wrote to memory of 4876 4748 0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe 87 PID 4876 wrote to memory of 1736 4876 winlogon.exe 88 PID 4876 wrote to memory of 1736 4876 winlogon.exe 88 PID 4876 wrote to memory of 1736 4876 winlogon.exe 88 PID 4876 wrote to memory of 1736 4876 winlogon.exe 88 PID 4876 wrote to memory of 1736 4876 winlogon.exe 88 PID 4876 wrote to memory of 1736 4876 winlogon.exe 88 PID 4876 wrote to memory of 1736 4876 winlogon.exe 88 PID 4876 wrote to memory of 1736 4876 winlogon.exe 88 PID 4876 wrote to memory of 3456 4876 winlogon.exe 89 PID 4876 wrote to memory of 3456 4876 winlogon.exe 89 PID 4876 wrote to memory of 3456 4876 winlogon.exe 89 PID 4876 wrote to memory of 3456 4876 winlogon.exe 89 PID 4876 wrote to memory of 3456 4876 winlogon.exe 89 PID 4876 wrote to memory of 3456 4876 winlogon.exe 89 PID 4876 wrote to memory of 3456 4876 winlogon.exe 89 PID 4876 wrote to memory of 3456 4876 winlogon.exe 89 PID 1736 wrote to memory of 2656 1736 winlogon.exe 90 PID 1736 wrote to memory of 2656 1736 winlogon.exe 90 PID 1736 wrote to memory of 2656 1736 winlogon.exe 90 PID 1736 wrote to memory of 3864 1736 winlogon.exe 91 PID 1736 wrote to memory of 3864 1736 winlogon.exe 91 PID 1736 wrote to memory of 3864 1736 winlogon.exe 91 PID 1736 wrote to memory of 4680 1736 winlogon.exe 92 PID 1736 wrote to memory of 4680 1736 winlogon.exe 92 PID 1736 wrote to memory of 4680 1736 winlogon.exe 92 PID 1736 wrote to memory of 1704 1736 winlogon.exe 93 PID 1736 wrote to memory of 1704 1736 winlogon.exe 93 PID 1736 wrote to memory of 1704 1736 winlogon.exe 93 PID 1704 wrote to memory of 5036 1704 cmd.exe 98 PID 1704 wrote to memory of 5036 1704 cmd.exe 98 PID 1704 wrote to memory of 5036 1704 cmd.exe 98 PID 2656 wrote to memory of 3468 2656 cmd.exe 99 PID 2656 wrote to memory of 3468 2656 cmd.exe 99 PID 2656 wrote to memory of 3468 2656 cmd.exe 99 PID 4680 wrote to memory of 1540 4680 cmd.exe 100 PID 4680 wrote to memory of 1540 4680 cmd.exe 100 PID 4680 wrote to memory of 1540 4680 cmd.exe 100 PID 3864 wrote to memory of 4264 3864 cmd.exe 101 PID 3864 wrote to memory of 4264 3864 cmd.exe 101 PID 3864 wrote to memory of 4264 3864 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe"C:\Users\Admin\AppData\Local\Temp\0e0103ee9a25015e18f8b3041f68e17a7185bd599d5613fde83df054b4189109N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JTorH.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3240
-
-
-
C:\Users\Admin\AppData\Roaming\winlogon.exe"C:\Users\Admin\AppData\Roaming\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Roaming\winlogon.exeC:\Users\Admin\AppData\Roaming\winlogon.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3468
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogon.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogon.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4264
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5036
-
-
-
-
C:\Users\Admin\AppData\Roaming\winlogon.exeC:\Users\Admin\AppData\Roaming\winlogon.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3456
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138B
MD54da6717f2c70f4bd32ad33a227a2ff47
SHA13d7f7159e1f695bd469287d1ad4ffa0841b407a8
SHA256a12bb2e5d2fb0b3c400ce311fae72995a00b57a97d23e4b9effec47cff189d07
SHA5126765314054ad9bf2164058248f3d3a17775176925abbe4376aec030dca3a5e59be8b9e96139941fec2b2e1a9bff38f87abdb29ea09a299d8ab7e23ecec4083df
-
Filesize
1.5MB
MD54c63150145c0047b6751875132728ceb
SHA1c3dfc43c316c9abb35234b9b3d9df3537f211a5b
SHA256dcddc081a80f8b48ea88e351a2499c4a1e157e4830222a8fb76200cd2533a886
SHA5121eaefb06bb6fe2aa05597273f185b3737346896431534f53edde823dc565653ae249e1865626d78f7f61ecc30532f5717e2311982cf4bfce7b90f56a5c00abdb