Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 01:37

General

  • Target

    93c55deeee3cd963b82fea8d32b0848f35bb4679921045b07f8116c21c6634b7.exe

  • Size

    704KB

  • MD5

    906593a62b364af3cbebf6d28d595531

  • SHA1

    97f124e6394796b8020e5162b04cafcc6ebdf11a

  • SHA256

    93c55deeee3cd963b82fea8d32b0848f35bb4679921045b07f8116c21c6634b7

  • SHA512

    cb419c171cdeb5f034e35f7337dee26718b47c6cc55b167e4da79210f34cfa28e843b5a65a5260d9ce96a5a1688d8fdf2d57f4c44d56a8d667ea46ba9b451bd2

  • SSDEEP

    12288:mXgvmzFHi0mo5aH0qMzd5807FIjPJQPDHvd:mXgvOHi0mGaH0qSdPFIl4V

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 28 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93c55deeee3cd963b82fea8d32b0848f35bb4679921045b07f8116c21c6634b7.exe
    "C:\Users\Admin\AppData\Local\Temp\93c55deeee3cd963b82fea8d32b0848f35bb4679921045b07f8116c21c6634b7.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Hijack Execution Flow: Executable Installer File Permissions Weakness
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2304
    • C:\Users\Admin\AppData\Local\Temp\cijpwgl.exe
      "C:\Users\Admin\AppData\Local\Temp\cijpwgl.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Impair Defenses: Safe Mode Boot
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:4788
    • C:\Users\Admin\AppData\Local\Temp\cijpwgl.exe
      "C:\Users\Admin\AppData\Local\Temp\cijpwgl.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • System policy modification
      PID:4704
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\vywzdkmsbxcirfgwvlomptacir.syh

      Filesize

      280B

      MD5

      51938a127752866f56d948d32ff8a74f

      SHA1

      80324c2d46c704ff4cce9391127609987fe07192

      SHA256

      f679d760bf3bc78acaeda81aa3d90c3b5d9ee56024b2f576ccec2d09b2329be6

      SHA512

      53a0d16ca6882a716109d7b65d9394c4a031eac6d56cd3eaffc171f0a4f31d56631de75fd22d3e85a75e315aa76a7e119b451312014e0f96a94111dd3f7fd08b

    • C:\Program Files (x86)\vywzdkmsbxcirfgwvlomptacir.syh

      Filesize

      280B

      MD5

      3eb8b70e848a7abb97ff0fbe345b11ee

      SHA1

      2c2b436453bbf82c0935aaa023924a7e60dafd22

      SHA256

      e4feae5ced19508bee1ecb5f9cabdf10e0f6adbf54524839761ce75799f6c346

      SHA512

      1a7714c78ee88e6652d6e851a1b203e856cc67d8ba742681ed20573878a04e87a449f54041214000e9134833df19918360bbdccc2dc77913ac0e77cc65af568e

    • C:\Program Files (x86)\vywzdkmsbxcirfgwvlomptacir.syh

      Filesize

      280B

      MD5

      9173f30ab3aa68ff28e8ffa64f0b16df

      SHA1

      7354bbf65c420528b86c18e06188f9b7f673a6f0

      SHA256

      68b4e277a5c3820ab55946b6a83bcc6d32903b421ac098bac110c5f6c720e9cf

      SHA512

      d1738ba9e0320b440ddf6c0fe079a8cb67d07caf52793ff06c8a20cde7a878f4d6cea51690559cd5564a4c3ece0a64c6390ccdc3b627d3dd0f92890ec975af98

    • C:\Program Files (x86)\vywzdkmsbxcirfgwvlomptacir.syh

      Filesize

      280B

      MD5

      08a0a9c674c62e0ed9a3a7fa5e8ec95e

      SHA1

      82dfd2f45549791b884b0b0caf29f3381ff8e8f9

      SHA256

      e021963869cc224b2702ca8b5cf90d061848edbb27ab98b7e89e0edca611fb2f

      SHA512

      63a824a3d2bd7e5157df7bb4d7ba4a9c387a6dc9231be2a6e74cff423b24e324ec7068bb781633de8196cc8d9e16ef7d471ea999bc4700ca36f9e4ba37f29425

    • C:\Program Files (x86)\vywzdkmsbxcirfgwvlomptacir.syh

      Filesize

      280B

      MD5

      463015339840cf1f978301ce6f8cd51a

      SHA1

      43147e0e1dac835dc8e3fb6b7a0c6241c6b02f0c

      SHA256

      7c650c517f86bf04e244c044c257ddcf8ee43921e64747314a6cf4b6d34d5ad9

      SHA512

      1f5e326cd76f7a76cf20d012ae7594cee38920d5886573206862eebc9fe8d033201bcd644fc9ead3eb19efe4876613998697c9558f72263ae1fe71b679e2a47a

    • C:\Users\Admin\AppData\Local\Temp\cijpwgl.exe

      Filesize

      1.3MB

      MD5

      37fbc066ac7dabb1e7a3f25b7202cf7e

      SHA1

      d4cbda0121a2ca5f0254a55d96ab480bf8bbb01a

      SHA256

      02f5344738d9cb49ea343453be7ae4d0ac5bb8554d18876cb062367d243b9dbf

      SHA512

      35c1d423d35fd4d2d7ebb451da0851621476897892f577224b89b24b438704a8b2bac40309acfd47aa092828fa4fbda33c9c9b2f1fd4edf8dd982d759d0417e6

    • C:\Users\Admin\AppData\Local\vywzdkmsbxcirfgwvlomptacir.syh

      Filesize

      280B

      MD5

      bb7e5f99c6242c673dfa414bf688cdce

      SHA1

      f6395e326427c9e233a4d11e60cec4125ff6a77f

      SHA256

      fb964925da65c33657375190223307ed649545dc70e88345459465e821e7ebdc

      SHA512

      f5495ea86de82ce4ea5695dc620b1804e9356a2c28c41edcfe53d18779c55f3d3befd6a06ef453f47e86d1055d181cdcdc4dbc2c723849ad04af43fefcb4aa64

    • C:\Users\Admin\AppData\Local\vywzdkmsbxcirfgwvlomptacir.syh

      Filesize

      280B

      MD5

      cb5551abb0cc4522cbdf97d1a1a27650

      SHA1

      969f54c36523b0fa3716ef908f214e85a583d0e5

      SHA256

      7dd5fcfb74595463cd5426d0bae7bd3569828dd97208a6a0026bf886e7dfd85d

      SHA512

      02cf0988f58afa4b63f481f61e3e72442ae6036efd5ff362d2f5b9a0717cb8c9127ad0145a27d0a9d45809f71a3413c5b21552d10e9ac233c221300280cde64b

    • C:\Users\Admin\AppData\Local\vywzdkmsbxcirfgwvlomptacir.syh

      Filesize

      280B

      MD5

      2eb38499822f7c8be3867719e20afcfc

      SHA1

      4e0c16a1556b8e26df722bbe1e6b5c2a6ecd7b60

      SHA256

      1ac5dc1bfb5ba5bd3c0197fe07248147e6bd691618e62eab1a9fb1ff2a2977cb

      SHA512

      1b482c60f570de7ba5b7cd91fea2b604dd8c26ce0c5c0dd9654d9bc9a7727d83b366a92dad9c9a5a02a0e333f4ac3bd86e736593ab8fe321e1a6f16e556530ae

    • C:\Users\Admin\AppData\Local\wkthwobsmtjautfgqrfocrjwnhoevpoablmaj.mer

      Filesize

      4KB

      MD5

      9d8c29cfe8554657a3d054e09bc94b63

      SHA1

      ee4341fbc8cafbd730c9e63db773566ad465b04d

      SHA256

      c8ecabb13c818e027b164d179aa607d910d0835a7a6200d08bcf72b3dc5a2d32

      SHA512

      8e50e81007db44dc4619ae812ccceb591abf85f4cc194e8b698a1ea5b16f9a76e2c88b1c27973642729444e917695c5c020e19508837d972af0f63578bca7e97