Analysis
-
max time kernel
57s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
anéxo6896294663.32903578.exe
Resource
win7-20240903-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
anéxo6896294663.32903578.exe
Resource
win10v2004-20241007-en
6 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
anéxo6896294663.32903578.exe
-
Size
10.9MB
-
MD5
a673bb0e88211b45925c3b2978db2b9e
-
SHA1
9bce2796b2d948e5aed02dded343bd89101e8a54
-
SHA256
be20148565920cd87d49f061495fb47c0a4ea4826944c6094dbde6de7f398c26
-
SHA512
c65c9e61d7da8c5e188e6b67041234deb36ebe23a443ef6dd47b1f5ddbfdb77ce501490312eaacee7092a2baeed65bb04cf55aaf672533ac6510b8922c29324f
-
SSDEEP
196608:N/e0OXsmes5F2AvTWlIMgLdoo51kqk5Cb8Op:NW0esmesr2ASlIf1zkqMxOp
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4exbuAtDF4ScOs = "C:\\Users\\Admin\\Microsoft.NET\\netframework4.7\\version\\deduravamos\\26LrQxHCBtK.exe" anéxo6896294663.32903578.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 20 Go-http-client/1.1 -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "5" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3588 shutdown.exe Token: SeRemoteShutdownPrivilege 3588 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2796 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1884 wrote to memory of 3588 1884 anéxo6896294663.32903578.exe 89 PID 1884 wrote to memory of 3588 1884 anéxo6896294663.32903578.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\anéxo6896294663.32903578.exe"C:\Users\Admin\AppData\Local\Temp\anéxo6896294663.32903578.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\system32\shutdown.exeshutdown /r /t 302⤵
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3999055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2796