Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 02:55

General

  • Target

    a812ed1d18abc7ac7a202c491ce11a2166a5848118eed23502ed91a102d862c7.exe

  • Size

    64KB

  • MD5

    d721e2bf9abc01139dcebd832734eb86

  • SHA1

    a1c1f777e8b73dd61b89166798bf05163355c0ef

  • SHA256

    a812ed1d18abc7ac7a202c491ce11a2166a5848118eed23502ed91a102d862c7

  • SHA512

    b8d04c658f5a9ad4bd4b3c0940ff24b8f9fc00447293fa3c285d2ac917829aa97864ad6da914e05bce09ecae60a997b69e52978f44dc15fa402e8324e655216a

  • SSDEEP

    1536:8g/9T8ROcQupqqusN3mrS/ztMhkywRFUnTmc5n4IIIIIIIIIIIIIIIIII/IIIIIn:8g585LpPCrQt7F84IIIIIIIIIIIIIIIl

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Modifies system executable filetype association 2 TTPs 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 13 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a812ed1d18abc7ac7a202c491ce11a2166a5848118eed23502ed91a102d862c7.exe
    "C:\Users\Admin\AppData\Local\Temp\a812ed1d18abc7ac7a202c491ce11a2166a5848118eed23502ed91a102d862c7.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Windows\SMSSxn.exe
      "C:\Windows\SMSSxn.exe" -xInstallOurNiceServicesYes
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:688
  • C:\Windows\SMSSxn.exe
    C:\Windows\SMSSxn.exe -xStartOurNiceServicesYes
    1⤵
    • Modifies WinLogon for persistence
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SMSSxn.exe

    Filesize

    64KB

    MD5

    d721e2bf9abc01139dcebd832734eb86

    SHA1

    a1c1f777e8b73dd61b89166798bf05163355c0ef

    SHA256

    a812ed1d18abc7ac7a202c491ce11a2166a5848118eed23502ed91a102d862c7

    SHA512

    b8d04c658f5a9ad4bd4b3c0940ff24b8f9fc00447293fa3c285d2ac917829aa97864ad6da914e05bce09ecae60a997b69e52978f44dc15fa402e8324e655216a

  • C:\Windows\svchost.exe

    Filesize

    64KB

    MD5

    ced25138e2206d96f27ede668b041915

    SHA1

    af5322f5b81edb63215bed96ebedd23af47c1f82

    SHA256

    0b6ec22db9fb4d22d44e1d7965a3db8cf48e0ecc058dd430b73d0f02ea76d894

    SHA512

    83eaa3b64aa38f7611081ec19072d7df1c65449daf6d6870ebb2fe14780db8f932ae9a812744dc25393cd051ce83b67869bd17545ffd2408a74090522399496c

  • memory/688-7-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/2936-42-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/2936-63-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/2936-36-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/2936-55-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-45-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-56-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-43-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-39-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-48-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-54-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-37-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-41-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-58-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-60-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-62-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-35-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-64-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB

  • memory/4420-66-0x0000000000400000-0x000000000051F000-memory.dmp

    Filesize

    1.1MB