Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2024, 09:00

General

  • Target

    1bf36695b0709be363fabd107d3fe8f4b202b1e58b3665408107875839822715.exe

  • Size

    320KB

  • MD5

    f994621fb8d39133c91165a336bfa517

  • SHA1

    02f1f61bd246cbb0a7cd7e1aed69e48628d15d7a

  • SHA256

    1bf36695b0709be363fabd107d3fe8f4b202b1e58b3665408107875839822715

  • SHA512

    e3bd52ae4070e6bab51802247788e91ad5edf66272fc2668bfff14c867636931c53eb19653bb081459e0f9f45bf4dcc9df03933863ff81d0a61c4d688e908b6b

  • SSDEEP

    6144:0TwZo1IV3puaibGKFHi0mofhaH05kipz016580bHFbl86JQPDHDdx/QtqRr:qXgvmzFHi0mo5aH0qMzd5807FRPJQPDH

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 26 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 9 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bf36695b0709be363fabd107d3fe8f4b202b1e58b3665408107875839822715.exe
    "C:\Users\Admin\AppData\Local\Temp\1bf36695b0709be363fabd107d3fe8f4b202b1e58b3665408107875839822715.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Hijack Execution Flow: Executable Installer File Permissions Weakness
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3676
    • C:\Users\Admin\AppData\Local\Temp\abllv.exe
      "C:\Users\Admin\AppData\Local\Temp\abllv.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Impair Defenses: Safe Mode Boot
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:1728
    • C:\Users\Admin\AppData\Local\Temp\abllv.exe
      "C:\Users\Admin\AppData\Local\Temp\abllv.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • System policy modification
      PID:4852
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\rrazinltzxcirfgwvhhqpydbjp.syh

      Filesize

      280B

      MD5

      eb0d841eb9d187b35b2c2cdf049822df

      SHA1

      9db3edf2dba3a09aa6a84d77a12a567aa708e4a4

      SHA256

      ae89af21e6bb8742d2dfe9afc1e313961f9381076cb7e0ff0ca9d240800082a0

      SHA512

      328f5cefd8860724f5cba9eb17514f92bc74095ed20d234b09ae8efc2197816b7184d16f65413aa6c1cc7c1ed7d6db5654c866d7e9ad878177d2b696e2d6691f

    • C:\Program Files (x86)\rrazinltzxcirfgwvhhqpydbjp.syh

      Filesize

      280B

      MD5

      b335ae7d26d7c78cbdf69f90d4e8c467

      SHA1

      e9a417a046353f4ca88d27478057144cafb9995f

      SHA256

      898e01ae57940b8c0de890d74f84168c14d41e19ab4773fe227d6c2a81c4719c

      SHA512

      a8e15d64be5e0eb02123ae10cbfb624108e4fd9aa5c187d727c25ef477373cb1745cc3194c33bf453729a089ba29fa059f652be3f3f6fc372ff5f0aaa6b327cb

    • C:\Program Files (x86)\rrazinltzxcirfgwvhhqpydbjp.syh

      Filesize

      280B

      MD5

      b69bcd16ba40590ccdf68c1f0410d920

      SHA1

      d2302839427ac05e81d0c287195de59b67bcee11

      SHA256

      bf1108266ff69baa8dcb51e2b4ddada85bbe5b0ac630ccce2e8176d35a618fb5

      SHA512

      9dcd01dcb79b015fe4ef0bd16b811d6bad39668abcbe6c6039390d167057396133c591ad41d54f7c76a1bc6f42dbc7129e3d8d515b04bb8c75f9c826c532199d

    • C:\Program Files (x86)\rrazinltzxcirfgwvhhqpydbjp.syh

      Filesize

      280B

      MD5

      8c592f3f66120c07693442152e9758c4

      SHA1

      4b6d658c5529170d12da9b500c800ef8a6f4f8ca

      SHA256

      371fdf4b57dca2c7575870ec82fb318a4a0205028d1c61d4251a09a1480a4ac5

      SHA512

      5ecb390bd6fd4a227563269e46a4fcb481164647fae6118a2c48dcf327acb9b4c1b8fa1f9e3b6295413373e28e20b0236fa0d255f639510438cf7d53645aab32

    • C:\Program Files (x86)\rrazinltzxcirfgwvhhqpydbjp.syh

      Filesize

      280B

      MD5

      68dcf2af9d882b43ff99c3ab534c08d6

      SHA1

      57cb27fd003268e56679765bd439c3e2f8903515

      SHA256

      ae9b15d0768efbfe2a2767f7f2523a355e81268d19790e55d514768feadc55ae

      SHA512

      618b82fe543f699292f64661adf2131ebe8ef332d8d8ab7bff4359d1e20777773da31eeff3289f2bf85ae2fbfeddbec358a5e4b4ff1de9fc38428c99f97df551

    • C:\Program Files (x86)\rrazinltzxcirfgwvhhqpydbjp.syh

      Filesize

      280B

      MD5

      012d0854903eeb6a863795647b15c211

      SHA1

      43b59edcded5c7cb93697064cb88f8d850fe0700

      SHA256

      cb083079711649306c61265203cc133de32a9c48a0a3543589bd4b57668a463c

      SHA512

      562f38b31f5190102caf99a9abad0bab53c846d3ef81bafe765f423ce5b482b1f5dbb6999d53459f34cc11e8537e80a0b4d987c517bf3987a9546392ec8d4cd1

    • C:\Program Files (x86)\rrazinltzxcirfgwvhhqpydbjp.syh

      Filesize

      280B

      MD5

      49cddeba46cfcfd5702aff83b2eaee49

      SHA1

      c043325e95383599fa546eb3d0f2bbfcb6bfd609

      SHA256

      9999dec5fd82691caa2107829df423e0820fae6750199fd157584199648e339e

      SHA512

      712b1e84b781c30a52f96e7abe12f395888241c211f60cdb1cf2387ccc49f0b4c0b8a5cd7c1dc0af356ff995778bd57a692db71b57137fffa62337542001e421

    • C:\Users\Admin\AppData\Local\Temp\abllv.exe

      Filesize

      704KB

      MD5

      9aaf6034530daa05ae6f51aeb77bbfe8

      SHA1

      18a1f733088354093f8c2883e9b9c61b0da1aed7

      SHA256

      95525c21d1ac4db7862c3b31b7415f017b9f70b72259eeffa0a9639c85277004

      SHA512

      045143c89f1aa92cb0c2bb8cf7ae0b29eda4410e8029f6d65094b12ec406d36ce91915f2eed7923f0b7ab3d5ff56f54d9c1d065f89b6aacf9ab97fc4bbf489cc

    • C:\Users\Admin\AppData\Local\rrazinltzxcirfgwvhhqpydbjp.syh

      Filesize

      280B

      MD5

      30cb22f1b73315c6cc38db3131441083

      SHA1

      4f716205a5c09cca418a93fbe527e4fb4e5c0895

      SHA256

      9b8946bd61da5c1fcc247af89d799f3852521919bee0c171a03f19807e007de1

      SHA512

      e5190e719116860f17381aeba9f27a566ac7c1089e7651256df1e68aeb367357635017bcdc307c2d76874d9efa54bd85d9a0a35869b345332ea33131ea049800

    • C:\Users\Admin\AppData\Local\sdxhbratktjautfgqnyscwmvofoevpoablitn.rhq

      Filesize

      4KB

      MD5

      c94c98d5e7b28babfc0189d56c6344af

      SHA1

      263ff331d7dce5104af6dd40d1ae4713a28f3347

      SHA256

      8c4f7603a426f578614d0b001190748ec18819c3807fc3827ab74d16545f988e

      SHA512

      26eca930cc32905192018812680784ccbdfc4d3a7669a4f06c6baecfdc2e4b9cb7ac0d6012a4a9d93ca0227d052a8286aab4ac8d0a089f52462b3000542fccec