Analysis

  • max time kernel
    110s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-12-2024 23:32

Errors

Reason
Machine shutdown

General

  • Target

    Sigma boy.exe

  • Size

    839KB

  • MD5

    5ff4807e24e3435c8e2d88be60086109

  • SHA1

    3724453097aa75f412094aa9d72d53be07e99ef6

  • SHA256

    227befcbc16bcd69e4f1b9b634492eba0c952e06b9ed94b199edce3804b84f51

  • SHA512

    0f4a80c5e26b87bb5223d509111c9401ce763fd4f5bfb845ef8cbfde1bfbe0e71c33bc594b4a842948fca731b02a106e138eaec017505bab6b8a454303d71032

  • SSDEEP

    24576:BpS04YNEMuExDiU6E5R9s8xY/2l/dmtnIbt+rP:BL4auS+UjfU2TmdIbt+r

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Modifies WinLogon 2 TTPs 3 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Sigma boy.exe
    "C:\Users\Admin\AppData\Local\Temp\Sigma boy.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:512
    • C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Users\Admin\AppData\Local\Temp\rizzler.exe
        "C:\Users\Admin\AppData\Local\Temp\rizzler.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Modifies WinLogon
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • System policy modification
        PID:4716
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa3998055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:1324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rizzler.exe

    Filesize

    666KB

    MD5

    989ae3d195203b323aa2b3adf04e9833

    SHA1

    31a45521bc672abcf64e50284ca5d4e6b3687dc8

    SHA256

    d30d7676a3b4c91b77d403f81748ebf6b8824749db5f860e114a8a204bca5b8f

    SHA512

    e9d4e6295869f3a456c7ea2850c246d0c22afa65c2dd5161744ee5b3e29e44d9a2d758335f98001cdb348eaa51a71cd441b4ddc12c8d72509388657126e69305

  • C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe

    Filesize

    839KB

    MD5

    5ff4807e24e3435c8e2d88be60086109

    SHA1

    3724453097aa75f412094aa9d72d53be07e99ef6

    SHA256

    227befcbc16bcd69e4f1b9b634492eba0c952e06b9ed94b199edce3804b84f51

    SHA512

    0f4a80c5e26b87bb5223d509111c9401ce763fd4f5bfb845ef8cbfde1bfbe0e71c33bc594b4a842948fca731b02a106e138eaec017505bab6b8a454303d71032

  • C:\Users\Public\Desktop\ಹ⺗ࢡ⡯Ꮗᔞᴌᘛᣳފ⒀⪎ᕴ਀∤ৢ

    Filesize

    666B

    MD5

    e49f0a8effa6380b4518a8064f6d240b

    SHA1

    ba62ffe370e186b7f980922067ac68613521bd51

    SHA256

    8dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13

    SHA512

    de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4

  • memory/512-0-0x0000000074832000-0x0000000074833000-memory.dmp

    Filesize

    4KB

  • memory/512-1-0x0000000074830000-0x0000000074DE1000-memory.dmp

    Filesize

    5.7MB

  • memory/512-2-0x0000000074830000-0x0000000074DE1000-memory.dmp

    Filesize

    5.7MB

  • memory/512-18-0x0000000074830000-0x0000000074DE1000-memory.dmp

    Filesize

    5.7MB

  • memory/1900-24-0x0000000074830000-0x0000000074DE1000-memory.dmp

    Filesize

    5.7MB

  • memory/1900-21-0x0000000074830000-0x0000000074DE1000-memory.dmp

    Filesize

    5.7MB

  • memory/1900-25-0x0000000074830000-0x0000000074DE1000-memory.dmp

    Filesize

    5.7MB

  • memory/1900-20-0x0000000074830000-0x0000000074DE1000-memory.dmp

    Filesize

    5.7MB

  • memory/1900-19-0x0000000074830000-0x0000000074DE1000-memory.dmp

    Filesize

    5.7MB

  • memory/1900-216-0x0000000074830000-0x0000000074DE1000-memory.dmp

    Filesize

    5.7MB

  • memory/4716-37-0x0000000000400000-0x00000000005CC000-memory.dmp

    Filesize

    1.8MB

  • memory/4716-38-0x00000000005C6000-0x00000000005C7000-memory.dmp

    Filesize

    4KB

  • memory/4716-215-0x0000000000400000-0x00000000005CC000-memory.dmp

    Filesize

    1.8MB