Overview
overview
10Static
static
100706909124...af.exe
windows7-x64
100706909124...af.exe
windows10-2004-x64
10092a8a750e...b8.exe
windows7-x64
10092a8a750e...b8.exe
windows10-2004-x64
100b4363ea1b...c7.exe
windows7-x64
100b4363ea1b...c7.exe
windows10-2004-x64
101474031cf4...a5.exe
windows7-x64
101474031cf4...a5.exe
windows10-2004-x64
101c64423afe...82.exe
windows7-x64
101c64423afe...82.exe
windows10-2004-x64
1024754063ad...fb.exe
windows7-x64
1024754063ad...fb.exe
windows10-2004-x64
10262ab91f7f...5c.exe
windows7-x64
10262ab91f7f...5c.exe
windows10-2004-x64
102c6e778930...90.exe
windows7-x64
102c6e778930...90.exe
windows10-2004-x64
10313130ecff...14.exe
windows7-x64
10313130ecff...14.exe
windows10-2004-x64
103a142d0199...a1.exe
windows7-x64
103a142d0199...a1.exe
windows10-2004-x64
10473246aff3...2b.exe
windows7-x64
10473246aff3...2b.exe
windows10-2004-x64
10532651acde...62.exe
windows7-x64
10532651acde...62.exe
windows10-2004-x64
1054d317bff9...74.exe
windows7-x64
1054d317bff9...74.exe
windows10-2004-x64
10574c22b9ce...30.exe
windows7-x64
10574c22b9ce...30.exe
windows10-2004-x64
106d76abe8ee...21.exe
windows7-x64
106d76abe8ee...21.exe
windows10-2004-x64
1076f01f1de9...6d.exe
windows7-x64
376f01f1de9...6d.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 12:11
Behavioral task
behavioral1
Sample
07069091241215607c36cbe294255edb67c26fd27ebee8923c0d0e23fc0b7baf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07069091241215607c36cbe294255edb67c26fd27ebee8923c0d0e23fc0b7baf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
092a8a750e5d4aee2bae9207ee5cfcaad2db4224f93cc3efe52fb113a2808db8.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
092a8a750e5d4aee2bae9207ee5cfcaad2db4224f93cc3efe52fb113a2808db8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
0b4363ea1bbc55747d0c878125637bcf50aaeb4fc44b1b972c7b8daedc2512c7.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
0b4363ea1bbc55747d0c878125637bcf50aaeb4fc44b1b972c7b8daedc2512c7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1474031cf449fb6bc31aa6bb646941714610874a7663787f62a07d817b614ea5.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
1474031cf449fb6bc31aa6bb646941714610874a7663787f62a07d817b614ea5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
1c64423afe71c8539881c789518416a72ef8ee611727513e1f47c9c9154bb782.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
1c64423afe71c8539881c789518416a72ef8ee611727513e1f47c9c9154bb782.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
262ab91f7f3303121efe6ceec005edeabf80ebe5cfc53a807ae99b636597985c.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
262ab91f7f3303121efe6ceec005edeabf80ebe5cfc53a807ae99b636597985c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
2c6e7789308643ecb686566eba4753a825da5dab42e11fb207f8bbfa330f3990.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
2c6e7789308643ecb686566eba4753a825da5dab42e11fb207f8bbfa330f3990.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
313130ecff1098fa44652ff626976d22f759ada06900b3e1ea125f412bf90814.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
313130ecff1098fa44652ff626976d22f759ada06900b3e1ea125f412bf90814.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
3a142d0199bd1e8504b199948f5b2742fcd704316875051f5f8cc3e75d6a1da1.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
3a142d0199bd1e8504b199948f5b2742fcd704316875051f5f8cc3e75d6a1da1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
473246aff3e141d2fc390990fa13a49cf36f66a8ace5f230250e7035981e1f2b.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
473246aff3e141d2fc390990fa13a49cf36f66a8ace5f230250e7035981e1f2b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
532651acde43a5fb82a5c4de5c3dd9ef5809e5a75d52bb9af1c672c08e8c9062.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
532651acde43a5fb82a5c4de5c3dd9ef5809e5a75d52bb9af1c672c08e8c9062.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
54d317bff9681eb1d6bfd7691dd4096dd2bc4cc3a5a02be8f80aab623f349874.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
54d317bff9681eb1d6bfd7691dd4096dd2bc4cc3a5a02be8f80aab623f349874.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
574c22b9ce95cd6205f7ff6bab0e414c1e0d6bc26070819ce1c1ba0ccb710930.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
574c22b9ce95cd6205f7ff6bab0e414c1e0d6bc26070819ce1c1ba0ccb710930.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
6d76abe8ee33124ffde9dae2f6bccf7836b23ab3d0a92d9458b557c362c41e21.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
6d76abe8ee33124ffde9dae2f6bccf7836b23ab3d0a92d9458b557c362c41e21.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
76f01f1de9ec5556d4b90155924980e6783c41dc8a2d36c653f403418343496d.exe
Resource
win7-20240903-en
General
-
Target
24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe
-
Size
315KB
-
MD5
1300dd3d984b5b8292b91f9071c89330
-
SHA1
a8b5ed155d8d8b5cd4833d0243b3dc760a86a7aa
-
SHA256
24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb
-
SHA512
296c4a6fb660c888edf4260973989ccbfed22695a4efb61d5654d24f87a4a825e271bd6e5d996e241292d875cf3cbf62a4654c84f8013a74ed37352e5925bcd4
-
SSDEEP
3072:bZx8gJscuAnU+JYoutueXlL0NL6UkUkc/z58LfPEDod/2WggPqQX/mGV/vl:t2AsnAnUJoSqL6UHR/zu7OkzPr+WV
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\445:TCP = "445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" MusaLLaT.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\137:UDP = "137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" MusaLLaT.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\138:UDP = "138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" MusaLLaT.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List MusaLLaT.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile MusaLLaT.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts MusaLLaT.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\139:TCP = "139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" MusaLLaT.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" MusaLLaT.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "2" MusaLLaT.exe -
Ramnit family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" MusaLLaT.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" MusaLLaT.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" MusaLLaT.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\WINDOWS\system32\drivers\etc\hosts MusaLLaT.exe File opened for modification C:\WINDOWS\system32\drivers\etc\hosts MusaLLaT.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Sr\ImagePath = "\\SystemRoot\\system32\\DRIVERS\\sr.sys" MusaLLaT.exe -
Executes dropped EXE 3 IoCs
pid Process 788 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fbmgr.exe 3572 MusaLLaT.exe 4156 MusaLLaTmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 788 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fbmgr.exe 4156 MusaLLaTmgr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" MusaLLaT.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MusaLLaT = "C:\\Users\\Admin\\AppData\\Roaming\\MusaLLaT.exe" MusaLLaT.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" MusaLLaT.exe -
resource yara_rule behavioral12/memory/3164-0-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral12/memory/788-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral12/files/0x000b000000023b84-15.dat upx behavioral12/memory/3164-27-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral12/memory/3572-35-0x0000000000400000-0x00000000004BC000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 4852 788 WerFault.exe 83 2852 4156 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MusaLLaT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MusaLLaTmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fbmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3572 MusaLLaT.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 3164 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe Token: SeBackupPrivilege 3572 MusaLLaT.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3164 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 3572 MusaLLaT.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3164 wrote to memory of 788 3164 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 83 PID 3164 wrote to memory of 788 3164 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 83 PID 3164 wrote to memory of 788 3164 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 83 PID 3164 wrote to memory of 3572 3164 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 86 PID 3164 wrote to memory of 3572 3164 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 86 PID 3164 wrote to memory of 3572 3164 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 86 PID 3572 wrote to memory of 4156 3572 MusaLLaT.exe 87 PID 3572 wrote to memory of 4156 3572 MusaLLaT.exe 87 PID 3572 wrote to memory of 4156 3572 MusaLLaT.exe 87 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" MusaLLaT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe"C:\Users\Admin\AppData\Local\Temp\24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fbmgr.exeC:\Users\Admin\AppData\Local\Temp\24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fbmgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 788 -s 5523⤵
- Program crash
PID:4852
-
-
-
C:\Users\Admin\AppData\Roaming\MusaLLaT.exeC:\Users\Admin\AppData\Roaming\MusaLLaT.exe2⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3572 -
C:\Users\Admin\AppData\Roaming\MusaLLaTmgr.exeC:\Users\Admin\AppData\Roaming\MusaLLaTmgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 2164⤵
- Program crash
PID:2852
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 788 -ip 7881⤵PID:1672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4156 -ip 41561⤵PID:3744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fbmgr.exe
Filesize184KB
MD51d92c741bc5b2d34dcd0a0265ab54275
SHA1a160982825420567c15f6c11f777cb4ccbe69bb8
SHA2563aab3cf37efd4c034da13a0d7ba8725f49a21d227e05f3bba91d8d36350f4a67
SHA5121da728dba6383e0e9fc51370f8fb782a15e724b57b952d952e4c719f81d517a56035b1e9496da3d7f9bf79af0a4bd5caa8a351ca60f40d637da3648224944b94
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
315KB
MD51300dd3d984b5b8292b91f9071c89330
SHA1a8b5ed155d8d8b5cd4833d0243b3dc760a86a7aa
SHA25624754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb
SHA512296c4a6fb660c888edf4260973989ccbfed22695a4efb61d5654d24f87a4a825e271bd6e5d996e241292d875cf3cbf62a4654c84f8013a74ed37352e5925bcd4