Resubmissions

29-01-2025 21:28

250129-1bpz8symhn 6

29-01-2025 21:23

250129-z8jn2szmat 1

29-01-2025 21:20

250129-z63zxazlf1 1

Analysis

  • max time kernel
    216s
  • max time network
    202s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29-01-2025 21:28

General

  • Target

    42.zip

  • Size

    41KB

  • MD5

    1df9a18b18332f153918030b7b516615

  • SHA1

    6c42c62696616b72bbfc88a4be4ead57aa7bc503

  • SHA256

    bbd05de19aa2af1455c0494639215898a15286d9b05073b6c4817fe24b2c36fa

  • SHA512

    6382ca9c307d66ab7566acf78b1afd44b18b24d766253e1dc1cb3a3c0be96ecf1f2042d6bd3332d49078ffee571cf98869c1284c1d3e5c1c7dc3e4c64f71af80

  • SSDEEP

    768:hzyVr8GSKL6O3QOXk/0u3wqOghrFCezL1VFJdbq2QTJTw02Q:hGx8DKXE//ZhhCirFi2cwK

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\42.zip
    1⤵
      PID:2348
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3348
    • C:\Windows\system32\SearchIndexer.exe
      C:\Windows\system32\SearchIndexer.exe /Embedding
      1⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4508
      • C:\Windows\System32\SearchProtocolHost.exe
        "C:\Windows\System32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
        2⤵
        • Modifies data under HKEY_USERS
        PID:5032
      • C:\Windows\system32\SearchFilterHost.exe
        "C:\Windows\system32\SearchFilterHost.exe" 836 2716 2732 820 {0E5DCEC5-7795-4E38-9621-94DFD9F9A421}
        2⤵
          PID:3460
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 836 2764 2700 820 {85EE815A-7738-4808-A14A-3AD87E32A3BF}
          2⤵
            PID:1968
        • C:\Program Files\7-Zip\7zG.exe
          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap30889:62:7zEvent10547
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1240
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:4992
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:1096
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:1608
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:980
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2920
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:5044
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3184
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:1312
          • C:\Windows\system32\dwm.exe
            "dwm.exe"
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:1848
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x0 /state0:0xa3a2f855 /state1:0x41c64e6d
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of SetWindowsHookEx
            PID:4948
          • C:\Windows\system32\AUDIODG.EXE
            C:\Windows\system32\AUDIODG.EXE 0x00000000000004B8 0x00000000000004E4
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2968
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:2496

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

              Filesize

              10KB

              MD5

              327975ba2c226434c0009085b3702a06

              SHA1

              b7b8b25656b3caefad9c5a657f101f06e2024bbd

              SHA256

              6fa9064f304b70d6dcebee643ca017c2417ff325106917058f6e11341678583c

              SHA512

              150a57c143fc5ff2462f496f5a9451310b8d99e32c4d570641204c8062a78590f14bed438ac981e8b0609a0c87b859a1f8502a78687bc36c3a9529d633a58e51

            • C:\Users\Admin\Desktop\lib 2.zip

              Filesize

              34KB

              MD5

              0a76bd3e26768bba68aca3d210997069

              SHA1

              753690994a18cf58ed0fe3749d16448b763047b8

              SHA256

              9056b87f079861d1b0f041317d6415927d9ffb6498ce2530ff90fda69fa64e78

              SHA512

              14408ea7f44bc365a58d7480fff9ea3b10fa21bfbd3363c6e30b74a4d4121677e20ce1108cce12c203f0760768aee1c1aa69b130e090c409f9a516ea02d70c49

            • memory/3460-57-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-49-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-69-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-44-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-71-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-46-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-47-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-58-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-48-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-59-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-53-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-54-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-52-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-51-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-55-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-56-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-45-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-72-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-50-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-60-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-61-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-62-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-64-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-63-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-65-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-66-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-68-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-67-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-70-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/3460-73-0x000001BD6EFD0000-0x000001BD6EFE0000-memory.dmp

              Filesize

              64KB

            • memory/4508-38-0x000001CC11530000-0x000001CC11538000-memory.dmp

              Filesize

              32KB

            • memory/4508-22-0x000001CC0CF70000-0x000001CC0CF80000-memory.dmp

              Filesize

              64KB

            • memory/4508-42-0x000001CC12500000-0x000001CC12508000-memory.dmp

              Filesize

              32KB

            • memory/4508-6-0x000001CC0CD40000-0x000001CC0CD50000-memory.dmp

              Filesize

              64KB