Analysis

  • max time kernel
    23s
  • max time network
    27s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    19-07-2020 19:44

Errors

Reason
Machine shutdown

General

  • Target

    chthonic_2.23.18.27.vir.exe

  • Size

    848KB

  • MD5

    652ddd26bb95583bfceddba3f0813b9a

  • SHA1

    1ff3e9c230a345813b0848d911d80e2150b2df10

  • SHA256

    f4dfc047ed766b96a6de718ea96fefee921556caa4ce6171fbe407284cbba2f3

  • SHA512

    47cbbdce287047f7641c091e818c150c5de44f9ee6adee89c73b35d6b3b5d4feb8a1e49e1298768bf5831b489b025827b1ac25711f3da1de280d0c735da983da

Malware Config

Signatures

  • Modifies WinLogon to allow AutoLogon 2 TTPs 1 IoCs

    Enables rebooting of the machine without requiring login credentials.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 522 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\chthonic_2.23.18.27.vir.exe
    "C:\Users\Admin\AppData\Local\Temp\chthonic_2.23.18.27.vir.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Adds Run key to start application
    PID:3576
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0 /state0:0xa3acd855 /state1:0x41c64e6d
    1⤵
    • Modifies WinLogon to allow AutoLogon
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2784

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads