Analysis

  • max time kernel
    8s
  • max time network
    10s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    19-07-2020 19:26

Errors

Reason
Machine shutdown

General

  • Target

    chthonic_2.23.17.1.vir.exe

  • Size

    151KB

  • MD5

    aba6f9b372254cf34879ddc5283927c9

  • SHA1

    f5724a63620621be8930972897da28c088547706

  • SHA256

    3ba80718b5c68cf563db5bcda51606472b0b1e7bd52f9698383068cb935aad99

  • SHA512

    a27be560684162fa3b315c6f7e90435c2e76a35a16e4e004d304d8569c4f22e56fa8711e12ea170e99592ba5f8715a2e26455bf7bc800d85e4aa7e96c87b9ede

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 14 IoCs
  • Deletes itself 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Disables taskbar notifications via registry modification
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 23 IoCs
  • Modifies WinLogon to allow AutoLogon 2 TTPs 1 IoCs

    Enables rebooting of the machine without requiring login credentials.

  • Modifies service 2 TTPs 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Loads dropped DLL 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\chthonic_2.23.17.1.vir.exe
    "C:\Users\Admin\AppData\Local\Temp\chthonic_2.23.17.1.vir.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: GetForegroundWindowSpam
    • Loads dropped DLL
    PID:380
    • C:\Windows\SysWOW64\msiexec.exe
      C:\Windows\system32\msiexec.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      • Deletes itself
      • Checks for any installed AV software in registry
      • Checks whether UAC is enabled
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Modifies service
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Adds Run key to start application
      • Loads dropped DLL
      • System policy modification
      PID:2312
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\2MozillaMaintenanceService\2MozillaMaintenanceService.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4036
        • C:\Users\Admin\AppData\Roaming\2MozillaMaintenanceService\2MozillaMaintenanceService.exe
          C:\Users\Admin\AppData\Roaming\2MozillaMaintenanceService\2MozillaMaintenanceService.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          • Suspicious behavior: GetForegroundWindowSpam
          • Loads dropped DLL
          • Executes dropped EXE
          PID:3832
          • C:\Windows\SysWOW64\msiexec.exe
            C:\Windows\system32\msiexec.exe
            5⤵
            • Loads dropped DLL
            PID:3868
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0 /state0:0xa3ac7055 /state1:0x41c64e6d
    1⤵
    • Modifies WinLogon to allow AutoLogon
    • Suspicious use of SetWindowsHookEx
    • Modifies data under HKEY_USERS
    PID:3912

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

5
T1112

Discovery

Security Software Discovery

1
T1063

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\2MozillaMaintenanceService\2MozillaMaintenanceService.exe
  • C:\Users\Admin\AppData\Roaming\2MozillaMaintenanceService\2MozillaMaintenanceService.exe
  • \Users\Admin\AppData\Local\Temp\9A0.tmp
  • \Users\Admin\AppData\Local\Temp\E62.tmp
  • \Users\Admin\AppData\Local\Temp\F646.tmp
  • \Users\Admin\AppData\Local\Temp\FCDE.tmp
  • memory/2312-1-0x0000000000000000-mapping.dmp
  • memory/3832-4-0x0000000000000000-mapping.dmp
  • memory/3868-8-0x0000000000000000-mapping.dmp
  • memory/4036-3-0x0000000000000000-mapping.dmp