Analysis

  • max time kernel
    6s
  • max time network
    9s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    08-11-2020 04:00

Errors

Reason
Machine shutdown

General

  • Target

    02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe

  • Size

    54KB

  • MD5

    cdb6e431b4eeb2909b1cf198f70ae444

  • SHA1

    98205803babd17587e99913934eb6975c3dc8779

  • SHA256

    02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df

  • SHA512

    c24c5b4c3d1b9355db8e82aa3c1c228e12b107c2f2ad76ac5e1ec62dda516cbe2237b1839547ff80e9059a3f2debc1cf07daf30dc3dad2b579aa4eddb9ba33a0

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon to allow AutoLogon 2 TTPs 1 IoCs

    Enables rebooting of the machine without requiring login credentials.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe
    "C:\Users\Admin\AppData\Local\Temp\02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Users\Admin\AppData\Local\Temp\EyeCry.exe
      "C:\Users\Admin\AppData\Local\Temp\EyeCry.exe"
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Windows\SysWOW64\shutdown.exe
        shutdown.exe -r -f -t 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2192
      • C:\Windows\SysWOW64\shutdown.exe
        C:\Windows\System32\shutdown.exe -r -f -t 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2824
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0 /state0:0xa3ad1055 /state1:0x41c64e6d
    1⤵
    • Modifies WinLogon to allow AutoLogon
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2592

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\EyeCry.exe
    MD5

    89aa34d7e47e5eaf4fca900c8b512f4f

    SHA1

    e91e288a5279a981759e1574fbba672c5cd0a6c0

    SHA256

    be382041837eb1dfd57227858359a56ecd4be9a5902b399bb684c9c7d9606f15

    SHA512

    f05058b4320799ec2ec1fc9c6224da71e390b36c2c8394b9924ff9889e8f72165823d327aaa130b0c1c9e1a43c8bcf7a086ae4059c94647b66e53d653c8c83e6

  • C:\Users\Admin\AppData\Local\Temp\EyeCry.exe
    MD5

    89aa34d7e47e5eaf4fca900c8b512f4f

    SHA1

    e91e288a5279a981759e1574fbba672c5cd0a6c0

    SHA256

    be382041837eb1dfd57227858359a56ecd4be9a5902b399bb684c9c7d9606f15

    SHA512

    f05058b4320799ec2ec1fc9c6224da71e390b36c2c8394b9924ff9889e8f72165823d327aaa130b0c1c9e1a43c8bcf7a086ae4059c94647b66e53d653c8c83e6

  • memory/2076-0-0x0000000000000000-mapping.dmp
  • memory/2192-3-0x0000000000000000-mapping.dmp
  • memory/2824-4-0x0000000000000000-mapping.dmp