Analysis

  • max time kernel
    355s
  • max time network
    370s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    22-11-2020 06:28

Errors

Reason
Machine shutdown

General

  • Target

    chrome-assests/img-4.svg.xml

  • Size

    666B

  • MD5

    77fd42086aef0f6ac1629be6f939a17f

  • SHA1

    86ac79b75c39e85da4598785e4394102cfda60e2

  • SHA256

    da1d9c7852bb6ffd74973e6ea5c0a80d117289233a96f5572a19b6d7b7d1c9cd

  • SHA512

    a13b08e9ee4a269b147ad9f3bc2687898482d88dac664e9bf256cfa3e3e055bdf3b4428e2762ea5844fffc1761f88c4089a0fa7b00c613ca360ce70310992015

Score
8/10

Malware Config

Signatures

  • Modifies WinLogon to allow AutoLogon 2 TTPs 1 IoCs

    Enables rebooting of the machine without requiring login credentials.

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\chrome-assests\img-4.svg.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\chrome-assests\img-4.svg.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4260
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4260 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3892
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0 /state0:0xa3ad3055 /state1:0x41c64e6d
    1⤵
    • Modifies WinLogon to allow AutoLogon
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4516

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
    MD5

    4fd1154dbee8bda008d2a2ff53240855

    SHA1

    29913132808f93bb89583082786ca080b6609a1f

    SHA256

    f0643a2bc9668f5378bb84f7302b925073d18374648e1d33624c88c149b9370d

    SHA512

    62739cb9df68299ee11ebbbcded36a7cc821d8a3b08e1fa0e84969340338e904feb320079e0dc10a8cd3fce33ffbe21dff569333a801aa8edbf776fb4285b235

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
    MD5

    2b633aba4ee98bf3d7f6ddf12d75f823

    SHA1

    9a0d133efcf925ef2f5a36452bbf302fd5bfcb2c

    SHA256

    83d04d97b184f6ce3b4138bfedfb3d45b6582f32e5f4c3c7444cb41a8ec282d6

    SHA512

    39112dcbfab2998bafe7564bb71bce836ccb683feb0d1eb29a47cc357a4fb7eb831828261948f4c4870fd45dcf40a59d29017bb4b64889485813527c02fab8be

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\9Q0H4LNK.cookie
    MD5

    e2855efca0e257dc52ebae1047f7763e

    SHA1

    41867ca6ba079f90510f9a7a788dc3dbe3bed39c

    SHA256

    e8bb356310a1c1eaf6a3e44f929584222e92080f77837beaa6cdc53a86587747

    SHA512

    ab4417febdd12267b9f5646002c72026d5c2c0a6a269ffd121d0db6f5ace544753f66cd4dfbedfc2de428a38356e6c4e96dc6a54c6469148505c898150de3665

  • memory/3892-1-0x0000000000000000-mapping.dmp
  • memory/4260-0-0x0000000000000000-mapping.dmp