Analysis

  • max time kernel
    61s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    26-11-2020 05:36

Errors

Reason
Machine shutdown

General

  • Target

    http://69.51.24.27/uploads/soft/boohbahshell.exe

  • Sample

    201126-hzbrj7cvc2

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon to allow AutoLogon 2 TTPs 1 IoCs

    Enables rebooting of the machine without requiring login credentials.

  • Drops file in Windows directory 2 IoCs
  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://69.51.24.27/uploads/soft/boohbahshell.exe
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1012 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1976
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3O0J2C38\boohbahshell.exe
      "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3O0J2C38\boohbahshell.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:1652
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:528
    • C:\Windows\system32\csrss.exe
      %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
      1⤵
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      PID:1932
    • C:\Windows\system32\winlogon.exe
      winlogon.exe
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        2⤵
        • Modifies WinLogon to allow AutoLogon
        • Suspicious use of AdjustPrivilegeToken
        PID:1308
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1972

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Winlogon Helper DLL

      2
      T1004

      Defense Evasion

      Modify Registry

      4
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3O0J2C38\boohbahshell.exe
        MD5

        94e0fdb02e15e6aa0cbb0d0241a79c8d

        SHA1

        fb2eae92ce3a5c8b558668db9ef5560451d6528d

        SHA256

        1e43c91ddfe9fab0e41657d423fe3c4fb87aad1993e5fb3f173bb36a268273f7

        SHA512

        341b1de271b3e861b4c9deb2a1d2a6a017e1ae0ca1700283f990385156ea9e3928d0a3a19f54ee97e0bb9a2765b8c670660c0a13695a520f2b79bfdc3eb953cd

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3O0J2C38\boohbahshell.exe.cr7uxdx.partial
        MD5

        94e0fdb02e15e6aa0cbb0d0241a79c8d

        SHA1

        fb2eae92ce3a5c8b558668db9ef5560451d6528d

        SHA256

        1e43c91ddfe9fab0e41657d423fe3c4fb87aad1993e5fb3f173bb36a268273f7

        SHA512

        341b1de271b3e861b4c9deb2a1d2a6a017e1ae0ca1700283f990385156ea9e3928d0a3a19f54ee97e0bb9a2765b8c670660c0a13695a520f2b79bfdc3eb953cd

      • memory/528-6-0x0000000002960000-0x0000000002961000-memory.dmp
        Filesize

        4KB

      • memory/528-8-0x00000000027A0000-0x00000000027A1000-memory.dmp
        Filesize

        4KB

      • memory/528-5-0x0000000002960000-0x0000000002961000-memory.dmp
        Filesize

        4KB

      • memory/1308-10-0x0000000000000000-mapping.dmp
      • memory/1652-3-0x0000000000000000-mapping.dmp
      • memory/1656-26-0x0000000001F00000-0x0000000001F01000-memory.dmp
        Filesize

        4KB

      • memory/1900-0-0x000007FEF7F80000-0x000007FEF81FA000-memory.dmp
        Filesize

        2.5MB

      • memory/1932-11-0x00000000003D0000-0x00000000003D2000-memory.dmp
        Filesize

        8KB

      • memory/1932-13-0x00000000003D0000-0x00000000003D2000-memory.dmp
        Filesize

        8KB

      • memory/1932-14-0x00000000003D0000-0x00000000003D2000-memory.dmp
        Filesize

        8KB

      • memory/1932-15-0x00000000003D0000-0x00000000003D2000-memory.dmp
        Filesize

        8KB

      • memory/1932-16-0x00000000003D0000-0x00000000003D2000-memory.dmp
        Filesize

        8KB

      • memory/1932-17-0x00000000003D0000-0x00000000003D2000-memory.dmp
        Filesize

        8KB

      • memory/1932-41-0x00000000003D0000-0x00000000003D2000-memory.dmp
        Filesize

        8KB

      • memory/1976-1-0x0000000000000000-mapping.dmp