Resubmissions

17-01-2021 17:17

210117-b2cpxhh15x 8

07-01-2021 16:41

210107-w4e2crkbb6 8

Analysis

  • max time kernel
    39s
  • max time network
    42s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    17-01-2021 17:17

Errors

Reason
Machine shutdown

General

  • Target

    VTPatcher.exe

  • Size

    123KB

  • MD5

    887f4256e86487df513fc0f91f5e6cb7

  • SHA1

    892ca49a0108af495a31fd6d225915d62ec2d136

  • SHA256

    e6cd1af91356aeab2550acec945681ed5e82eb9660936b4f4e73509c0c602aae

  • SHA512

    123c19f36c19b93f216a56b394fd4c4ffaf1ae18438b8d916e5278d5355b7b20a9a7f12f56dacd6d741932ef5d036304b966aa93f540578f177961453e229915

Score
8/10

Malware Config

Signatures

  • Modifies WinLogon to allow AutoLogon 2 TTPs 1 IoCs

    Enables rebooting of the machine without requiring login credentials.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VTPatcher.exe
    "C:\Users\Admin\AppData\Local\Temp\VTPatcher.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2092
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0 /state0:0xa3ad1855 /state1:0x41c64e6d
    1⤵
    • Modifies WinLogon to allow AutoLogon
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2812

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2092-2-0x00007FFFD26D0000-0x00007FFFD30BC000-memory.dmp
    Filesize

    9.9MB

  • memory/2092-3-0x0000000000400000-0x0000000000401000-memory.dmp
    Filesize

    4KB

  • memory/2092-5-0x0000000000840000-0x0000000000841000-memory.dmp
    Filesize

    4KB

  • memory/2092-6-0x00000000026D0000-0x00000000026D2000-memory.dmp
    Filesize

    8KB