Analysis

  • max time kernel
    7s
  • max time network
    10s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-03-2021 18:20

Errors

Reason
Machine shutdown

General

  • Target

    e28a0b40_extracted.exe

  • Size

    71KB

  • MD5

    db2da08dff1c398dc9690419cbe36673

  • SHA1

    a45d06df8f11bdb3ab10ec44ed4c9040fe154afe

  • SHA256

    9a463e6f526a181780da19ab9f569e1b1c131288c2d1ab18b3c18a656f9bf06d

  • SHA512

    5774296dd59362d6fc515aa58a1d05c5d232c8a0f3a08c34439947dc85080b9b7f697ca39f9439d5890a38d9cf385d13443b2ebdc7f6adbbacc2ed4d01bb0ea6

Malware Config

Signatures

  • Modifies WinLogon to allow AutoLogon 2 TTPs 1 IoCs

    Enables rebooting of the machine without requiring login credentials.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e28a0b40_extracted.exe
    "C:\Users\Admin\AppData\Local\Temp\e28a0b40_extracted.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Windows\SysWOW64\shutdown.exe
      shutdown.exe -r -f -t 0
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2548
    • C:\Windows\SysWOW64\shutdown.exe
      C:\Windows\System32\shutdown.exe -r -f -t 0
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2820
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0 /state0:0xa3ac8855 /state1:0x41c64e6d
    1⤵
    • Modifies WinLogon to allow AutoLogon
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:1912

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2548-2-0x0000000000000000-mapping.dmp
  • memory/2820-3-0x0000000000000000-mapping.dmp