Analysis

  • max time kernel
    104s
  • max time network
    106s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-03-2021 13:35

Errors

Reason
Machine shutdown

General

  • Target

    http://www.google.com

  • Sample

    210304-p2bxm12evs

Score
8/10

Malware Config

Signatures

  • Modifies WinLogon to allow AutoLogon 2 TTPs 1 IoCs

    Enables rebooting of the machine without requiring login credentials.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://www.google.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4020 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:644
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0 /state0:0xa3ad1055 /state1:0x41c64e6d
    1⤵
    • Modifies WinLogon to allow AutoLogon
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2152

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    9173ad367e52c7cc6deedbe67a402bb2

    SHA1

    52279887831a56dc2e8b667afb8b31133fa44bab

    SHA256

    1cf9ad347bf1fa48791e724498a9625ac1e8261a026e633777a13c9a4dc0784e

    SHA512

    adff34450cca746aaa1b9daed0b9006d959618bd40d7ddcc74d2e7dfd1c6e05a4f42ed1b6829f741a9db9acd1d3808ef09ccf666386f16a7d9184f6210ab1908

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_026B72F26B1094C30A55CD164E2E6B02
    MD5

    c13b39b44c8fd1581cbb88328f50ad5c

    SHA1

    e9650e335e4d7b2c3b5f7ab4cb5fa52c0bcb5e27

    SHA256

    73ab1ebff370a93a7f0ccc5af227532ba4f25b609e9f04461c76dd5007fe9182

    SHA512

    e9d77ebc660dea5c309c2503463f743ea2fbca2c66e1d82a4f9827779c2c87861e6bd9968f0cbf90f8823fcb4d3f0232f8d2c2ccd656000e5b9e6ac76081a547

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_89435FC99EE99DE539EA4AC53DF8831C
    MD5

    8416b69b3d1f99dad0bfc548cd01b635

    SHA1

    c2b870fc83b3676d26a5214f9fdca5324e5918c1

    SHA256

    e7ac1b092ff04e8af7b04fc9278cc3eb8d35be9bec90b194b61f645e8169f53c

    SHA512

    1ac1a7c3c4b56f64e01bbe2d0e365d39f3cd8bdb92fda8a1a55dfd60c5a61dae78ff7b076541b713a297356a3f876f4549e73d962b954054665bde07d91944d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B
    MD5

    48d7b88f7986388169c9f46bd8d48050

    SHA1

    f34113edae5d2fe7046d9250a019bc19cf6534cc

    SHA256

    679a3247b5f50991c3aef6f491cd5a5b0c55f11693a886f6a7cfed811f108cc8

    SHA512

    fb43568a8419777a45ebf4a6325e3c256ce0c464fc9ecb88fd924709aa0ab2b631c027fc258e66e1fc5616f4d252029d926d31b29c445c8af31e4aa70fb0d21c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    587cf0a8e02c3ed6641f20ed4e99f1fe

    SHA1

    3d2074e90faffecef6aea14fed5188e7d5a47e87

    SHA256

    881f3051a3760f1f5506d3a0bec6e244202c6d81fa5ff97c51320c3e1d402842

    SHA512

    0c62f29bc095f8af656c87853a9096a47fd121b13ea4955f79242bbd60f636941cfb8b4b20b9d666ed4452f0965b1951446d69751eba3a36a27edf3897d64fe5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CC197601BE0898B7B0FCC91FA15D8A69_026B72F26B1094C30A55CD164E2E6B02
    MD5

    6672caba07facc978578b48c878e2cb7

    SHA1

    ae9392342371106c8435a2e201602237f2e33482

    SHA256

    c8f376b6212b6d028bf15ed88070c4038015e862c0767eebe3a268b993324ca5

    SHA512

    90982d352f1541e67e6fc093a86412e59bcfabf66552c89d9625c270a65e0411ffcf95a2a6b8fa48e7f8698f8166ed26ae063f9db181b64db905b8ed9dcd441c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CC197601BE0898B7B0FCC91FA15D8A69_89435FC99EE99DE539EA4AC53DF8831C
    MD5

    d73cb6b134fc0a795475d5a47bc3d4b2

    SHA1

    48b114edcc458da81010f6e3a064cecd4d11be42

    SHA256

    fd99eddf4196bf25f9c3f904de16af0c480483aab6b4d3e0a635c8c3ededb0c3

    SHA512

    1b545d6549c1057e602fd09473ff6497427417a31fb9ab0d9856453c76c0d42db422c3b92b2a0cb1026b0a122b317e6c11743ac6003179c7f1a046f58d9f0351

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B
    MD5

    e3c36779e7f1ff6f6fc84916d643d87e

    SHA1

    7e229ba7e5cadf3762c9c3660300f5b3cd9b1503

    SHA256

    1ee7b92760fb53bbb5a249293914e3eae48b194616502f84ac5830d01df3ba4d

    SHA512

    323927bb902818d210c3ebf74d58de29908db3318638d82cd2a3008fd6e34b26ad5e7d64ea7af998030b0a0eb82a827bd2840844b164135a8f47ff0e6c84ad78

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\55D64KGT.cookie
    MD5

    7541c612e7c1a5935b8a5d5cc0660375

    SHA1

    55af510cf4d02ee5e4a11e84b4055782f1809777

    SHA256

    f479b61f41bc0be20ce87da4ad117bb11759f0fd6b29adc8a90a6cd8438b6930

    SHA512

    7b5dd3dc491d31e33de2c7b488d78b9a3b4a2eb810c52a0d645d8b1dc6ed0e88c2da31b6ce9c88105ae7bc199b260707ba39ccb51a1862c74a6e0e9a5b091805

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\6UNKNZ15.cookie
    MD5

    0becd00d48025b319cbf91267bf7e5c7

    SHA1

    f12a790d3fc8ff738ae6066347afa03eb6011ab1

    SHA256

    8c2137f92131b4c3806dce7446bc340c8a18858006629d4ea5453e1d71d59b31

    SHA512

    df711f7df51e34615ecbedf6ad96b4057fdc7ff86259470dd8537bf6d28df969c05e6d95e6ab7430764e0aaf7e25d80fb04803b6d0b2f86eb8d06142b57a9964

  • memory/644-2-0x0000000000000000-mapping.dmp