Analysis
-
max time kernel
66s -
max time network
67s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
05-03-2021 02:17
Static task
static1
Behavioral task
behavioral1
Sample
gen.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
gen.exe
Resource
win10v20201028
Errors
General
-
Target
gen.exe
-
Size
7.1MB
-
MD5
ac5874a4074d3f6daf8717e16476e355
-
SHA1
52fa45d972da9a90d725839654b1b6d05e13bf5f
-
SHA256
519a5e542e845e29039e769973ed337c6b5253dcd31e92cf63df7a22e916ee5d
-
SHA512
b62c53e2efb8db4ffed44983e68ed0a2c47be65ee31b814f6d74e6b636335ad170151bf49849dcd5544c435a2385c8e44d1c1287b4f424c0f7d99fd190969e5d
Malware Config
Signatures
-
Modifies WinLogon to allow AutoLogon 2 TTPs 1 IoCs
Enables rebooting of the machine without requiring login credentials.
Processes:
LogonUI.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AutoLogonChecked LogonUI.exe -
Loads dropped DLL 16 IoCs
Processes:
gen.exepid process 2784 gen.exe 2784 gen.exe 2784 gen.exe 2784 gen.exe 2784 gen.exe 2784 gen.exe 2784 gen.exe 2784 gen.exe 2784 gen.exe 2784 gen.exe 2784 gen.exe 2784 gen.exe 2784 gen.exe 2784 gen.exe 2784 gen.exe 2784 gen.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 5 api.ipify.org -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
LogonUI.exepid process 3084 LogonUI.exe 3084 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
gen.exedescription pid process target process PID 1144 wrote to memory of 2784 1144 gen.exe gen.exe PID 1144 wrote to memory of 2784 1144 gen.exe gen.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\gen.exe"C:\Users\Admin\AppData\Local\Temp\gen.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\gen.exe"C:\Users\Admin\AppData\Local\Temp\gen.exe"2⤵
- Loads dropped DLL
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3ad3055 /state1:0x41c64e6d1⤵
- Modifies WinLogon to allow AutoLogon
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\VCRUNTIME140.dllMD5
7942be5474a095f673582997ae3054f1
SHA1e982f6ebc74d31153ba9738741a7eec03a9fa5e8
SHA2568ee6b49830436ff3bec9ba89213395427b5535813930489f118721fd3d2d942c
SHA51249fbc9d441362b65a8d78b73d4fdcf988f22d38a35a36a233fcd54e99e95e29b804be7eabe2b174188c7860ebb34f701e13ed216f954886a285bed7127619039
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\_asyncio.pydMD5
3a5fbfdc3091114488bc30cc1873365b
SHA1a4da519a41ce499430f5fea6f731f59b41e8031d
SHA256a055e2b17cba4199b48db6848e44543399870958f49b1afce10534c46298ef2a
SHA51200e08a09f7124e3e300a834796cc106ce07f8801749dc2ce451d5397ed822c2b3c602c20344b44c608c4fc0048cac6897748daab91d80a1be877a9c44e531dc1
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\_bz2.pydMD5
5a8b3602b3560868bd819b10c6343874
SHA173a5ce4d07479894f24b776eb387abd33deb83a9
SHA25600d2f34aee55b473bcc11838469b94a62d01fdf4465e19f7d7388c79132f019e
SHA5122f2f8305fd8853c479b5d2a442110efc3ad41a3c482cd554ebcc405fcf097e230f5cd45dbfb44050b5bd6fae662ce7cac0583c9784050f0c7d09a678768587db
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\_ctypes.pydMD5
e1ef9f5c77b01c82cf72522ec96b2a11
SHA1e83daa56a104f6ea6235822c644b6554c3958cfe
SHA256a79cf8259890d5843cf8eaf29db8dbd4bfabed50f4d859756f93ac2b30617023
SHA5124231ec5b06effae6497bf62853b79420529cabaee6b58f519c3c30bdd42c925e85979c29c2db0747dcff3f99f3b19dc02ece96347e08cf49eb0abb1e19238c01
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\_hashlib.pydMD5
8f7edaff246c46dbf09ab5554b918b37
SHA1c14c33b14419f5d24fb36e5f1bf1760a9c63228b
SHA2569154b36c178d84a901edad689a53148451ef3c851a91447a0654f528a620d944
SHA5121947a1010fa1b07671aa471d5821792dee7f2b0cd1937d3f944cd0201a299e6cb37a41debbbd1bc6e774186f6d08ad6264055cba7652b0d5bd22691431cb360e
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\_lzma.pydMD5
caa58290ab4414e2e22cc0b6ff4b2d29
SHA1840902aaf7db40da17018776e5c842014c3a81ac
SHA256185d407bcca7399c458133f2ce1efa938352b8093b2de040c91c3c3088ab173f
SHA512a82e380ab1676424e52a36c08eabd572375dd36a7fe2b9df51d48c368aed6c04b0b3674bc6a9787efedd0ed70bb1869ed1a2f3a1f4238485710092b9cbadd00e
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\_overlapped.pydMD5
60af9df3c5d25c193d73a566e763b0b8
SHA1a87c3285ff6f59528611f42577d30dbf35827b45
SHA256c63632bf1b28f7f1007ff093a9ef3d034cb9480fc373c29e06a407b223b6ddff
SHA51257c33929ec284013e88696ab7c099d570d0211d99f8e2027f1d8db9ae66810ccba6992959a2d543929f59bfc67cc4d1cc9264046e02df9cd119c3b1d2ec41a20
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\_queue.pydMD5
671a9ac9b34f07ada65bf1635e4626c5
SHA1d4a6e478caaacdbdb52f57d12e16ba96671d30f2
SHA2563f1fc09b3f0a5c8c7aff4223d002952ab26f462aa390940a9f00454815204739
SHA51292617258ef747f93ab2c378f5c9a2aac14668d834df15939c1ef83a555490b9ee3380d7341bee60c33057482736a595593749b8794ddeaa9649339363095108c
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\_socket.pydMD5
e71c0c49f7e2bd39cafeed1dca29455b
SHA122cb314298c6c38e3246f73dc7277ed00d6b8449
SHA2563b0ea76a2b0caabf5b8994d3789778575ecbf2831acaf4d53d274e265d271622
SHA5124c09599c7c93427b30a011cc39738983c79f0835292e5c0e7e19f6329f33810773d0e97e20f4698d22b6d0b8b643521bc3ce318c890366872ed26b6d3dab5c05
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\_ssl.pydMD5
39919e97dc418e0099b2a0bb332a8c77
SHA1f04c9d78b3d5e2a95ea3535c363d8b05d666d39e
SHA256b38b09bf0421b1f49338ded8021d7bc56be19902d9b21a9b6e9c8df448f93eb2
SHA512f179ebe84ae065ed63e71f2855b2b69cdedfc8be70dace0eb07c8b191768eace1312562e27e77492481f214f85d31f35c88c2b1f7a3881cee9dffffa7ffc668a
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\base_library.zipMD5
b25db1aac0ccef2f3756108a24ab0b05
SHA1005cfeca6cb736710c3b315649ce3d3d6bf66c13
SHA256a69690c30dd01dfb45a280be762d812907190b30d4edc4d368c7e178e58b579f
SHA5125e296f5bc45dd78d9ac91151421b920dbc2bf01256d22dbf14b2e1a0e96ba18cc4cf4e1139f0c2373c6a9e4e4716893b48a29f1c4549efbd71bc92b49e4ab2e3
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\certifi\cacert.pemMD5
1ba3b44f73a6b25711063ea5232f4883
SHA11b1a84804f896b7085924f8bf0431721f3b5bdbe
SHA256bb77f13d3fbec9e98bbf28ac95046b44196c7d8f55ab7720061e99991a829197
SHA5120dd2a14331308b1de757d56fab43678431e0ad6f5f5b12c32fa515d142bd955f8be690b724e07f41951dd03c9fee00e604f4e0b9309da3ea438c8e9b56ca581b
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\libcrypto-1_1.dllMD5
aa811bb63dbd4c5859b68332326f60b1
SHA16e5584d5c59d2f79cbf60c6c71a92ecd7e4e0977
SHA25600a1eeb37372d11559bf44c9e68af9c841c41c95a173f3dfec4e0b5923d0cae0
SHA512dad9b14f501fd63824480f8801acd4004dd46f7a6965ac8ab91e573676236a11099f4b7cfdf7b3f6c0cc52a3b2e5d9b50f715f53a1f4f858ea2a5eb15d5092cd
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\libffi-7.dllMD5
eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\libssl-1_1.dllMD5
2335285f5ac87173bd304efeddfa1d85
SHA164558d2150120abed3514db56299721c42c6fe58
SHA2561b57a201184559164dedbddcb43bb110a18cafa19ea3d00fc23274ccfc420e94
SHA51282737590d5ec7315ce8485c4794c01bfcce176ce443740a9f0cf5adfc3c3ed31a714556d33c1ca56db486636111d1ad855f606c87e5f322a505c535187ce2bde
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\python39.dllMD5
088904a7f5b53107db42e15827e3af98
SHA11768e7fb1685410e188f663f5b259710f597e543
SHA2563761c232e151e9ceaf6c7d37b68da3df1962e3106e425cc3937d1f60170f3718
SHA512c5edc25fd9a37673f769af1a1fd540b41e68351bc30b44bc83a1d0d4a8fb078888bbb31173a77ef47698631c9816bc05637b499c20d63e3d65457d9aa4bc2c6b
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\select.pydMD5
1e74ba085eb08a3affe5f5fabaaa6caf
SHA146e3efbd21dc0a2c7650ed949bc7e7e91b37efea
SHA25636be2a85c1989dc171bde986950b81d3e9cda21f1d1bf2f81f7fe15ffefad511
SHA512517a109490c3724a630a85471e28ff3c4f96c9810b96f5baa9b66473ef59ed4055e331c8da064a53bc12892fb674f417b3485e96f16015e1437cbd2ca67e87d8
-
C:\Users\Admin\AppData\Local\Temp\_MEI11442\unicodedata.pydMD5
06092dbacf3b009ad11376dfc5ed2acd
SHA12597d23469d65936fca20906ef41e1f999944210
SHA2562f9e76a8148029ade3e8f61d014d79a9b1c154cc9b5d6608f50fc478170ff676
SHA512c782ebb9139a6b358d6e55cca3f018e421747984245fafbd150696b152763f2a6d08a21a0185f49df867dfabf5f066631a55f324abfed4e8bece8f85ead81c85
-
\Users\Admin\AppData\Local\Temp\_MEI11442\VCRUNTIME140.dllMD5
7942be5474a095f673582997ae3054f1
SHA1e982f6ebc74d31153ba9738741a7eec03a9fa5e8
SHA2568ee6b49830436ff3bec9ba89213395427b5535813930489f118721fd3d2d942c
SHA51249fbc9d441362b65a8d78b73d4fdcf988f22d38a35a36a233fcd54e99e95e29b804be7eabe2b174188c7860ebb34f701e13ed216f954886a285bed7127619039
-
\Users\Admin\AppData\Local\Temp\_MEI11442\_asyncio.pydMD5
3a5fbfdc3091114488bc30cc1873365b
SHA1a4da519a41ce499430f5fea6f731f59b41e8031d
SHA256a055e2b17cba4199b48db6848e44543399870958f49b1afce10534c46298ef2a
SHA51200e08a09f7124e3e300a834796cc106ce07f8801749dc2ce451d5397ed822c2b3c602c20344b44c608c4fc0048cac6897748daab91d80a1be877a9c44e531dc1
-
\Users\Admin\AppData\Local\Temp\_MEI11442\_bz2.pydMD5
5a8b3602b3560868bd819b10c6343874
SHA173a5ce4d07479894f24b776eb387abd33deb83a9
SHA25600d2f34aee55b473bcc11838469b94a62d01fdf4465e19f7d7388c79132f019e
SHA5122f2f8305fd8853c479b5d2a442110efc3ad41a3c482cd554ebcc405fcf097e230f5cd45dbfb44050b5bd6fae662ce7cac0583c9784050f0c7d09a678768587db
-
\Users\Admin\AppData\Local\Temp\_MEI11442\_ctypes.pydMD5
e1ef9f5c77b01c82cf72522ec96b2a11
SHA1e83daa56a104f6ea6235822c644b6554c3958cfe
SHA256a79cf8259890d5843cf8eaf29db8dbd4bfabed50f4d859756f93ac2b30617023
SHA5124231ec5b06effae6497bf62853b79420529cabaee6b58f519c3c30bdd42c925e85979c29c2db0747dcff3f99f3b19dc02ece96347e08cf49eb0abb1e19238c01
-
\Users\Admin\AppData\Local\Temp\_MEI11442\_hashlib.pydMD5
8f7edaff246c46dbf09ab5554b918b37
SHA1c14c33b14419f5d24fb36e5f1bf1760a9c63228b
SHA2569154b36c178d84a901edad689a53148451ef3c851a91447a0654f528a620d944
SHA5121947a1010fa1b07671aa471d5821792dee7f2b0cd1937d3f944cd0201a299e6cb37a41debbbd1bc6e774186f6d08ad6264055cba7652b0d5bd22691431cb360e
-
\Users\Admin\AppData\Local\Temp\_MEI11442\_lzma.pydMD5
caa58290ab4414e2e22cc0b6ff4b2d29
SHA1840902aaf7db40da17018776e5c842014c3a81ac
SHA256185d407bcca7399c458133f2ce1efa938352b8093b2de040c91c3c3088ab173f
SHA512a82e380ab1676424e52a36c08eabd572375dd36a7fe2b9df51d48c368aed6c04b0b3674bc6a9787efedd0ed70bb1869ed1a2f3a1f4238485710092b9cbadd00e
-
\Users\Admin\AppData\Local\Temp\_MEI11442\_overlapped.pydMD5
60af9df3c5d25c193d73a566e763b0b8
SHA1a87c3285ff6f59528611f42577d30dbf35827b45
SHA256c63632bf1b28f7f1007ff093a9ef3d034cb9480fc373c29e06a407b223b6ddff
SHA51257c33929ec284013e88696ab7c099d570d0211d99f8e2027f1d8db9ae66810ccba6992959a2d543929f59bfc67cc4d1cc9264046e02df9cd119c3b1d2ec41a20
-
\Users\Admin\AppData\Local\Temp\_MEI11442\_queue.pydMD5
671a9ac9b34f07ada65bf1635e4626c5
SHA1d4a6e478caaacdbdb52f57d12e16ba96671d30f2
SHA2563f1fc09b3f0a5c8c7aff4223d002952ab26f462aa390940a9f00454815204739
SHA51292617258ef747f93ab2c378f5c9a2aac14668d834df15939c1ef83a555490b9ee3380d7341bee60c33057482736a595593749b8794ddeaa9649339363095108c
-
\Users\Admin\AppData\Local\Temp\_MEI11442\_socket.pydMD5
e71c0c49f7e2bd39cafeed1dca29455b
SHA122cb314298c6c38e3246f73dc7277ed00d6b8449
SHA2563b0ea76a2b0caabf5b8994d3789778575ecbf2831acaf4d53d274e265d271622
SHA5124c09599c7c93427b30a011cc39738983c79f0835292e5c0e7e19f6329f33810773d0e97e20f4698d22b6d0b8b643521bc3ce318c890366872ed26b6d3dab5c05
-
\Users\Admin\AppData\Local\Temp\_MEI11442\_ssl.pydMD5
39919e97dc418e0099b2a0bb332a8c77
SHA1f04c9d78b3d5e2a95ea3535c363d8b05d666d39e
SHA256b38b09bf0421b1f49338ded8021d7bc56be19902d9b21a9b6e9c8df448f93eb2
SHA512f179ebe84ae065ed63e71f2855b2b69cdedfc8be70dace0eb07c8b191768eace1312562e27e77492481f214f85d31f35c88c2b1f7a3881cee9dffffa7ffc668a
-
\Users\Admin\AppData\Local\Temp\_MEI11442\libcrypto-1_1.dllMD5
aa811bb63dbd4c5859b68332326f60b1
SHA16e5584d5c59d2f79cbf60c6c71a92ecd7e4e0977
SHA25600a1eeb37372d11559bf44c9e68af9c841c41c95a173f3dfec4e0b5923d0cae0
SHA512dad9b14f501fd63824480f8801acd4004dd46f7a6965ac8ab91e573676236a11099f4b7cfdf7b3f6c0cc52a3b2e5d9b50f715f53a1f4f858ea2a5eb15d5092cd
-
\Users\Admin\AppData\Local\Temp\_MEI11442\libffi-7.dllMD5
eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
\Users\Admin\AppData\Local\Temp\_MEI11442\libssl-1_1.dllMD5
2335285f5ac87173bd304efeddfa1d85
SHA164558d2150120abed3514db56299721c42c6fe58
SHA2561b57a201184559164dedbddcb43bb110a18cafa19ea3d00fc23274ccfc420e94
SHA51282737590d5ec7315ce8485c4794c01bfcce176ce443740a9f0cf5adfc3c3ed31a714556d33c1ca56db486636111d1ad855f606c87e5f322a505c535187ce2bde
-
\Users\Admin\AppData\Local\Temp\_MEI11442\python39.dllMD5
088904a7f5b53107db42e15827e3af98
SHA11768e7fb1685410e188f663f5b259710f597e543
SHA2563761c232e151e9ceaf6c7d37b68da3df1962e3106e425cc3937d1f60170f3718
SHA512c5edc25fd9a37673f769af1a1fd540b41e68351bc30b44bc83a1d0d4a8fb078888bbb31173a77ef47698631c9816bc05637b499c20d63e3d65457d9aa4bc2c6b
-
\Users\Admin\AppData\Local\Temp\_MEI11442\select.pydMD5
1e74ba085eb08a3affe5f5fabaaa6caf
SHA146e3efbd21dc0a2c7650ed949bc7e7e91b37efea
SHA25636be2a85c1989dc171bde986950b81d3e9cda21f1d1bf2f81f7fe15ffefad511
SHA512517a109490c3724a630a85471e28ff3c4f96c9810b96f5baa9b66473ef59ed4055e331c8da064a53bc12892fb674f417b3485e96f16015e1437cbd2ca67e87d8
-
\Users\Admin\AppData\Local\Temp\_MEI11442\unicodedata.pydMD5
06092dbacf3b009ad11376dfc5ed2acd
SHA12597d23469d65936fca20906ef41e1f999944210
SHA2562f9e76a8148029ade3e8f61d014d79a9b1c154cc9b5d6608f50fc478170ff676
SHA512c782ebb9139a6b358d6e55cca3f018e421747984245fafbd150696b152763f2a6d08a21a0185f49df867dfabf5f066631a55f324abfed4e8bece8f85ead81c85
-
memory/2784-2-0x0000000000000000-mapping.dmp