Analysis

  • max time kernel
    151s
  • max time network
    85s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-03-2021 02:02

General

  • Target

    d1bf7ec60bcb74dd395f92a1ddb5a2a66e9913514e0f7428681e9a8d7fe25b1e.exe

  • Size

    87KB

  • MD5

    8944bc22235936b73bdf874bfa4d1a64

  • SHA1

    6f48fb18ffd6497fbdc951b4d96340e878921d91

  • SHA256

    d1bf7ec60bcb74dd395f92a1ddb5a2a66e9913514e0f7428681e9a8d7fe25b1e

  • SHA512

    e3d637bdb3d5c4fda8a34eb3f47bdee837c514c5481067cf8c20a523430ca2b5bcd8ea20c5c79d7ea3c627b214cf89dc59c96c6d1a3983f6c77a489c489de9c2

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:568
    • C:\Users\Admin\AppData\Local\Temp\d1bf7ec60bcb74dd395f92a1ddb5a2a66e9913514e0f7428681e9a8d7fe25b1e.exe
      "C:\Users\Admin\AppData\Local\Temp\d1bf7ec60bcb74dd395f92a1ddb5a2a66e9913514e0f7428681e9a8d7fe25b1e.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:832

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Winlogon Helper DLL

    1
    T1004

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/832-2-0x0000000002130000-0x0000000002142000-memory.dmp
      Filesize

      72KB

    • memory/832-3-0x0000000000400000-0x0000000000419000-memory.dmp
      Filesize

      100KB