Analysis

  • max time kernel
    55s
  • max time network
    55s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    25-03-2021 22:00

Errors

Reason
Machine shutdown

General

  • Target

    Wolfteam/api_ms_win_core_synch_l1_1_0.dll

  • Size

    20KB

  • MD5

    981a70962828df80f65c822196daac8d

  • SHA1

    1e9bc0925b963860c0755564f74b3fadb242f4eb

  • SHA256

    d664f63c82b14e4d1cc52a1e6d0477b0ed9f333a12935e4e4ae2c223ca9d5437

  • SHA512

    7222b99805e09069a7045818629eeac43119b8c1fe0a10cf4b840895f10187d14d7a253ca869edb9d03d54fd326d28c1aa0514cd3ec5d9661b71600b69173b3e

Score
8/10

Malware Config

Signatures

  • Modifies WinLogon to allow AutoLogon 2 TTPs 1 IoCs

    Enables rebooting of the machine without requiring login credentials.

  • Program crash 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Wolfteam\api_ms_win_core_synch_l1_1_0.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Wolfteam\api_ms_win_core_synch_l1_1_0.dll,#1
      2⤵
        PID:3636
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 616
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1784
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 640
          3⤵
          • Program crash
          PID:1508
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0 /state0:0xa3ad4055 /state1:0x41c64e6d
      1⤵
      • Modifies WinLogon to allow AutoLogon
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:2540

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1784-3-0x00000000048E0000-0x00000000048E1000-memory.dmp

      Filesize

      4KB

    • memory/3636-2-0x0000000000000000-mapping.dmp