General

  • Target

    wlnlogon.exe

  • Size

    34KB

  • Sample

    210329-7afah9gsfe

  • MD5

    c626eb5448aafaeab9a3a207cca1f44c

  • SHA1

    b2197768b2f44c97e45a82ae9bfbbbb2a89c7cfa

  • SHA256

    4939669c7aa568cd8e714bb26b512cecb7e6477fef8053e3fcfdf81741033593

  • SHA512

    455c947fb9fe7dffc79a31e54d781b863bdb47acbf9ad7b4ab619177388a6bf7a01237cad945a88ee9e3121d74c01e74c851d3da89b4d3de5de4efb4389847e6

Malware Config

Targets

    • Target

      wlnlogon.exe

    • Size

      34KB

    • MD5

      c626eb5448aafaeab9a3a207cca1f44c

    • SHA1

      b2197768b2f44c97e45a82ae9bfbbbb2a89c7cfa

    • SHA256

      4939669c7aa568cd8e714bb26b512cecb7e6477fef8053e3fcfdf81741033593

    • SHA512

      455c947fb9fe7dffc79a31e54d781b863bdb47acbf9ad7b4ab619177388a6bf7a01237cad945a88ee9e3121d74c01e74c851d3da89b4d3de5de4efb4389847e6

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Modifies Installed Components in the registry

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

3
T1107

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Impact

Inhibit System Recovery

3
T1490

Tasks