Analysis

  • max time kernel
    151s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    18-05-2021 12:00

General

  • Target

    b902f6a246639061d879e49133bff336f6c10c2dd27ce6593dfc0f1894ca00c4.exe

  • Size

    471KB

  • MD5

    b6ea755015a6831da0d45300d8f1f121

  • SHA1

    3c63a91abcb5827b250d71c810241433ec1f9635

  • SHA256

    b902f6a246639061d879e49133bff336f6c10c2dd27ce6593dfc0f1894ca00c4

  • SHA512

    4a166d9f9f7ca38e79c861a01d1ea977a86ac1c39929b7220415ee8319ae6ba637a808a88ba48097604de21d777bab9b10bc4bc9ab7016bded760d8f1fa3588b

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Sets service image path in registry 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b902f6a246639061d879e49133bff336f6c10c2dd27ce6593dfc0f1894ca00c4.exe
    "C:\Users\Admin\AppData\Local\Temp\b902f6a246639061d879e49133bff336f6c10c2dd27ce6593dfc0f1894ca00c4.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies system executable filetype association
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Modifies WinLogon
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Windows\SysWOW64\reg.exe
      reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /f
      2⤵
        PID:1472

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Winlogon Helper DLL

    2
    T1004

    Change Default File Association

    1
    T1042

    Registry Run Keys / Startup Folder

    2
    T1060

    Browser Extensions

    1
    T1176

    Defense Evasion

    Modify Registry

    6
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1420-60-0x0000000074FB1000-0x0000000074FB3000-memory.dmp
      Filesize

      8KB

    • memory/1472-59-0x0000000000000000-mapping.dmp