Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
02-12-2021 19:21
Static task
static1
Behavioral task
behavioral1
Sample
winlogon.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
winlogon.exe
Resource
win10-en-20211014
General
-
Target
winlogon.exe
-
Size
462KB
-
MD5
629f5bb8b5ee75e90c393ad9d96a1772
-
SHA1
b09925a7163bef858657a1b39146fe27abb01f99
-
SHA256
15637f2d530662c968272c1e6e48ca6a093f0c828edf0cbb5cd32d9af03b3ff5
-
SHA512
3434c0b1f42533c42a4232809a007ddfd340ebc0d500db436cd038e3d3b4aaf0fd8bcf36e3a1cee4442c5d894679f5cdc7cef5a90c04534f937121d6cc9e3857
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1088 616 WerFault.exe winlogon.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
winlogon.exeWerFault.exepowershell.exepid process 616 winlogon.exe 1088 WerFault.exe 1088 WerFault.exe 1088 WerFault.exe 1088 WerFault.exe 1088 WerFault.exe 240 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1088 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
winlogon.exeWerFault.exepowershell.exedescription pid process Token: SeDebugPrivilege 616 winlogon.exe Token: SeDebugPrivilege 1088 WerFault.exe Token: SeDebugPrivilege 240 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
winlogon.exedescription pid process target process PID 616 wrote to memory of 240 616 winlogon.exe powershell.exe PID 616 wrote to memory of 240 616 winlogon.exe powershell.exe PID 616 wrote to memory of 240 616 winlogon.exe powershell.exe PID 616 wrote to memory of 240 616 winlogon.exe powershell.exe PID 616 wrote to memory of 1744 616 winlogon.exe schtasks.exe PID 616 wrote to memory of 1744 616 winlogon.exe schtasks.exe PID 616 wrote to memory of 1744 616 winlogon.exe schtasks.exe PID 616 wrote to memory of 1744 616 winlogon.exe schtasks.exe PID 616 wrote to memory of 1088 616 winlogon.exe WerFault.exe PID 616 wrote to memory of 1088 616 winlogon.exe WerFault.exe PID 616 wrote to memory of 1088 616 winlogon.exe WerFault.exe PID 616 wrote to memory of 1088 616 winlogon.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\winlogon.exe"C:\Users\Admin\AppData\Local\Temp\winlogon.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UlhpAjSuVoTa.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UlhpAjSuVoTa" /XML "C:\Users\Admin\AppData\Local\Temp\tmp70DC.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 616 -s 10122⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp70DC.tmpMD5
7f3db492c6089b5f808bda9985dcbe00
SHA1040c288fd15fe256f1efa306d9c9ce8e2be097f1
SHA2562774c3611fc73d09b11bca9e0f2a9931804a4e178f6c02e9f359ce7ac17e0356
SHA512a3ef55056a983a2a96658a9b98b624bbcdc9783ecf4960691039646179a8046b901b274c6b064afa326cf1f5433745c8b6ad3fbd786f386fb6270fd776583810
-
memory/240-61-0x0000000000000000-mapping.dmp
-
memory/240-69-0x0000000002380000-0x0000000002FCA000-memory.dmpFilesize
12.3MB
-
memory/240-66-0x0000000002380000-0x0000000002FCA000-memory.dmpFilesize
12.3MB
-
memory/240-67-0x0000000002380000-0x0000000002FCA000-memory.dmpFilesize
12.3MB
-
memory/616-59-0x0000000004C80000-0x0000000004C81000-memory.dmpFilesize
4KB
-
memory/616-60-0x00000000050F0000-0x0000000005159000-memory.dmpFilesize
420KB
-
memory/616-55-0x0000000000FA0000-0x0000000000FA1000-memory.dmpFilesize
4KB
-
memory/616-58-0x0000000000310000-0x0000000000318000-memory.dmpFilesize
32KB
-
memory/616-57-0x0000000075971000-0x0000000075973000-memory.dmpFilesize
8KB
-
memory/1088-65-0x0000000000000000-mapping.dmp
-
memory/1088-68-0x00000000004B0000-0x00000000004B1000-memory.dmpFilesize
4KB
-
memory/1744-62-0x0000000000000000-mapping.dmp