Analysis
-
max time kernel
106s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-06-2022 00:52
Static task
static1
Behavioral task
behavioral1
Sample
DocumentoSetembro-CS-U-65289742019-09_13/DocumentoSetembro-CS-U-65289742019-09_13.pdf
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
DocumentoSetembro-CS-U-65289742019-09_13/DocumentoSetembro-CS-U-65289742019-09_13.pdf
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
DocumentoSetembro-CS-U-65289742019-09_13/DocumentoSetembro-CS-U-65289742019-09_13.vbs
Resource
win7-20220414-en
General
-
Target
DocumentoSetembro-CS-U-65289742019-09_13/DocumentoSetembro-CS-U-65289742019-09_13.vbs
-
Size
15KB
-
MD5
3c36b6fdd3bafc16376dd2bc68fec317
-
SHA1
92729855a8cb8399e02190b17e807c0536e764f3
-
SHA256
4494da2105572a5ad07bd08110e35045c34967306f12a7ea7c91fffc0f79f599
-
SHA512
65897f7de6e2e7df85f3410d145907f42da49927ec961311901bb950a23c4a610282953f964d4cc8a910db573321a64d3a343de59b66db89f8508cacc5918639
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
WScript.exeflow pid process 45 1188 WScript.exe 47 1188 WScript.exe 49 1188 WScript.exe 51 1188 WScript.exe 53 1188 WScript.exe 55 1188 WScript.exe -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\odgnggvomzm.lnk wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "82" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
wscript.exedescription pid process Token: SeShutdownPrivilege 1972 wscript.exe Token: SeShutdownPrivilege 1972 wscript.exe Token: SeShutdownPrivilege 1972 wscript.exe Token: SeShutdownPrivilege 1972 wscript.exe Token: SeShutdownPrivilege 1972 wscript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 5116 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WScript.exedescription pid process target process PID 1188 wrote to memory of 1972 1188 WScript.exe wscript.exe PID 1188 wrote to memory of 1972 1188 WScript.exe wscript.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\DocumentoSetembro-CS-U-65289742019-09_13\DocumentoSetembro-CS-U-65289742019-09_13.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\System32\wscript.exewscript.exe C:\Users\Admin\AppData\Roaming\odgnggvomzm.vbs2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39b3055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310B
MD5a0e2a1b1d47ba0f936c633fcb0e9a08e
SHA1e9205ece427d777a13e64f42b19d1f262ef93ee3
SHA2566cf8efc2f67d40293ce3ca4c0b83305814f4ac1b31a95838780382c22de46e6a
SHA512b464be9a16a49c48f2b297ba333d50b6b441b62b13918e58c02ebcae52597a05b9de2e8e2f6e4cf8d3f066d856522c99ffb50e69b28471bb8c07adae5e3f8afe
-
Filesize
653B
MD59a30b96cc6bb32112bcf34340933053a
SHA1c481f8f31a5f6ef70f05fc71b2c9936ece438647
SHA256a095eb3dac4fa060b834690c210cafdc7a7753316ba975877f2f4147853f4438
SHA5122b8d9067be717c89f6d7608b112701fb2fac39248741a4418c2cc00ffa14eaae95a1521a61e82fd32140a5fca558a022e37114442db32fa28558bb0f23dcba87