Analysis

  • max time kernel
    165s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 10:44

General

  • Target

    a27e62c716fd3e19d53fe27c25a3238d805fecc13375b46c67409eabc0c7275e.exe

  • Size

    1.0MB

  • MD5

    79e37b464938e19ec450f2408bf5dd07

  • SHA1

    11caa525e5a5061a4e6b5b86006601c784b6a95f

  • SHA256

    a27e62c716fd3e19d53fe27c25a3238d805fecc13375b46c67409eabc0c7275e

  • SHA512

    fc00ca78ee6d6aeb7f259f0a854008057d50c1682adddb624ef56a6a770fc5657576b6d801260db7a3e4fc2247de64202baea4ab9a8c509bc696c32f55c55a30

  • SSDEEP

    24576:wT+XEHz48vLwhrAdKu0Gr1yDJXvKoxuecF3C58ospiEwV5wXC:wTn8kdK7amZKwuPF3wFHwy

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:600
    • C:\Users\Admin\AppData\Local\Temp\a27e62c716fd3e19d53fe27c25a3238d805fecc13375b46c67409eabc0c7275e.exe
      "C:\Users\Admin\AppData\Local\Temp\a27e62c716fd3e19d53fe27c25a3238d805fecc13375b46c67409eabc0c7275e.exe"
      1⤵
      • UAC bypass
      • Windows security bypass
      • Windows security modification
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3836
      • C:\Users\Admin\AppData\Local\Temp\a27e62c716fd3e19d53fe27c25a3238d805fecc13375b46c67409eabc0c7275e.exe
        C:\Users\Admin\AppData\Local\Temp\a27e62c716fd3e19d53fe27c25a3238d805fecc13375b46c67409eabc0c7275e.exe
        2⤵
        • Modifies WinLogon for persistence
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1792

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/600-188-0x0000000004A60000-0x0000000004A79000-memory.dmp

      Filesize

      100KB

    • memory/600-208-0x0000000004AE0000-0x0000000004AF9000-memory.dmp

      Filesize

      100KB

    • memory/600-178-0x0000000004A20000-0x0000000004A39000-memory.dmp

      Filesize

      100KB

    • memory/600-143-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/600-148-0x0000000004960000-0x0000000004979000-memory.dmp

      Filesize

      100KB

    • memory/600-153-0x0000000004980000-0x0000000004999000-memory.dmp

      Filesize

      100KB

    • memory/600-158-0x00000000049A0000-0x00000000049B9000-memory.dmp

      Filesize

      100KB

    • memory/600-163-0x00000000049C0000-0x00000000049D9000-memory.dmp

      Filesize

      100KB

    • memory/600-168-0x00000000049E0000-0x00000000049F9000-memory.dmp

      Filesize

      100KB

    • memory/600-173-0x0000000004A00000-0x0000000004A19000-memory.dmp

      Filesize

      100KB

    • memory/600-235-0x0000000004B80000-0x0000000004B99000-memory.dmp

      Filesize

      100KB

    • memory/600-230-0x0000000004B60000-0x0000000004B79000-memory.dmp

      Filesize

      100KB

    • memory/600-198-0x0000000004AA0000-0x0000000004AB9000-memory.dmp

      Filesize

      100KB

    • memory/600-193-0x0000000004A80000-0x0000000004A99000-memory.dmp

      Filesize

      100KB

    • memory/600-183-0x0000000004A40000-0x0000000004A59000-memory.dmp

      Filesize

      100KB

    • memory/600-203-0x0000000004AC0000-0x0000000004AD9000-memory.dmp

      Filesize

      100KB

    • memory/600-223-0x0000000004B40000-0x0000000004B59000-memory.dmp

      Filesize

      100KB

    • memory/600-213-0x0000000004B00000-0x0000000004B19000-memory.dmp

      Filesize

      100KB

    • memory/600-218-0x0000000004B20000-0x0000000004B39000-memory.dmp

      Filesize

      100KB

    • memory/1792-135-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/1792-226-0x0000000000670000-0x0000000000683000-memory.dmp

      Filesize

      76KB

    • memory/1792-225-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/1792-137-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB