Analysis

  • max time kernel
    6s
  • max time network
    9s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-10-2022 15:29

Errors

Reason
Machine shutdown

General

  • Target

    3699750883e4c662d50fed7b6d16b8c515d52ad14edf54f6b7183d419e646448.exe

  • Size

    5.4MB

  • MD5

    6afa9397a7cd80ffe2f8d30828269e36

  • SHA1

    c7976bb175b4d26cc790f925280551a7fcecfff1

  • SHA256

    3699750883e4c662d50fed7b6d16b8c515d52ad14edf54f6b7183d419e646448

  • SHA512

    de139d2dd1d569b48b6bb79098ed0198771c3187ae0dae8171ab5a89287492711bd712eb432fb822128df0694820e97161a712ddc4e6dd264d2ec30b3b44b230

  • SSDEEP

    98304:NxV6zRhld9E1BlYb9uto2jgrGeweoSYp2prwvLWaNFXvow17IugzlHbGSZBN7fZm:vV8ld98BlON2jnbNswvBXvowJgzl7GSO

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 3 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • System policy modification 1 TTPs 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3699750883e4c662d50fed7b6d16b8c515d52ad14edf54f6b7183d419e646448.exe
    "C:\Users\Admin\AppData\Local\Temp\3699750883e4c662d50fed7b6d16b8c515d52ad14edf54f6b7183d419e646448.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:2704
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0 /state0:0xa3adc855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4712

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

3
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\322ea8b2-5b77-44ff-8f35-2130db963898\AgileDotNetRT64.dll
    Filesize

    3.1MB

    MD5

    4d8082b3de02f82db9a515e9dab5d2b6

    SHA1

    057a20ade70244601d0fe50f7011c95bae335ea5

    SHA256

    936b1537b6efcece032c05661238b06beefc61ff76e82b7c5d9fe558a9360a4c

    SHA512

    7b9153e9948e0f911fcb0b145678a56cac4abd948fa99e07c331760f02dce096cf3be7d2d8493cf7a76460c7172e24eaa45c1283a28353501b2876c54752c60d

  • memory/2704-120-0x000001CDC1D50000-0x000001CDC22B6000-memory.dmp
    Filesize

    5.4MB

  • memory/2704-122-0x00007FFC6F480000-0x00007FFC6FCEC000-memory.dmp
    Filesize

    8.4MB

  • memory/2704-123-0x00007FFC6F480000-0x00007FFC6FCEC000-memory.dmp
    Filesize

    8.4MB

  • memory/2704-124-0x00007FFC8E190000-0x00007FFC8E36B000-memory.dmp
    Filesize

    1.9MB

  • memory/2704-125-0x00007FFC81940000-0x00007FFC81A6C000-memory.dmp
    Filesize

    1.2MB

  • memory/2704-126-0x00007FFC8E190000-0x00007FFC8E36B000-memory.dmp
    Filesize

    1.9MB

  • memory/2704-127-0x00007FFC6F480000-0x00007FFC6FCEC000-memory.dmp
    Filesize

    8.4MB