Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 10:00
Behavioral task
behavioral1
Sample
722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe
Resource
win10v2004-20220812-en
General
-
Target
722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe
-
Size
172KB
-
MD5
a0314c6fd8d462ec04cc6e5a3fed3220
-
SHA1
86863b7a7f2f8f81df04845d70f713628381f3fc
-
SHA256
722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e
-
SHA512
2cdf4955e72f40a742455a89d5fd7afdd0474dade197dc3d48ea261bb4a2bb591fff119c4fca1356254693ebe5692baa1e57446b0b48c1eb66aa23a584bf071a
-
SSDEEP
3072:IyrN/sVywaEj1UsEOBYJwyrN/sVywaEj1UsbArsnhmBGVslFmbL+wcjte8Gy:Nh9wv1Ut3nh9wv1UsAZy9cZZ9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1756 lcss.exe -
resource yara_rule behavioral1/files/0x000800000001339d-54.dat upx behavioral1/files/0x000800000001339d-55.dat upx behavioral1/files/0x000c0000000054a8-58.dat upx behavioral1/files/0x000a00000001313e-57.dat upx behavioral1/files/0x00070000000133d3-56.dat upx behavioral1/memory/1160-59-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1756-60-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Modifies WinLogon 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\DLLName = "wlogon.dll" lcss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Asynchronous = "1" lcss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Impersonate = "1" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\StartShell = "EvWinLogon" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\DLLName = "wlogon.dll" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Asynchronous = "1" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Impersonate = "1" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Logon = "EvWinLogon" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\StartShell = "EvWinLogon" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Logon = "EvWinLogon" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Startup = "EvWinLogon" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Startup = "EvWinLogon" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\crypto.dll 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe File opened for modification C:\Windows\SysWOW64\wlogon.dll 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe File opened for modification C:\Windows\SysWOW64\net.cpl 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe File opened for modification C:\Windows\SysWOW64\lcss.exe 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe -
Modifies registry class 38 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer\ = "WinCryptography.Encrypt.1" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB} lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1 lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ = "Windows Cryptography" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ = "Windows Cryptography" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ThreadingModel = "Both" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer\ = "WinCryptography.Encrypt.1" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\ = "Windows Cryptography" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\ = "Windows Cryptography" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ThreadingModel = "Both" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ = "crypto.dll" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID\ = "WinCryptography.Encrypt" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID\ = "WinCryptography.Encrypt.1" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\ = "Windows Cryptography" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\ = "Windows Cryptography" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32 lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ = "crypto.dll" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID\ = "WinCryptography.Encrypt" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID\ = "WinCryptography.Encrypt.1" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB} 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1160 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Token: SeDebugPrivilege 1160 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Token: SeTakeOwnershipPrivilege 1756 lcss.exe Token: SeDebugPrivilege 1756 lcss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe"C:\Users\Admin\AppData\Local\Temp\722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe"1⤵
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
C:\Windows\SysWOW64\lcss.exeC:\Windows\SysWOW64\lcss.exe1⤵
- Executes dropped EXE
- Modifies WinLogon
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD5057aa9ab4deeba87197af302926d148e
SHA142c821af94cedf6aecb25095ec6336010dbc42ed
SHA2566ba1a952a940b4ec45f8c7bb355a977a76f5cb3e1fb1631cfece121aa0bb2131
SHA5126a355b5da42f503fb4ff5728ad52441eedf2db8161def98b9013b94845413c10cbde1a5dd9e7f3b0470e32b125d23c0cf659c318aa2363501e4a77b4bef87b19
-
Filesize
114KB
MD5f29cabf39e5c6520d8635323269ee17d
SHA15199c9f04f435d0df40383707471155e41d3bdcd
SHA256ed04f20ea8f64a76bbc9118ff0f39234fd661eb0aee5d3e6af61751588c530a2
SHA51208bc4026dfea226d78d431a7a36036706f0915bb11d7aa4f899487fcb0228e468c0024429e83a23d8bce515d1234289c9caeb4c7a8e922610bbd099718864444
-
Filesize
114KB
MD5f29cabf39e5c6520d8635323269ee17d
SHA15199c9f04f435d0df40383707471155e41d3bdcd
SHA256ed04f20ea8f64a76bbc9118ff0f39234fd661eb0aee5d3e6af61751588c530a2
SHA51208bc4026dfea226d78d431a7a36036706f0915bb11d7aa4f899487fcb0228e468c0024429e83a23d8bce515d1234289c9caeb4c7a8e922610bbd099718864444
-
Filesize
173KB
MD56f1aec8f7e98fa5e8bf2475abc95a93d
SHA13a7060439341e48449724ab6f28038664906fc8b
SHA256f9d48b9f87caea39a05438c3dd4db7c84287bdb6e21235701717649c6e8a406f
SHA512e73c6e921080f344d91a65b02989a68d089aba9f5ea4828c8a22d916266e8de10992e9f1b7b7b4c930f4abe2bc1366e3dc8f96c07d4ed323e6d01ab63b5c82de
-
Filesize
113KB
MD56e4de3bd0cd70c0917e35a2c5be9511f
SHA151d5c2e9c5e88e571f41348936a402cc6ed28c07
SHA2565d451358f77c0c524d8394d2c6501eaeafc6b1cabebec29e48c502af89906d65
SHA512a7ce0910d4d446edb28062167cf696b02fae27a1766c90e957084a9db3f2ff2543e213e53e93e1c331589ba19cd71b16fed0c4be233bfe5c270a1827d72dfd70