Analysis
-
max time kernel
153s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 10:00
Behavioral task
behavioral1
Sample
722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe
Resource
win10v2004-20220812-en
General
-
Target
722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe
-
Size
172KB
-
MD5
a0314c6fd8d462ec04cc6e5a3fed3220
-
SHA1
86863b7a7f2f8f81df04845d70f713628381f3fc
-
SHA256
722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e
-
SHA512
2cdf4955e72f40a742455a89d5fd7afdd0474dade197dc3d48ea261bb4a2bb591fff119c4fca1356254693ebe5692baa1e57446b0b48c1eb66aa23a584bf071a
-
SSDEEP
3072:IyrN/sVywaEj1UsEOBYJwyrN/sVywaEj1UsbArsnhmBGVslFmbL+wcjte8Gy:Nh9wv1Ut3nh9wv1UsAZy9cZZ9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3408 lcss.exe -
resource yara_rule behavioral2/files/0x0008000000022e17-132.dat upx behavioral2/files/0x0008000000022e17-133.dat upx behavioral2/files/0x0009000000022df5-135.dat upx behavioral2/files/0x0009000000022dee-136.dat upx behavioral2/files/0x0007000000022e18-134.dat upx behavioral2/memory/1904-137-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3408-138-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Modifies WinLogon 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Startup = "EvWinLogon" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Asynchronous = "1" lcss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Impersonate = "1" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\DLLName = "wlogon.dll" lcss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Impersonate = "1" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Startup = "EvWinLogon" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Asynchronous = "1" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Logon = "EvWinLogon" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\DLLName = "wlogon.dll" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\StartShell = "EvWinLogon" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Logon = "EvWinLogon" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\StartShell = "EvWinLogon" lcss.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\lcss.exe 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe File opened for modification C:\Windows\SysWOW64\crypto.dll 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe File opened for modification C:\Windows\SysWOW64\wlogon.dll 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe File opened for modification C:\Windows\SysWOW64\net.cpl 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe -
Modifies registry class 38 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ = "Windows Cryptography" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID\ = "WinCryptography.Encrypt" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\ = "Windows Cryptography" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\ = "Windows Cryptography" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\ = "Windows Cryptography" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB} lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32 lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID\ = "WinCryptography.Encrypt.1" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer\ = "WinCryptography.Encrypt.1" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ = "crypto.dll" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1 lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\ = "Windows Cryptography" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB} 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID\ = "WinCryptography.Encrypt.1" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ThreadingModel = "Both" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ = "crypto.dll" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ThreadingModel = "Both" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID\ = "WinCryptography.Encrypt" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer\ = "WinCryptography.Encrypt.1" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ = "Windows Cryptography" 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1904 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Token: SeDebugPrivilege 1904 722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe Token: SeTakeOwnershipPrivilege 3408 lcss.exe Token: SeDebugPrivilege 3408 lcss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe"C:\Users\Admin\AppData\Local\Temp\722709fa038a961b2b71cd79ac883b40fe118ba18667b32177530bd73db7b82e.exe"1⤵
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
C:\Windows\SysWOW64\lcss.exeC:\Windows\SysWOW64\lcss.exe1⤵
- Executes dropped EXE
- Modifies WinLogon
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD52d34d765f027973af68b4912999ade0a
SHA1ad6d151ff362c3967081b55ed62a84659fc10015
SHA256aaa84e64e89b6cc071c0b8ab47324b993fff441d04769969cab6d4c69244ecd5
SHA512a0c83a1604388da8df1d09bf30a4487e2e5e74c90a3bc578959bb98f9b091af39d20870384f4dc3fc821a41b4b471a3785e1196747f422a66b6a4b85dbae6980
-
Filesize
198KB
MD5f300c886628d402793942ca7d0935619
SHA118276ad2648ddcb557711cea3473217be3d4b18c
SHA25673c6919d7e6dae4c43ca62ab02a93c0239bf80357a0888fc798de1001b05800b
SHA51262b7dd50d73aa6709a25870215d39f6fef934a5d1ee4c701ebbf60e646d80d1c052790e1d42134b9c9dd305e280a33a61ac214d10eb2233b780b969b3b4adb73
-
Filesize
198KB
MD5f300c886628d402793942ca7d0935619
SHA118276ad2648ddcb557711cea3473217be3d4b18c
SHA25673c6919d7e6dae4c43ca62ab02a93c0239bf80357a0888fc798de1001b05800b
SHA51262b7dd50d73aa6709a25870215d39f6fef934a5d1ee4c701ebbf60e646d80d1c052790e1d42134b9c9dd305e280a33a61ac214d10eb2233b780b969b3b4adb73
-
Filesize
218KB
MD53c37feaec441f369a9cc664d4d61ea92
SHA13a4367ee8d5f21975f6e99b0258b74e4b5e47591
SHA256afd94af0914855f8bb813ee41932c6bb4c10e203a1c0050056b84df996d7c9f1
SHA512a598bfbc4a32ed1413468e190f9d26fd6b2691def17a1f4f5ba6c80aa0a96071cf2d9087ab1caa26d82d07473fff13e465c8360f16216a5c75b7b0213e7bdbe2
-
Filesize
156KB
MD59cb7609c7f8ec658fdb33273da677f28
SHA155703f5b2ba43442d3df5e057d7af12f6df1594d
SHA256264064d0ae03c0e65da9e989a7cac4176ba3fe86a4411de1a15876558a745137
SHA512b186676fcc37946ee9d8f2759920019a71fd47020aab872ddae51db4885e1a6d0eab9b98d9e17e5c10b1ad78f0371486053032c9c1bb6c9434d263e80621b59b