Analysis
-
max time kernel
152s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 10:00
Behavioral task
behavioral1
Sample
67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe
Resource
win10v2004-20220901-en
General
-
Target
67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe
-
Size
140KB
-
MD5
a09120a3fe53eb6b2f55e0ad65e40c10
-
SHA1
5b3b625226e6a0a3746e669487466a41e68d70f0
-
SHA256
67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179
-
SHA512
c3c8635e1fe9121011c5f9c482d3c0f1801190c2ab2cce8b9c59e07573aebbc3614215b7735a720190a9560b05d3bf2e2414e64701508fd0e545cdf44e49b842
-
SSDEEP
3072:IyrN/sVywaEj1UsEOBYJwyrN/sVywaEj1UsWvMXb4XqATlS4EBDk:Nh9wv1Ut3nh9wv1UaXbWzTlkJk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1588 lcss.exe -
resource yara_rule behavioral1/memory/1404-54-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/files/0x000700000001446b-55.dat upx behavioral1/files/0x000700000001446b-56.dat upx behavioral1/files/0x000900000001429e-58.dat upx behavioral1/files/0x000600000001450c-57.dat upx behavioral1/files/0x0007000000005c50-59.dat upx behavioral1/memory/1404-60-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/1588-61-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Modifies WinLogon 2 TTPs 15 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Impersonate = "1" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Logon = "EvWinLogon" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\StartShell = "EvWinLogon" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Logon = "EvWinLogon" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Startup = "EvWinLogon" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\StartShell = "EvWinLogon" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Asynchronous = "1" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Startup = "EvWinLogon" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\DLLName = "wlogon.dll" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Asynchronous = "1" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\DLLName = "wlogon.dll" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon\Impersonate = "1" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlogon lcss.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wlogon.dll 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe File opened for modification C:\Windows\SysWOW64\net.cpl 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe File opened for modification C:\Windows\SysWOW64\lcss.exe 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe File opened for modification C:\Windows\SysWOW64\crypto.dll 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe -
Modifies registry class 38 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ = "crypto.dll" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer\ = "WinCryptography.Encrypt.1" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ThreadingModel = "Both" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer\ = "WinCryptography.Encrypt.1" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\ = "Windows Cryptography" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ = "crypto.dll" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID\ = "WinCryptography.Encrypt" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\VersionIndependentProgID\ = "WinCryptography.Encrypt" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ = "Windows Cryptography" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID\ = "WinCryptography.Encrypt.1" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\ = "Windows Cryptography" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB} lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB} 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\CLSID 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32\ThreadingModel = "Both" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1\ = "Windows Cryptography" lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ = "Windows Cryptography" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\ProgID\ = "WinCryptography.Encrypt.1" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1 lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\ = "Windows Cryptography" lcss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CLSID\ = "{310DE29C-0AD3-4A43-A2DB-221F1160CACB}" 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32 lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt\CurVer lcss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{310DE29C-0AD3-4A43-A2DB-221F1160CACB}\InprocServer32 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinCryptography.Encrypt.1 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1404 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Token: SeDebugPrivilege 1404 67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe Token: SeTakeOwnershipPrivilege 1588 lcss.exe Token: SeDebugPrivilege 1588 lcss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe"C:\Users\Admin\AppData\Local\Temp\67adbc061fa0c5e4d058bd310fb0d2a129470ac18e60c97a269d3a0b8d205179.exe"1⤵
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
C:\Windows\SysWOW64\lcss.exeC:\Windows\SysWOW64\lcss.exe1⤵
- Executes dropped EXE
- Modifies WinLogon
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD598e1ec4bb61bc80e30c94820fd0aef04
SHA1bfdaf889242f3d5fcdd59077490234f9bae5525a
SHA25640621ae562ab795dc91afd94f94f12c7634053ec2437a6861ae06fb520a1278a
SHA512150b2425d3434c0ffc23ce723598bdfc4c322c277371f13b6c984b349c60bbd67aa12e9380cd1db5ba741c67c9c5877ca027afc81fdf26ebb81a150f3bf47246
-
Filesize
214KB
MD5553378999e01443c4b43dcd3f543603f
SHA1db69e665fee07e1d36b088a58b51cf3807c893c9
SHA256eae00fbc13a0185d50a76de62540453a9450b8f16b5b2da22264f700d2674dad
SHA5120ed6ca1d4f67b509c915d52a38265ae3c8dddd776d4534027308b597e68b61985411f47b5ac9e08e3996a58acf26b44e12ec1e8e309c1c66be9bb446461ad542
-
Filesize
214KB
MD5553378999e01443c4b43dcd3f543603f
SHA1db69e665fee07e1d36b088a58b51cf3807c893c9
SHA256eae00fbc13a0185d50a76de62540453a9450b8f16b5b2da22264f700d2674dad
SHA5120ed6ca1d4f67b509c915d52a38265ae3c8dddd776d4534027308b597e68b61985411f47b5ac9e08e3996a58acf26b44e12ec1e8e309c1c66be9bb446461ad542
-
Filesize
141KB
MD599e1d53078c1b1e75dd2da7a4554e2c0
SHA169df2ac8b021b26d949de9551617348f650074b8
SHA256281278f249318138d4c61fea5c13ade85c750e0fdd3a72ca9308010efed4b1a1
SHA51269ca9ee4f03eeed7bc57264f533d94154615dafcb2e64e0ca71a71af312ed40010f1d905e8e4b98a120b9f4a8adf985905ff5f244ceab09b65e0e1008e44718f
-
Filesize
230KB
MD5ee3584864ca6217e828002fd2e290161
SHA125c3c983ddeccf1c14959f7b84eef470789d8be1
SHA2568cc318ccdb1e087ec60c1fcf43a874ad305110873289a77b7f44ec3831e58be1
SHA512d5380f460c5e89570ecc2ce488b5ff218cea9d78233c279163d51bd145ec0d8d26308a39bdbecc364470c334d040f753c56759877a30a8ae0073a8e662d71f64