Analysis

  • max time kernel
    80s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2022, 04:10

General

  • Target

    5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe

  • Size

    60KB

  • MD5

    10c54306eb26094c41db2344c40b25fe

  • SHA1

    870451dd209609de9c246caf6f803c9b7bdd2760

  • SHA256

    5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af

  • SHA512

    c7fd6be522c59afe4c283270cfaa3bd83e6b1500866555558abd50fc4081ce3788d81a8b1d4f3d284fcf3311ce820fe063c54a53914120b983c17e5ce1119fde

  • SSDEEP

    768:+L2RaD6kljLzPy6F912umeWODntygh4Me11dtwbmpmDNxbx5vt367GRA+ET853ww:+LwoI+G13wbRxbxZ2+XfZGX7Q

Score
10/10

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe
    "C:\Users\Admin\AppData\Local\Temp\5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe"
    1⤵
    • UAC bypass
    • Windows security bypass
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Windows security modification
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1904
    • \??\c:\Windows\Winmain\winlogon.exe
      c:\Windows\Winmain\winlogon.exe
      2⤵
      • UAC bypass
      • Windows security bypass
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Windows security modification
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1612

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Winmain\winlogon.exe

          Filesize

          60KB

          MD5

          10c54306eb26094c41db2344c40b25fe

          SHA1

          870451dd209609de9c246caf6f803c9b7bdd2760

          SHA256

          5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af

          SHA512

          c7fd6be522c59afe4c283270cfaa3bd83e6b1500866555558abd50fc4081ce3788d81a8b1d4f3d284fcf3311ce820fe063c54a53914120b983c17e5ce1119fde

        • C:\Windows\system32\drivers\etc\hosts

          Filesize

          824B

          MD5

          201a9deef9984d3d98c3007571df1b5a

          SHA1

          c2b0acfb696ce27bcebd8d9eeb96ac45ecafb469

          SHA256

          cb8bc04843db34395aa4852ac845448f9677058b2bbe700626d521724ca786fe

          SHA512

          6b9c7fa4051b43bbc0c161e5e4d1d3e67a80d1840925ba6747d7bb9c88c22a021f50d67044b66bd8f25aa7e65e71ac3a2dd935a5af02afe317cf6c92f1fcbda3

        • \??\c:\Windows\Winmain\winlogon.exe

          Filesize

          60KB

          MD5

          10c54306eb26094c41db2344c40b25fe

          SHA1

          870451dd209609de9c246caf6f803c9b7bdd2760

          SHA256

          5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af

          SHA512

          c7fd6be522c59afe4c283270cfaa3bd83e6b1500866555558abd50fc4081ce3788d81a8b1d4f3d284fcf3311ce820fe063c54a53914120b983c17e5ce1119fde

        • \Windows\Winmain\winlogon.exe

          Filesize

          60KB

          MD5

          10c54306eb26094c41db2344c40b25fe

          SHA1

          870451dd209609de9c246caf6f803c9b7bdd2760

          SHA256

          5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af

          SHA512

          c7fd6be522c59afe4c283270cfaa3bd83e6b1500866555558abd50fc4081ce3788d81a8b1d4f3d284fcf3311ce820fe063c54a53914120b983c17e5ce1119fde

        • \Windows\Winmain\winlogon.exe

          Filesize

          60KB

          MD5

          10c54306eb26094c41db2344c40b25fe

          SHA1

          870451dd209609de9c246caf6f803c9b7bdd2760

          SHA256

          5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af

          SHA512

          c7fd6be522c59afe4c283270cfaa3bd83e6b1500866555558abd50fc4081ce3788d81a8b1d4f3d284fcf3311ce820fe063c54a53914120b983c17e5ce1119fde