Analysis
-
max time kernel
80s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe
Resource
win7-20220812-en
General
-
Target
5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe
-
Size
60KB
-
MD5
10c54306eb26094c41db2344c40b25fe
-
SHA1
870451dd209609de9c246caf6f803c9b7bdd2760
-
SHA256
5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af
-
SHA512
c7fd6be522c59afe4c283270cfaa3bd83e6b1500866555558abd50fc4081ce3788d81a8b1d4f3d284fcf3311ce820fe063c54a53914120b983c17e5ce1119fde
-
SSDEEP
768:+L2RaD6kljLzPy6F912umeWODntygh4Me11dtwbmpmDNxbx5vt367GRA+ET853ww:+LwoI+G13wbRxbxZ2+XfZGX7Q
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" winlogon.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Executes dropped EXE 1 IoCs
pid Process 1612 winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 1904 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe 1904 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created \??\c:\Windows\Winmain\winlogon.exe winlogon.exe File created \??\c:\Windows\Winmain\winlogon.exe 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe File opened for modification \??\c:\Windows\Winmain\winlogon.exe 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1612 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1904 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe Token: SeBackupPrivilege 1612 winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1904 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe 1612 winlogon.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1612 1904 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe 28 PID 1904 wrote to memory of 1612 1904 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe 28 PID 1904 wrote to memory of 1612 1904 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe 28 PID 1904 wrote to memory of 1612 1904 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe"C:\Users\Admin\AppData\Local\Temp\5c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af.exe"1⤵
- UAC bypass
- Windows security bypass
- Drops file in Drivers directory
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1904 -
\??\c:\Windows\Winmain\winlogon.exec:\Windows\Winmain\winlogon.exe2⤵
- UAC bypass
- Windows security bypass
- Drops file in Drivers directory
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1612
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD510c54306eb26094c41db2344c40b25fe
SHA1870451dd209609de9c246caf6f803c9b7bdd2760
SHA2565c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af
SHA512c7fd6be522c59afe4c283270cfaa3bd83e6b1500866555558abd50fc4081ce3788d81a8b1d4f3d284fcf3311ce820fe063c54a53914120b983c17e5ce1119fde
-
Filesize
824B
MD5201a9deef9984d3d98c3007571df1b5a
SHA1c2b0acfb696ce27bcebd8d9eeb96ac45ecafb469
SHA256cb8bc04843db34395aa4852ac845448f9677058b2bbe700626d521724ca786fe
SHA5126b9c7fa4051b43bbc0c161e5e4d1d3e67a80d1840925ba6747d7bb9c88c22a021f50d67044b66bd8f25aa7e65e71ac3a2dd935a5af02afe317cf6c92f1fcbda3
-
Filesize
60KB
MD510c54306eb26094c41db2344c40b25fe
SHA1870451dd209609de9c246caf6f803c9b7bdd2760
SHA2565c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af
SHA512c7fd6be522c59afe4c283270cfaa3bd83e6b1500866555558abd50fc4081ce3788d81a8b1d4f3d284fcf3311ce820fe063c54a53914120b983c17e5ce1119fde
-
Filesize
60KB
MD510c54306eb26094c41db2344c40b25fe
SHA1870451dd209609de9c246caf6f803c9b7bdd2760
SHA2565c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af
SHA512c7fd6be522c59afe4c283270cfaa3bd83e6b1500866555558abd50fc4081ce3788d81a8b1d4f3d284fcf3311ce820fe063c54a53914120b983c17e5ce1119fde
-
Filesize
60KB
MD510c54306eb26094c41db2344c40b25fe
SHA1870451dd209609de9c246caf6f803c9b7bdd2760
SHA2565c740fb6bc2686819b4b2348dfc60336312281e97238f1a07625fb587c45c2af
SHA512c7fd6be522c59afe4c283270cfaa3bd83e6b1500866555558abd50fc4081ce3788d81a8b1d4f3d284fcf3311ce820fe063c54a53914120b983c17e5ce1119fde