Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 03:37
Behavioral task
behavioral1
Sample
6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3.exe
Resource
win10v2004-20220812-en
General
-
Target
6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3.exe
-
Size
267KB
-
MD5
3191a5550fe3cbe5fbb94d014b7ca48e
-
SHA1
6bac06e26974da605380fd832651c50b362689e4
-
SHA256
6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3
-
SHA512
e6b82aa1dd61770773bf86ef14c932c49ecdebb61ec04be5ebb6bc84e56a32d843d368abb04455c8e6fe02851b663c9dd87f1b7d7cff4a770792db70bc646fac
-
SSDEEP
6144:XbfO3SlNyTkyhlx0kRujRYO4VYAtHJ3DFLjxIE++/gAxcbibMoSL:LfIST8kk0kMlCPTvXxKXoSL
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\winlogon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe = "C:\\Users\\Admin\\AppData\\Roaming\\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 968 winlogon.exe 4772 winlogon.exe 4800 winlogon.exe -
resource yara_rule upx behavioral2/memory/1116-132-0x0000000000400000-0x000000000057E000-memory.dmp upx behavioral2/files/0x000300000001e64b-139.dat upx behavioral2/files/0x000300000001e64b-140.dat upx behavioral2/memory/1116-142-0x0000000000400000-0x000000000057E000-memory.dmp upx behavioral2/memory/4772-145-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/files/0x000300000001e64b-146.dat upx behavioral2/memory/4800-150-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/4772-148-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4772-151-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4800-155-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/files/0x000300000001e64b-152.dat upx behavioral2/memory/4800-157-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/968-158-0x0000000000400000-0x000000000057E000-memory.dmp upx behavioral2/memory/4800-166-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/4772-164-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4772-172-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 968 set thread context of 4772 968 winlogon.exe 85 PID 968 set thread context of 4800 968 winlogon.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 616 reg.exe 2088 reg.exe 4296 reg.exe 3348 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 4800 winlogon.exe Token: 1 4772 winlogon.exe Token: SeCreateTokenPrivilege 4772 winlogon.exe Token: SeAssignPrimaryTokenPrivilege 4772 winlogon.exe Token: SeLockMemoryPrivilege 4772 winlogon.exe Token: SeIncreaseQuotaPrivilege 4772 winlogon.exe Token: SeMachineAccountPrivilege 4772 winlogon.exe Token: SeTcbPrivilege 4772 winlogon.exe Token: SeSecurityPrivilege 4772 winlogon.exe Token: SeTakeOwnershipPrivilege 4772 winlogon.exe Token: SeLoadDriverPrivilege 4772 winlogon.exe Token: SeSystemProfilePrivilege 4772 winlogon.exe Token: SeSystemtimePrivilege 4772 winlogon.exe Token: SeProfSingleProcessPrivilege 4772 winlogon.exe Token: SeIncBasePriorityPrivilege 4772 winlogon.exe Token: SeCreatePagefilePrivilege 4772 winlogon.exe Token: SeCreatePermanentPrivilege 4772 winlogon.exe Token: SeBackupPrivilege 4772 winlogon.exe Token: SeRestorePrivilege 4772 winlogon.exe Token: SeShutdownPrivilege 4772 winlogon.exe Token: SeDebugPrivilege 4772 winlogon.exe Token: SeAuditPrivilege 4772 winlogon.exe Token: SeSystemEnvironmentPrivilege 4772 winlogon.exe Token: SeChangeNotifyPrivilege 4772 winlogon.exe Token: SeRemoteShutdownPrivilege 4772 winlogon.exe Token: SeUndockPrivilege 4772 winlogon.exe Token: SeSyncAgentPrivilege 4772 winlogon.exe Token: SeEnableDelegationPrivilege 4772 winlogon.exe Token: SeManageVolumePrivilege 4772 winlogon.exe Token: SeImpersonatePrivilege 4772 winlogon.exe Token: SeCreateGlobalPrivilege 4772 winlogon.exe Token: 31 4772 winlogon.exe Token: 32 4772 winlogon.exe Token: 33 4772 winlogon.exe Token: 34 4772 winlogon.exe Token: 35 4772 winlogon.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1116 6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3.exe 968 winlogon.exe 4772 winlogon.exe 4800 winlogon.exe 4772 winlogon.exe 4772 winlogon.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1116 wrote to memory of 4200 1116 6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3.exe 80 PID 1116 wrote to memory of 4200 1116 6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3.exe 80 PID 1116 wrote to memory of 4200 1116 6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3.exe 80 PID 4200 wrote to memory of 4808 4200 cmd.exe 83 PID 4200 wrote to memory of 4808 4200 cmd.exe 83 PID 4200 wrote to memory of 4808 4200 cmd.exe 83 PID 1116 wrote to memory of 968 1116 6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3.exe 84 PID 1116 wrote to memory of 968 1116 6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3.exe 84 PID 1116 wrote to memory of 968 1116 6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3.exe 84 PID 968 wrote to memory of 4772 968 winlogon.exe 85 PID 968 wrote to memory of 4772 968 winlogon.exe 85 PID 968 wrote to memory of 4772 968 winlogon.exe 85 PID 968 wrote to memory of 4772 968 winlogon.exe 85 PID 968 wrote to memory of 4772 968 winlogon.exe 85 PID 968 wrote to memory of 4772 968 winlogon.exe 85 PID 968 wrote to memory of 4772 968 winlogon.exe 85 PID 968 wrote to memory of 4772 968 winlogon.exe 85 PID 968 wrote to memory of 4800 968 winlogon.exe 86 PID 968 wrote to memory of 4800 968 winlogon.exe 86 PID 968 wrote to memory of 4800 968 winlogon.exe 86 PID 968 wrote to memory of 4800 968 winlogon.exe 86 PID 968 wrote to memory of 4800 968 winlogon.exe 86 PID 968 wrote to memory of 4800 968 winlogon.exe 86 PID 968 wrote to memory of 4800 968 winlogon.exe 86 PID 968 wrote to memory of 4800 968 winlogon.exe 86 PID 4772 wrote to memory of 4188 4772 winlogon.exe 87 PID 4772 wrote to memory of 4188 4772 winlogon.exe 87 PID 4772 wrote to memory of 4188 4772 winlogon.exe 87 PID 4772 wrote to memory of 4380 4772 winlogon.exe 93 PID 4772 wrote to memory of 4380 4772 winlogon.exe 93 PID 4772 wrote to memory of 4380 4772 winlogon.exe 93 PID 4772 wrote to memory of 4888 4772 winlogon.exe 92 PID 4772 wrote to memory of 4888 4772 winlogon.exe 92 PID 4772 wrote to memory of 4888 4772 winlogon.exe 92 PID 4772 wrote to memory of 2080 4772 winlogon.exe 90 PID 4772 wrote to memory of 2080 4772 winlogon.exe 90 PID 4772 wrote to memory of 2080 4772 winlogon.exe 90 PID 4188 wrote to memory of 2088 4188 cmd.exe 96 PID 4188 wrote to memory of 2088 4188 cmd.exe 96 PID 4188 wrote to memory of 2088 4188 cmd.exe 96 PID 2080 wrote to memory of 616 2080 cmd.exe 95 PID 2080 wrote to memory of 616 2080 cmd.exe 95 PID 2080 wrote to memory of 616 2080 cmd.exe 95 PID 4888 wrote to memory of 4296 4888 cmd.exe 97 PID 4888 wrote to memory of 4296 4888 cmd.exe 97 PID 4888 wrote to memory of 4296 4888 cmd.exe 97 PID 4380 wrote to memory of 3348 4380 cmd.exe 98 PID 4380 wrote to memory of 3348 4380 cmd.exe 98 PID 4380 wrote to memory of 3348 4380 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3.exe"C:\Users\Admin\AppData\Local\Temp\6daa40a506e0dd2a62b22af40e1d1d60a64d2b8065e2b0e8a204ce2abdeca7c3.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VuxZp.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe" /f3⤵
- Adds Run key to start application
PID:4808
-
-
-
C:\Users\Admin\AppData\Roaming\winlogon.exe"C:\Users\Admin\AppData\Roaming\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Roaming\winlogon.exewinlogon.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:2088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:616
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:4296
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogon.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogon.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:3348
-
-
-
-
C:\Users\Admin\AppData\Roaming\winlogon.exeC:\Users\Admin\AppData\Roaming\winlogon.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4800
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138B
MD54da6717f2c70f4bd32ad33a227a2ff47
SHA13d7f7159e1f695bd469287d1ad4ffa0841b407a8
SHA256a12bb2e5d2fb0b3c400ce311fae72995a00b57a97d23e4b9effec47cff189d07
SHA5126765314054ad9bf2164058248f3d3a17775176925abbe4376aec030dca3a5e59be8b9e96139941fec2b2e1a9bff38f87abdb29ea09a299d8ab7e23ecec4083df
-
Filesize
267KB
MD5744f8d76b4270b79afb27ecf92083abe
SHA16d2ef735d811772e79144c6af539dd3dbfc19834
SHA256e210848046dc94400d21ad50fec5876599246cfb73f67f71449cd59a0bbb495e
SHA512da89e9eb220a6a0758f4902274dbacc7280ace3481948a90b66a7b2811005449a53d1d4e300d977b701c7df1d8236c8edb31b2a2a8eb9a469f13f61d47da5d2d
-
Filesize
267KB
MD5744f8d76b4270b79afb27ecf92083abe
SHA16d2ef735d811772e79144c6af539dd3dbfc19834
SHA256e210848046dc94400d21ad50fec5876599246cfb73f67f71449cd59a0bbb495e
SHA512da89e9eb220a6a0758f4902274dbacc7280ace3481948a90b66a7b2811005449a53d1d4e300d977b701c7df1d8236c8edb31b2a2a8eb9a469f13f61d47da5d2d
-
Filesize
267KB
MD5744f8d76b4270b79afb27ecf92083abe
SHA16d2ef735d811772e79144c6af539dd3dbfc19834
SHA256e210848046dc94400d21ad50fec5876599246cfb73f67f71449cd59a0bbb495e
SHA512da89e9eb220a6a0758f4902274dbacc7280ace3481948a90b66a7b2811005449a53d1d4e300d977b701c7df1d8236c8edb31b2a2a8eb9a469f13f61d47da5d2d
-
Filesize
267KB
MD5744f8d76b4270b79afb27ecf92083abe
SHA16d2ef735d811772e79144c6af539dd3dbfc19834
SHA256e210848046dc94400d21ad50fec5876599246cfb73f67f71449cd59a0bbb495e
SHA512da89e9eb220a6a0758f4902274dbacc7280ace3481948a90b66a7b2811005449a53d1d4e300d977b701c7df1d8236c8edb31b2a2a8eb9a469f13f61d47da5d2d