Analysis
-
max time kernel
162s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe
Resource
win10v2004-20220812-en
General
-
Target
c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe
-
Size
100KB
-
MD5
0d5a6faadb05d882b42df36002ecea00
-
SHA1
7d5d7fedd8121fefe4d2ec06acff374fb990a7bf
-
SHA256
c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d
-
SHA512
5b28b9a6ab9407fcac4a7c022794555703199babed6dfed5370894cd7417ed42f04baeb24ebe2d710b98906871e31d8d78460c382bcc69f9ddd31aba266d65af
-
SSDEEP
1536:QbWJH5M6CzfUOQKmy0IYf8Yj9Qf5YcZ6QBoJug8bdc:QbWJZM/U1KmrId84ucZ6go0g8bdc
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\protocol winlogon.exe -
Executes dropped EXE 3 IoCs
pid Process 2880 winlogon.exe 5024 winlogon.exe 4576 csrss.exe -
resource yara_rule behavioral2/memory/5024-139-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/5024-140-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/5024-141-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/5024-144-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/5024-145-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/5024-146-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/5024-156-0x0000000000400000-0x0000000000489000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation winlogon.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Windows\\winlogon.exe" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*-87497009 = "\"|\"" winlogon.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\*-87497009 = "\"|\"" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Windows\\winlogon.exe" winlogon.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum winlogon.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 = "xobv" winlogon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2880 set thread context of 5024 2880 winlogon.exe 82 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\winlogon.exe c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe File opened for modification C:\Windows\winlogon.exe c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe File opened for modification C:\Windows\winlogon.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1448 c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe 1448 c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe 1448 c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe 1448 c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe 2880 winlogon.exe 2880 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 4576 csrss.exe 4576 csrss.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 4576 csrss.exe 4576 csrss.exe 4576 csrss.exe 4576 csrss.exe 4576 csrss.exe 4576 csrss.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 4576 csrss.exe 4576 csrss.exe 4576 csrss.exe 5024 winlogon.exe 5024 winlogon.exe 4576 csrss.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 4576 csrss.exe 4576 csrss.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 4576 csrss.exe 4576 csrss.exe 4576 csrss.exe 4576 csrss.exe 4576 csrss.exe 4576 csrss.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 5024 winlogon.exe 4576 csrss.exe 4576 csrss.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1448 c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe Token: SeDebugPrivilege 2880 winlogon.exe Token: SeDebugPrivilege 4576 csrss.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2880 1448 c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe 81 PID 1448 wrote to memory of 2880 1448 c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe 81 PID 1448 wrote to memory of 2880 1448 c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe 81 PID 2880 wrote to memory of 5024 2880 winlogon.exe 82 PID 2880 wrote to memory of 5024 2880 winlogon.exe 82 PID 2880 wrote to memory of 5024 2880 winlogon.exe 82 PID 2880 wrote to memory of 5024 2880 winlogon.exe 82 PID 2880 wrote to memory of 5024 2880 winlogon.exe 82 PID 2880 wrote to memory of 5024 2880 winlogon.exe 82 PID 2880 wrote to memory of 5024 2880 winlogon.exe 82 PID 2880 wrote to memory of 5024 2880 winlogon.exe 82 PID 2880 wrote to memory of 4576 2880 winlogon.exe 83 PID 2880 wrote to memory of 4576 2880 winlogon.exe 83 PID 2880 wrote to memory of 4576 2880 winlogon.exe 83 PID 5024 wrote to memory of 4656 5024 winlogon.exe 86 PID 5024 wrote to memory of 4656 5024 winlogon.exe 86 PID 5024 wrote to memory of 4656 5024 winlogon.exe 86 PID 5024 wrote to memory of 448 5024 winlogon.exe 88 PID 5024 wrote to memory of 448 5024 winlogon.exe 88 PID 5024 wrote to memory of 448 5024 winlogon.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe"C:\Users\Admin\AppData\Local\Temp\c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\winlogon.exe"C:\Windows\winlogon.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\winlogon.exe"C:\Windows\winlogon.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\I-87497009.bat" "4⤵PID:4656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\U-87497009.bat" "4⤵PID:448
-
-
-
C:\Users\Admin\AppData\Roaming\csrss.exe"C:\Users\Admin\AppData\Roaming\csrss.exe" -keyhide -prochide 50243⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23B
MD597aae1211f3a9c7ecd8531ee87ed5354
SHA13cec50b07d80bb054e90458d795e9867ba678851
SHA2568668f8216a6e5ab8ff1fb5d4ad886ba768c843eb98394cd260d53e8ed4fbc145
SHA5120fd8e9b2eb6a92794b569b7a29ff6609e81e1bb90ef2cb58cec29cf6c37b32fd82879ad24a1a7fef0ade0c6a8a3a1a7b7d7b7171e0c36cfac0b24df52aba6f1e
-
Filesize
148B
MD5f9306f9e4a6883db6b5a1d4b193a5bfe
SHA1e906f67cdba667ceef9ac67930e29358fa696fe9
SHA256254752c9726228c0109a77990a75c423b07c57b7be9162e99526d9d55db7b80f
SHA512c5e37d3440e8beaf5062f967d38ca27c9624cb8627afaf909d0c5751634cd849d1438d2f54c39b3df8271d6c3b812e86d72e21290b71a0bf52511e1ccd818578
-
Filesize
100KB
MD50d5a6faadb05d882b42df36002ecea00
SHA17d5d7fedd8121fefe4d2ec06acff374fb990a7bf
SHA256c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d
SHA5125b28b9a6ab9407fcac4a7c022794555703199babed6dfed5370894cd7417ed42f04baeb24ebe2d710b98906871e31d8d78460c382bcc69f9ddd31aba266d65af
-
Filesize
100KB
MD50d5a6faadb05d882b42df36002ecea00
SHA17d5d7fedd8121fefe4d2ec06acff374fb990a7bf
SHA256c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d
SHA5125b28b9a6ab9407fcac4a7c022794555703199babed6dfed5370894cd7417ed42f04baeb24ebe2d710b98906871e31d8d78460c382bcc69f9ddd31aba266d65af
-
Filesize
100KB
MD50d5a6faadb05d882b42df36002ecea00
SHA17d5d7fedd8121fefe4d2ec06acff374fb990a7bf
SHA256c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d
SHA5125b28b9a6ab9407fcac4a7c022794555703199babed6dfed5370894cd7417ed42f04baeb24ebe2d710b98906871e31d8d78460c382bcc69f9ddd31aba266d65af
-
Filesize
100KB
MD50d5a6faadb05d882b42df36002ecea00
SHA17d5d7fedd8121fefe4d2ec06acff374fb990a7bf
SHA256c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d
SHA5125b28b9a6ab9407fcac4a7c022794555703199babed6dfed5370894cd7417ed42f04baeb24ebe2d710b98906871e31d8d78460c382bcc69f9ddd31aba266d65af
-
Filesize
100KB
MD50d5a6faadb05d882b42df36002ecea00
SHA17d5d7fedd8121fefe4d2ec06acff374fb990a7bf
SHA256c665becd2d778b838224b158f9864b695cda2c05d9492f8db93d1c4b1080847d
SHA5125b28b9a6ab9407fcac4a7c022794555703199babed6dfed5370894cd7417ed42f04baeb24ebe2d710b98906871e31d8d78460c382bcc69f9ddd31aba266d65af