Analysis
-
max time kernel
165s -
max time network
207s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:29
Behavioral task
behavioral1
Sample
ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe
Resource
win10v2004-20220812-en
General
-
Target
ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe
-
Size
822KB
-
MD5
35a799cc4f89847b0f61c901d7f4bdaf
-
SHA1
2533f7d078fee6726cda9b8e15fa35ba0e6f2911
-
SHA256
ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693
-
SHA512
5544e1c523867db5a4fa8ae3cc46565347ee547eeeed9b353997211ec17254a0263045d5cc09f901a371952be393d30b94e674dbb6b76a2becb69e74ba346458
-
SSDEEP
3072:XD80DhgAPXSOYjEC8nxEp4l79pEvkMDGQA40diM:XDzhnPCOS8n+s7epiQAN
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 14 IoCs
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-70554750" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-53342401" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-57951861" winlogon.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\E696D64614\winlogon.exe = "C:\\Users\\Admin\\E696D64614\\winlogon.exe:*:Enabled:@xpsp2res.dll,-28956246" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winlogon.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe -
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe -
Disables Task Manager via registry modification
-
Disables taskbar notifications via registry modification
-
Drops file in Drivers directory 1 IoCs
Processes:
winlogon.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts winlogon.exe -
Executes dropped EXE 3 IoCs
Processes:
winlogon.exewinlogon.exewinlogon.exepid process 1188 winlogon.exe 1040 winlogon.exe 1056 winlogon.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
Processes:
winlogon.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\escanh95.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcc2002s902.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcdsetup.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sdclt.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HiJackThis.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp32.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpnt.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\monsysnt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zauinst.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\prckiller.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avscan.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgemc.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieCrypto.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavlite40eng.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcmnhdlr.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mghtml.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nupdate.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tracerpt.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BullGuard.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\advxdwin.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explored.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvarch16.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pview95.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avupgsvc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\licmgr.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avkwctl9.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dv95.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvsvc32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpcmap.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DllNXOptions winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav95.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netmon.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SandboxieDcomLaunch.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luall.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navap.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbwinntw.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\acs.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ave32.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pfwadmin.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kerio-wrp-421-en-win.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexplorerv1.0.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sh.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symproxysvc.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guardhlp.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cpd.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\doors.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zonalarm.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VACFix.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vpcmap.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avptc32.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jed.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_findviru.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srwatch.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds2-nt.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vmsrvc.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SbieCtrl.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\callmsi.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perswf.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icsupp.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iris.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\neomonitor.exe\Debugger = "\"C:\\Users\\Admin\\E696D64614\\winlogon.exe\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\protectx.exe winlogon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSOSYNC.EXE winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\escanhnt.exe winlogon.exe -
Processes:
resource yara_rule behavioral1/memory/968-54-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/636-57-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/636-59-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/636-60-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/636-63-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/636-64-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/636-65-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/636-69-0x0000000000400000-0x000000000041C000-memory.dmp upx \Users\Admin\E696D64614\winlogon.exe upx \Users\Admin\E696D64614\winlogon.exe upx C:\Users\Admin\E696D64614\winlogon.exe upx C:\Users\Admin\E696D64614\winlogon.exe upx behavioral1/memory/636-75-0x0000000000400000-0x000000000041C000-memory.dmp upx C:\Users\Admin\E696D64614\winlogon.exe upx behavioral1/memory/1188-85-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/1040-91-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1056-92-0x0000000000400000-0x0000000000443000-memory.dmp upx C:\Users\Admin\E696D64614\winlogon.exe upx behavioral1/memory/1056-96-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1056-97-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1056-101-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/1056-102-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Drops startup file 1 IoCs
Processes:
winlogon.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Anytime Upgrade.exe winlogon.exe -
Loads dropped DLL 2 IoCs
Processes:
ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exepid process 636 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe 636 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpyWareDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecAntiVirus\DisableMonitoring = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\cval = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\DisableMonitoring = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring\SymantecFirewall winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\InternetSettingsDisableNotify = "1" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Monitoring winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winlogon.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
winlogon.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\E50B29BAACAA360FCC344254F83743208BA6735D23877EED = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\B9373D14A02BC13F1345A3F7BC53B8BCC98D3B04DD0CD9CF = "C:\\Users\\Admin\\E696D64614\\winlogon.exe" winlogon.exe -
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exewinlogon.exewinlogon.exedescription pid process target process PID 968 set thread context of 636 968 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe PID 1188 set thread context of 1040 1188 winlogon.exe winlogon.exe PID 1040 set thread context of 1056 1040 winlogon.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
Processes:
winlogon.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Control Panel\Sound winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Control Panel\Sound\Beep = "no" winlogon.exe -
Processes:
winlogon.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Disable Script Debugger = "Yes" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "no" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" winlogon.exe Set value (data) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbafda4d2839344b902c87c07ddf25a100000000020000000000106600000001000020000000e7e0a213ecd5b24e8df380f788606ff713fdc2f3f9aa5f6b3d5214ed0198e7ca000000000e800000000200002000000039a76d450dd1ac80902837c92dbb3ea6181951094a7d527afd029820a4df58d320000000d3d4db13c71420aac42eb92a23ecdba07f83acf6cc94a17749e672681c5851cd40000000b1b0780503154c1be47a8c2b6d0cbec154b931e5036088054872e294db492fe830e9d49ba1a343c8dddc2f95e9df6aa86537a6dd2b84ab989a01a9fe3315862c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376031941" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://vh762df0og47q5l.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://20t630o6v85bgv9.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Local Page = "http://k225d3p6k102arq.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\DOMStorage\buscaid.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://ikk5to1j76qy9d3.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://04x4y77pe5326x7.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Local Page = "http://d48692g606s5jlo.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://14fbd2r8piu47t9.directorio-w.com" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4081c903c4ffd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\DOMStorage\buscaid.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Download winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://u30f1695ia70k7k.directorio-w.com" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15BF7711-6BB7-11ED-B422-767CA9D977BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "1" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
Processes:
winlogon.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://fou681rtqqg5rp7.directorio-w.com" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://s258n3d6n8e2xhg.directorio-w.com" winlogon.exe -
Modifies registry class 24 IoCs
Processes:
winlogon.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winlogon.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
winlogon.exepid process 1056 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
winlogon.exedescription pid process Token: SeBackupPrivilege 1056 winlogon.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 1600 iexplore.exe 1600 iexplore.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exewinlogon.exewinlogon.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 636 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe 1040 winlogon.exe 1056 winlogon.exe 1600 iexplore.exe 1600 iexplore.exe 316 IEXPLORE.EXE 316 IEXPLORE.EXE 1600 iexplore.exe 1600 iexplore.exe 672 IEXPLORE.EXE 672 IEXPLORE.EXE 1056 winlogon.exe 1056 winlogon.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exeab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exewinlogon.exewinlogon.exeiexplore.exedescription pid process target process PID 968 wrote to memory of 952 968 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe svchost.exe PID 968 wrote to memory of 952 968 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe svchost.exe PID 968 wrote to memory of 952 968 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe svchost.exe PID 968 wrote to memory of 952 968 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe svchost.exe PID 968 wrote to memory of 636 968 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe PID 968 wrote to memory of 636 968 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe PID 968 wrote to memory of 636 968 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe PID 968 wrote to memory of 636 968 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe PID 968 wrote to memory of 636 968 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe PID 968 wrote to memory of 636 968 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe PID 968 wrote to memory of 636 968 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe PID 968 wrote to memory of 636 968 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe PID 636 wrote to memory of 1188 636 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe winlogon.exe PID 636 wrote to memory of 1188 636 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe winlogon.exe PID 636 wrote to memory of 1188 636 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe winlogon.exe PID 636 wrote to memory of 1188 636 ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe winlogon.exe PID 1188 wrote to memory of 1132 1188 winlogon.exe svchost.exe PID 1188 wrote to memory of 1132 1188 winlogon.exe svchost.exe PID 1188 wrote to memory of 1132 1188 winlogon.exe svchost.exe PID 1188 wrote to memory of 1132 1188 winlogon.exe svchost.exe PID 1188 wrote to memory of 1040 1188 winlogon.exe winlogon.exe PID 1188 wrote to memory of 1040 1188 winlogon.exe winlogon.exe PID 1188 wrote to memory of 1040 1188 winlogon.exe winlogon.exe PID 1188 wrote to memory of 1040 1188 winlogon.exe winlogon.exe PID 1188 wrote to memory of 1040 1188 winlogon.exe winlogon.exe PID 1188 wrote to memory of 1040 1188 winlogon.exe winlogon.exe PID 1188 wrote to memory of 1040 1188 winlogon.exe winlogon.exe PID 1188 wrote to memory of 1040 1188 winlogon.exe winlogon.exe PID 1040 wrote to memory of 1056 1040 winlogon.exe winlogon.exe PID 1040 wrote to memory of 1056 1040 winlogon.exe winlogon.exe PID 1040 wrote to memory of 1056 1040 winlogon.exe winlogon.exe PID 1040 wrote to memory of 1056 1040 winlogon.exe winlogon.exe PID 1040 wrote to memory of 1056 1040 winlogon.exe winlogon.exe PID 1040 wrote to memory of 1056 1040 winlogon.exe winlogon.exe PID 1040 wrote to memory of 1056 1040 winlogon.exe winlogon.exe PID 1040 wrote to memory of 1056 1040 winlogon.exe winlogon.exe PID 1040 wrote to memory of 1056 1040 winlogon.exe winlogon.exe PID 1600 wrote to memory of 316 1600 iexplore.exe IEXPLORE.EXE PID 1600 wrote to memory of 316 1600 iexplore.exe IEXPLORE.EXE PID 1600 wrote to memory of 316 1600 iexplore.exe IEXPLORE.EXE PID 1600 wrote to memory of 316 1600 iexplore.exe IEXPLORE.EXE PID 1600 wrote to memory of 672 1600 iexplore.exe IEXPLORE.EXE PID 1600 wrote to memory of 672 1600 iexplore.exe IEXPLORE.EXE PID 1600 wrote to memory of 672 1600 iexplore.exe IEXPLORE.EXE PID 1600 wrote to memory of 672 1600 iexplore.exe IEXPLORE.EXE -
System policy modification 1 TTPs 6 IoCs
Processes:
winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe"C:\Users\Admin\AppData\Local\Temp\ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693.exe
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:1132
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1056
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:240
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:209928 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5af5f3edcc5c42af19df5a9637b0a6964
SHA1e8fe31cf10a2a7dbd22eafd34f1deeb1cf283d48
SHA2569a0f77f3cce19edf7216c9745a34ac8d7123462f76dcb8fd901b23a6be9dd96b
SHA512ede2af144a198e413cf1c0e4b5cf5c9e77b8ffd6a3f82e81154019076cf7f6448d1b82346d1c0f48f60a37c728c23bc9e1133447752feab64f5211ed18276e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD5f7801fe8b983652ae788bc952856c2ed
SHA1f3898da21792b146a9f856e87ed3520d76277fb8
SHA256faa1bc8a9887e2dc694ff645546ea16cb96ac4bd1b0c460aef95f2cced100d6b
SHA512ac642881315553a5a50ee7ab20015809f90c297cdf674f34a1e709859aa1b89fcb9caca242333e862b379cbd2b35991b6e54de56d2e643487f9aa4f984b93a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
Filesize1KB
MD57055fbc792b81e2fcdb72da9d3e6ad81
SHA1dec614359d5d9e76c20aadd3d467037e6a9665ff
SHA2560eb7311d9c9d181942fd9c9ff0217a360ae91829d0dd6df95a8247625eccae34
SHA512b1a94b289211cba78d11888c30d2e6b16fb21fc21476c69e8c9ae618f169ca02f6ddaeac72e1e8bce3a0ea9f4bfbd4e47005703963b6cdf46773d27c34e16f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
Filesize1KB
MD5ad6d84486c3194ab2f71ef94912fdddc
SHA189aeb9ea77a27510b11762db5acef5654b62ea4b
SHA256437fe72dd5a616c3db9a8e0c4823731abdd627641879ed511e9cf86994492789
SHA5120e37e80588d96a6fb9fe34c0d34d688bb64f3540185fa9e2cb1ed0504229003f3bc31be717a390d3acc668bbfb7a1645cc52bb9e4235afc85a23653ead8ad09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD57d278f0c8451c89c8396a9a5e47ecc71
SHA10876608ff61336ce9a0801c449c11455f37dbac6
SHA256656973b41f5690df6718f776a48d672fa902b4885da678c426808411a1e92fa2
SHA512d93e7970f75a126b5fc7aa177c42968c54e5425ab8d17d37c8bde69f120e35497d2e1d1511d0015f50462789db33ae96a7cd10a3ae4ccd34417b6f0c1a7d2c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD5e95621732f6792c7e4c0507d4ac24f09
SHA1538163eae799e60a66a5cbbca87dc633b7ffd215
SHA2569af61c9331e9b08f1b577af99043f6893912b3ef03d4d9f3a43f4f99492f55b8
SHA51254b9bb35e4931ea53c8ef28161f9038cea6ef119d9c51566ad9cfac31186951a202ee6541e40a6d33b67b333871f97284122ba5a3a487d91cb1865acbb0b3990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562
Filesize466B
MD5dd0b064b6d0ea3e577e7f491c5c4e66a
SHA120ac7e0029ccee13637702337e9301ed58ccda40
SHA2561366159d03731092a33281fcc37c2c321d23b01bff777b2f6f055605dc6cd50d
SHA5123ad1937e4b62c4b506df7149127f946344e3eba586f036807a26ab5086c1a01e72682dd69cbaaec0e939360927bffb056a0e91fccf86ad8183f6839e9bd63814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a4b0263ec203e87a1f6f5cd0ce48cea
SHA1d9a12c4bbcf8fdbaa0dd6136bc582ad985d54269
SHA256a6f5ac6b2fd71226b6b5bb83df68c938e17f01ea325d5c4062302bb1ed7f7edd
SHA512bf3849a6bf063ed77e8bc1b77525bfe9a41c6f61d89cc3cdaf5c8e3c1168e692cce42e295a9bd8dc1f496552dda527562bbb15cc19163b46a23936baf6e22b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871d20538b749418b8f6dfbc2912870f
SHA1ca963eb4c5dbd8772a30b7ffbe9ce3f3125a6cff
SHA2560c45e0324d7b4a1f78f3378e2ed07588f2db05e9c1b67a81a2cbd24a5952f639
SHA5122072608e9e65db45f6e40855fb19beaaaaf58b85f4e5eb6096b491b6de88b329b4e0e79a0b165f1cb18219e06a4160213d0823a555cf7b65fc9c55adfc0c0999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515071a489cb6f744fdcf1043716cdb93
SHA130babbf73327c1423d243d300cc99b5a67d90d7d
SHA256de637fe29c7e735e7f3f2f9089547bc296466769be3784a3d1e7d03cf6546117
SHA5122bd8288a0dab5fad1956d6e08d5975a5373c8a210cdb1dd148cd78263a10b1069789f1ab178003997dff6a9236019b442542dbf23bf8a5ea8c6778cc9b52f0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5448c6ba4ea928d589ae140ba96986855
SHA156f04d575966b21ccde7625adde5b3ca7cac6200
SHA256d08745e9177bee8c410ea69ffe596836331352f0280bf240df0bcb903ae4adaa
SHA512bd2bd8d6ab2709e2355b6c46148044c782725181c98bcc73ee9652e7e537abdffdb9accd42f175438ce953066698a73299dda6a521a2dd9789791bb93cb44993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1dba0069f9e595e8573de8637001389
SHA1073bea0de61672bf6b022c90161bc60b101f88ed
SHA256d40854c34edab7af5f175b826ed2edee0de6fbaf6f2d337e55dff0bacc9f40b2
SHA51204b8f363a859b9ffbdc4f8591f1e2e87881d41da4afb01648bb1198e2cd16f553ec3dae77c5fa3677bf22d3045b8ef52d81fb1953260c068a8753750957ba10e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f19c82e369fb4f32c86629969ad0ad
SHA141fa0bc175357b93281f830951230023b8bc4433
SHA256333708c38e81c4cf0431ee442644c33276aa755d1e15578fe848823e8ed83e82
SHA512086eebe013ca13ac485ca568cb3a16b750f9160d8abf949095032f296055b9922aaef05d32f6dd81c94e7199615a0d6dfd5a1928232a099e92a785b330ecea77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b47e74094579be48aa5beaf7b7c655
SHA1469b5e98e913b05e3a91f94a5c9b5eeb87404c56
SHA2562081be04b7f0f94c7d7050a1260cbf76984a0c2829b4dbbc52c83041cba2f92e
SHA512108f91fb45dd18deefc2798329c054d2005dcbd8ebdc847605daf5fdc523ced66808b45b2109f9b256bc942738648e914a805e6efc801133dfef125dee75679a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26
Filesize470B
MD590d7fd1b5bf9c4e87deed583aaefd06a
SHA18a4bee6a5ab51336330f2f87a3f057f336554519
SHA2562fb6a927e688f993c57eef31f3978dcc07fa21d0d4ddb18a1305a057b1ffbf52
SHA5122cb143fe7ef1916bbb1b4b3c4e156305934f76e48ea185dcd7d711fef6a0079499a26afc4065aaaca69a52c549276dbbf8f0aa03a1d6e14d3e39d1f51eb0f099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5565146b1c6376511b7d736fd200c2d8f
SHA1c169a20fa173d9f8fd4c85255b92ab26fcf0e568
SHA25676e5cf5d371a2a9b410b702382f96368076941f96914f3313cf94a6ed881a7a3
SHA512319c8a7df082669d0aa29f8efc7cfb70041cbab7b099532d0742438ad10203b44e65f1f9f813a5d20f613af80219f4bbad9e47bed160ef40087f769cac19c947
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
593B
MD59b06ae3b86ebb91f4fbb14e67d07f824
SHA1903771432cb5b9248ca0da04191d95a8d8ce9d4e
SHA256c99e8c13200e11c984bf1c2b376eec860f34ddaf36362e18249c0d52c15d1491
SHA512ce077061c80895029b7ea0261a29744bb9f562d1ab496835923b561031c650f7e0d3e7d91b480530abf93e26733889878bd35957f398d7dd7cba2c183c9d075f
-
Filesize
822KB
MD535a799cc4f89847b0f61c901d7f4bdaf
SHA12533f7d078fee6726cda9b8e15fa35ba0e6f2911
SHA256ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693
SHA5125544e1c523867db5a4fa8ae3cc46565347ee547eeeed9b353997211ec17254a0263045d5cc09f901a371952be393d30b94e674dbb6b76a2becb69e74ba346458
-
Filesize
822KB
MD535a799cc4f89847b0f61c901d7f4bdaf
SHA12533f7d078fee6726cda9b8e15fa35ba0e6f2911
SHA256ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693
SHA5125544e1c523867db5a4fa8ae3cc46565347ee547eeeed9b353997211ec17254a0263045d5cc09f901a371952be393d30b94e674dbb6b76a2becb69e74ba346458
-
Filesize
822KB
MD535a799cc4f89847b0f61c901d7f4bdaf
SHA12533f7d078fee6726cda9b8e15fa35ba0e6f2911
SHA256ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693
SHA5125544e1c523867db5a4fa8ae3cc46565347ee547eeeed9b353997211ec17254a0263045d5cc09f901a371952be393d30b94e674dbb6b76a2becb69e74ba346458
-
Filesize
822KB
MD535a799cc4f89847b0f61c901d7f4bdaf
SHA12533f7d078fee6726cda9b8e15fa35ba0e6f2911
SHA256ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693
SHA5125544e1c523867db5a4fa8ae3cc46565347ee547eeeed9b353997211ec17254a0263045d5cc09f901a371952be393d30b94e674dbb6b76a2becb69e74ba346458
-
Filesize
822KB
MD535a799cc4f89847b0f61c901d7f4bdaf
SHA12533f7d078fee6726cda9b8e15fa35ba0e6f2911
SHA256ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693
SHA5125544e1c523867db5a4fa8ae3cc46565347ee547eeeed9b353997211ec17254a0263045d5cc09f901a371952be393d30b94e674dbb6b76a2becb69e74ba346458
-
Filesize
822KB
MD535a799cc4f89847b0f61c901d7f4bdaf
SHA12533f7d078fee6726cda9b8e15fa35ba0e6f2911
SHA256ab4ba0518f0c4162d509c0c5cf96d0819fe675817a9bf8ea95962c71ebf4b693
SHA5125544e1c523867db5a4fa8ae3cc46565347ee547eeeed9b353997211ec17254a0263045d5cc09f901a371952be393d30b94e674dbb6b76a2becb69e74ba346458