Analysis
-
max time kernel
184s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 05:36
Behavioral task
behavioral1
Sample
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe
Resource
win10v2004-20220812-en
General
-
Target
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe
-
Size
1.7MB
-
MD5
4067b8f337c4b4e2f859894e2d353a6e
-
SHA1
bb5f53cdf274ebb0c38dd6fa6ec53c6731dfffde
-
SHA256
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2
-
SHA512
5444291420309b8a65d14b6f434f92acee8c038b55898b2a0c5383b5b26a88d6e377c05e6079c7b74fb84bd237889cc56bd98c0ceb44698a38f974a875d458b6
-
SSDEEP
49152:tTu0LSVHASxN9aD7sOP93ZPaZRNsa95ZN5T:ty0mVgSxa872av9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
Processes:
Winlogon.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell Winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\1ceb3rg.exe\"" Winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit Winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\1ceb3rg.exe\"" Winlogon.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
Winlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Winlogon.exe -
Processes:
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exeWinlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Winlogon.exe -
Processes:
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exeWinlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" Winlogon.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
Winlogon.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run Winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\1ceb3rg.exe\"" Winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\disableregistrytools = "1" reg.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
Processes:
Winlogon.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts Winlogon.exe -
Executes dropped EXE 3 IoCs
Processes:
Winlogon.exe41125.exemsiinst.exepid process 3256 Winlogon.exe 5100 41125.exe 4572 msiinst.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral2/memory/388-132-0x0000000000400000-0x0000000000451000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\Winlogon.exe upx C:\Users\Admin\AppData\Local\Temp\Winlogon.exe upx behavioral2/memory/3256-140-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/3256-145-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/388-146-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/388-150-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exeWinlogon.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Wine 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Wine Winlogon.exe -
Processes:
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exeWinlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" Winlogon.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
Winlogon.exe41125.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\1ceb3rg.exe\"" Winlogon.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 41125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 41125.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run Winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\1ceb3rg.exe\"" Winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Winlogon.exe -
Processes:
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exeWinlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Winlogon.exe -
Drops file in Program Files directory 21 IoCs
Processes:
Winlogon.exedescription ioc process File created C:\Program Files\Direct Connect\Received Files\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\LimeWire\Shared\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\XoloX\Downloads\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Ares\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Filetopia3\Files\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Grokster\My Grokster\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\BearShare\Shared\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\KaZaA Lite\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Overnet\incoming\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Rapigator\Share\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\ICQ\shared files\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\WinMX\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\KaZaA\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\EDONKEY2000\incoming\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\KMD\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Swaptor\Download\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Morpheus\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\appleJuice\incoming\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Gnucleus\Downloads\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Tesla\Files\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\eMule\Incoming\PhotoshopCS6.exe Winlogon.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2108 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exeWinlogon.exepid process 388 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe 388 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe 388 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe 388 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe 3256 Winlogon.exe 3256 Winlogon.exe 3256 Winlogon.exe 3256 Winlogon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exeWinlogon.exedescription pid process Token: SeBackupPrivilege 388 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe Token: SeBackupPrivilege 3256 Winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exeWinlogon.exepid process 388 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe 3256 Winlogon.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exeWinlogon.exenet.exe41125.exedescription pid process target process PID 388 wrote to memory of 3256 388 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe Winlogon.exe PID 388 wrote to memory of 3256 388 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe Winlogon.exe PID 388 wrote to memory of 3256 388 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe Winlogon.exe PID 3256 wrote to memory of 3876 3256 Winlogon.exe reg.exe PID 3256 wrote to memory of 3876 3256 Winlogon.exe reg.exe PID 3256 wrote to memory of 3876 3256 Winlogon.exe reg.exe PID 3256 wrote to memory of 2108 3256 Winlogon.exe sc.exe PID 3256 wrote to memory of 2108 3256 Winlogon.exe sc.exe PID 3256 wrote to memory of 2108 3256 Winlogon.exe sc.exe PID 3256 wrote to memory of 856 3256 Winlogon.exe net.exe PID 3256 wrote to memory of 856 3256 Winlogon.exe net.exe PID 3256 wrote to memory of 856 3256 Winlogon.exe net.exe PID 856 wrote to memory of 4432 856 net.exe net1.exe PID 856 wrote to memory of 4432 856 net.exe net1.exe PID 856 wrote to memory of 4432 856 net.exe net1.exe PID 388 wrote to memory of 5100 388 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe 41125.exe PID 388 wrote to memory of 5100 388 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe 41125.exe PID 388 wrote to memory of 5100 388 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe 41125.exe PID 5100 wrote to memory of 4572 5100 41125.exe msiinst.exe PID 5100 wrote to memory of 4572 5100 41125.exe msiinst.exe PID 5100 wrote to memory of 4572 5100 41125.exe msiinst.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exeWinlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe"C:\Users\Admin\AppData\Local\Temp\596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2.exe"1⤵
- UAC bypass
- Windows security bypass
- Identifies Wine through registry keys
- Windows security modification
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:388 -
C:\Users\Admin\AppData\Local\Temp\Winlogon.exeC:\Users\Admin\AppData\Local\Temp\Winlogon.exe2⤵
- Modifies WinLogon for persistence
- Modifies security service
- UAC bypass
- Windows security bypass
- Adds policy Run key to start application
- Drops file in Drivers directory
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3256 -
C:\Windows\SysWOW64\reg.exereg add hkcu\software\microsoft\windows\currentversion\policies\system /v disableregistrytools /t reg_dword /d "1" /f3⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:3876 -
C:\Windows\SysWOW64\sc.exesc stop SharedAccess3⤵
- Launches sc.exe
PID:2108 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\41125.exeC:\Users\Admin\AppData\Local\Temp\41125.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msiinst.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msiinst.exe /i instmsi.msi MSIEXECREG=1 /m /qb+!3⤵
- Executes dropped EXE
PID:4572
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
3Impair Defenses
1Modify Registry
9Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD543f7305c2e5dd4a8f3c5abeb2ffe4833
SHA103bda624ab7f0d7cb9ada41a960c35c0152f98fd
SHA256267304efcc831e35927c1f25d610d36fb64121d108a6f4ff0168c53df01e2b16
SHA512e24072f1b5b102fbd52126396854463ff07d8d0efce1d922ed99acd0369cff163e415abc1faeaf559ef7898e5f82945db544a0f425db0db42696282d0acd7c7c
-
Filesize
1.6MB
MD543f7305c2e5dd4a8f3c5abeb2ffe4833
SHA103bda624ab7f0d7cb9ada41a960c35c0152f98fd
SHA256267304efcc831e35927c1f25d610d36fb64121d108a6f4ff0168c53df01e2b16
SHA512e24072f1b5b102fbd52126396854463ff07d8d0efce1d922ed99acd0369cff163e415abc1faeaf559ef7898e5f82945db544a0f425db0db42696282d0acd7c7c
-
Filesize
36KB
MD55e9189e28544286137eb313100835892
SHA1a8ae60ab85015e70a2cdf171919b3296b5b831d1
SHA256a68d8931dc6ddf89cd36374f1fa5a01aaca3fb4694610cd9ef1ff62d53332515
SHA51211eb6914b78738517b483ad21bc0282c78580b5bf7f9c9abc6570fedb5d82775cda2cb629c7c37e636937637103cb19d282b6e3175bfc1edf6e0484f1810b52c
-
Filesize
36KB
MD55e9189e28544286137eb313100835892
SHA1a8ae60ab85015e70a2cdf171919b3296b5b831d1
SHA256a68d8931dc6ddf89cd36374f1fa5a01aaca3fb4694610cd9ef1ff62d53332515
SHA51211eb6914b78738517b483ad21bc0282c78580b5bf7f9c9abc6570fedb5d82775cda2cb629c7c37e636937637103cb19d282b6e3175bfc1edf6e0484f1810b52c
-
Filesize
1.7MB
MD54067b8f337c4b4e2f859894e2d353a6e
SHA1bb5f53cdf274ebb0c38dd6fa6ec53c6731dfffde
SHA256596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2
SHA5125444291420309b8a65d14b6f434f92acee8c038b55898b2a0c5383b5b26a88d6e377c05e6079c7b74fb84bd237889cc56bd98c0ceb44698a38f974a875d458b6
-
Filesize
1.7MB
MD54067b8f337c4b4e2f859894e2d353a6e
SHA1bb5f53cdf274ebb0c38dd6fa6ec53c6731dfffde
SHA256596d29b8563a1382954a5f845fe17e324b940e5a02d2f3d4c3d9782b8561d0a2
SHA5125444291420309b8a65d14b6f434f92acee8c038b55898b2a0c5383b5b26a88d6e377c05e6079c7b74fb84bd237889cc56bd98c0ceb44698a38f974a875d458b6