Analysis
-
max time kernel
50s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 11:42
Static task
static1
Behavioral task
behavioral1
Sample
f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe
-
Size
4.9MB
-
MD5
db8a38379ad5247898089092cde44b15
-
SHA1
69cc18b0fffa49bbf447fc4efd7a0103493a7147
-
SHA256
f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9
-
SHA512
b4499968c60413b022421393ed499d762d4b08d62cc8062a7ab9664d81f7357b22cf9557f69a423b68868a9556337695d7c9c760cea4e9deaaa8a08dad0432b7
-
SSDEEP
98304:LtrbTA1fxCJ3JpUn1mWturpGwGsq1ixQHP542VjFL05FmO:Rc1W5an1yrUKq1s65TVjt0mO
Malware Config
Signatures
-
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftWindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\PoseidonC\\WinUpdate.exe" f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exedescription pid process target process PID 1080 set thread context of 2052 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "182" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exedescription pid process Token: SeShutdownPrivilege 2052 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exepid process 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe -
Suspicious use of SendNotifyMessage 10 IoCs
Processes:
f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exepid process 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 3848 LogonUI.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exef59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.execmd.exedescription pid process target process PID 1080 wrote to memory of 2052 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe PID 1080 wrote to memory of 2052 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe PID 1080 wrote to memory of 2052 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe PID 1080 wrote to memory of 2052 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe PID 1080 wrote to memory of 2052 1080 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe PID 2052 wrote to memory of 2372 2052 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe cmd.exe PID 2052 wrote to memory of 2372 2052 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe cmd.exe PID 2052 wrote to memory of 2372 2052 f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe cmd.exe PID 2372 wrote to memory of 5004 2372 cmd.exe reg.exe PID 2372 wrote to memory of 5004 2372 cmd.exe reg.exe PID 2372 wrote to memory of 5004 2372 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe"C:\Users\Admin\AppData\Local\Temp\f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe"C:\Users\Admin\AppData\Local\Temp\f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe"2⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\cmd.execmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
PID:5004
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39f7055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3848