Analysis
-
max time kernel
114s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 12:54
Behavioral task
behavioral1
Sample
342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe
Resource
win10v2004-20220901-en
General
-
Target
342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe
-
Size
134KB
-
MD5
e5c0fd76b28849ea17e101570d1de0a6
-
SHA1
ae058d5c36fe832aebf33b05ef8bfe2b22ce1a1c
-
SHA256
342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0
-
SHA512
25f16d57a92be4c85eb2df359d7b8d570573c916aef801271e1d519164ac261f5337c1082a5c48db3dd24fb3f1b6c3832182b37ba4f8cc8144f6dc6dfb5ee1b9
-
SSDEEP
3072:oGl+oBSf7Xcd/ZRUAglgJhUanw441Gl+oBSf7Xcd/ZRUAglgJhUanw44:oGl+OSf7XcdSgXlw4iGl+OSf7XcdSgX1
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
Processes:
Winlogon.exeWinlogon.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Iceberg.exe\"" Winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit Winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Iceberg.exe\"" Winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell Winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Iceberg.exe\"" Winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit Winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Iceberg.exe\"" Winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell Winlogon.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
Winlogon.exeWinlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Winlogon.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Winlogon.exe -
Processes:
342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exeWinlogon.exe30261.exeWinlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 30261.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Winlogon.exe -
Processes:
Winlogon.exe30261.exeWinlogon.exe342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" Winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 30261.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" Winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
Winlogon.exeWinlogon.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run Winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Iceberg.exe\"" Winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run Winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Iceberg.exe\"" Winlogon.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\disableregistrytools = "1" reg.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 3 IoCs
Processes:
Winlogon.exe30261.exeWinlogon.exepid process 2800 Winlogon.exe 5024 30261.exe 5084 Winlogon.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral2/memory/4908-133-0x0000000000400000-0x0000000000451000-memory.dmp upx C:\Winlogon.exe upx \??\c:\Winlogon.exe upx behavioral2/memory/2800-140-0x0000000000400000-0x0000000000451000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\30261.exe upx C:\Users\Admin\AppData\Local\Temp\30261.exe upx C:\Winlogon.exe upx behavioral2/memory/5024-153-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/4908-155-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/2800-156-0x0000000000400000-0x0000000000451000-memory.dmp upx C:\Users\Admin\AppData\Roaming\Iceberg.exe upx behavioral2/memory/5084-162-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/5024-163-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exeWinlogon.exe30261.exeWinlogon.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Wine 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Wine Winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Wine 30261.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Wine Winlogon.exe -
Processes:
Winlogon.exe342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exeWinlogon.exe30261.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" Winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" Winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 30261.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
Winlogon.exeWinlogon.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Iceberg.exe\"" Winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Iceberg.exe\"" Winlogon.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run Winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Iceberg.exe\"" Winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Iceberg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Iceberg.exe\"" Winlogon.exe -
Processes:
Winlogon.exe342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exeWinlogon.exe30261.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 30261.exe -
Drops file in Program Files directory 42 IoCs
Processes:
Winlogon.exeWinlogon.exedescription ioc process File created C:\Program Files\eMule\Incoming\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Filetopia3\Files\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\XoloX\Downloads\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Morpheus\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\LimeWire\Shared\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Ares\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\EDONKEY2000\incoming\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\LimeWire\Shared\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Grokster\My Grokster\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\BearShare\Shared\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\ICQ\shared files\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\appleJuice\incoming\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Overnet\incoming\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\XoloX\Downloads\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\EDONKEY2000\incoming\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\WinMX\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Tesla\Files\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Grokster\My Grokster\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Morpheus\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\ICQ\shared files\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\eMule\Incoming\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\KaZaA\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\BearShare\Shared\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Ares\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Swaptor\Download\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Rapigator\Share\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Swaptor\Download\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\KaZaA Lite\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\WinMX\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Filetopia3\Files\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Tesla\Files\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Gnucleus\Downloads\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Overnet\incoming\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\appleJuice\incoming\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\KaZaA\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Direct Connect\Received Files\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Gnucleus\Downloads\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Rapigator\Share\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\KMD\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\KaZaA Lite\My Shared Folder\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\Direct Connect\Received Files\PhotoshopCS6.exe Winlogon.exe File created C:\Program Files\KMD\My Shared Folder\PhotoshopCS6.exe Winlogon.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 3656 sc.exe 4532 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 2 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exeWinlogon.exe30261.exeWinlogon.exepid process 4908 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe 4908 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe 4908 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe 4908 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe 2800 Winlogon.exe 2800 Winlogon.exe 2800 Winlogon.exe 2800 Winlogon.exe 5024 30261.exe 5024 30261.exe 5024 30261.exe 5024 30261.exe 5084 Winlogon.exe 5084 Winlogon.exe 5084 Winlogon.exe 5084 Winlogon.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exeWinlogon.exe30261.exeWinlogon.exedescription pid process Token: SeBackupPrivilege 4908 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe Token: SeBackupPrivilege 2800 Winlogon.exe Token: SeBackupPrivilege 5024 30261.exe Token: SeBackupPrivilege 5084 Winlogon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exeWinlogon.exe30261.exeWinlogon.exepid process 4908 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe 2800 Winlogon.exe 5024 30261.exe 5084 Winlogon.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exeWinlogon.exenet.exe30261.exeWinlogon.exenet.exedescription pid process target process PID 4908 wrote to memory of 2800 4908 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe Winlogon.exe PID 4908 wrote to memory of 2800 4908 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe Winlogon.exe PID 4908 wrote to memory of 2800 4908 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe Winlogon.exe PID 2800 wrote to memory of 2432 2800 Winlogon.exe reg.exe PID 2800 wrote to memory of 2432 2800 Winlogon.exe reg.exe PID 2800 wrote to memory of 2432 2800 Winlogon.exe reg.exe PID 2800 wrote to memory of 3656 2800 Winlogon.exe sc.exe PID 2800 wrote to memory of 3656 2800 Winlogon.exe sc.exe PID 2800 wrote to memory of 3656 2800 Winlogon.exe sc.exe PID 2800 wrote to memory of 3212 2800 Winlogon.exe net.exe PID 2800 wrote to memory of 3212 2800 Winlogon.exe net.exe PID 2800 wrote to memory of 3212 2800 Winlogon.exe net.exe PID 4908 wrote to memory of 5024 4908 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe 30261.exe PID 4908 wrote to memory of 5024 4908 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe 30261.exe PID 4908 wrote to memory of 5024 4908 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe 30261.exe PID 3212 wrote to memory of 1356 3212 net.exe net1.exe PID 3212 wrote to memory of 1356 3212 net.exe net1.exe PID 3212 wrote to memory of 1356 3212 net.exe net1.exe PID 5024 wrote to memory of 5084 5024 30261.exe Winlogon.exe PID 5024 wrote to memory of 5084 5024 30261.exe Winlogon.exe PID 5024 wrote to memory of 5084 5024 30261.exe Winlogon.exe PID 5084 wrote to memory of 3720 5084 Winlogon.exe reg.exe PID 5084 wrote to memory of 3720 5084 Winlogon.exe reg.exe PID 5084 wrote to memory of 3720 5084 Winlogon.exe reg.exe PID 5084 wrote to memory of 4532 5084 Winlogon.exe sc.exe PID 5084 wrote to memory of 4532 5084 Winlogon.exe sc.exe PID 5084 wrote to memory of 4532 5084 Winlogon.exe sc.exe PID 5084 wrote to memory of 2256 5084 Winlogon.exe net.exe PID 5084 wrote to memory of 2256 5084 Winlogon.exe net.exe PID 5084 wrote to memory of 2256 5084 Winlogon.exe net.exe PID 2256 wrote to memory of 2616 2256 net.exe net1.exe PID 2256 wrote to memory of 2616 2256 net.exe net1.exe PID 2256 wrote to memory of 2616 2256 net.exe net1.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exeWinlogon.exe30261.exeWinlogon.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 30261.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Winlogon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe"C:\Users\Admin\AppData\Local\Temp\342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0.exe"1⤵
- UAC bypass
- Windows security bypass
- Identifies Wine through registry keys
- Windows security modification
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4908 -
\??\c:\Winlogon.exec:\Winlogon.exe2⤵
- Modifies WinLogon for persistence
- Modifies security service
- UAC bypass
- Windows security bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2800 -
C:\Windows\SysWOW64\reg.exereg add hkcu\software\microsoft\windows\currentversion\policies\system /v disableregistrytools /t reg_dword /d "1" /f3⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:2432 -
C:\Windows\SysWOW64\sc.exesc stop SharedAccess3⤵
- Launches sc.exe
PID:3656 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\30261.exeC:\Users\Admin\AppData\Local\Temp\30261.exe2⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5024 -
\??\c:\Winlogon.exec:\Winlogon.exe3⤵
- Modifies WinLogon for persistence
- Modifies security service
- UAC bypass
- Windows security bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5084 -
C:\Windows\SysWOW64\reg.exereg add hkcu\software\microsoft\windows\currentversion\policies\system /v disableregistrytools /t reg_dword /d "1" /f4⤵
- Modifies registry key
PID:3720 -
C:\Windows\SysWOW64\sc.exesc stop SharedAccess4⤵
- Launches sc.exe
PID:4532 -
C:\Windows\SysWOW64\net.exenet stop wscsvc4⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc5⤵PID:2616
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
3Impair Defenses
1Modify Registry
9Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5f23735610d53079a0e46eb0a40de7306
SHA128346d15935ecb74c8f636ea3d03be163fe75b63
SHA256a187cf92ba85fa73c5691b37014f20f7bca2b83ece54a8f4c8f8079bad1da6a8
SHA5129ed5c5207a28242f1a66634f8331cc4051d1f55cc88045e91728cc9eed4f24c80b7cf9e026c3d30221babde7454b275d4c84af89bbc629f2d6f74ae22cce9393
-
Filesize
67KB
MD5f23735610d53079a0e46eb0a40de7306
SHA128346d15935ecb74c8f636ea3d03be163fe75b63
SHA256a187cf92ba85fa73c5691b37014f20f7bca2b83ece54a8f4c8f8079bad1da6a8
SHA5129ed5c5207a28242f1a66634f8331cc4051d1f55cc88045e91728cc9eed4f24c80b7cf9e026c3d30221babde7454b275d4c84af89bbc629f2d6f74ae22cce9393
-
Filesize
134KB
MD5e5c0fd76b28849ea17e101570d1de0a6
SHA1ae058d5c36fe832aebf33b05ef8bfe2b22ce1a1c
SHA256342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0
SHA51225f16d57a92be4c85eb2df359d7b8d570573c916aef801271e1d519164ac261f5337c1082a5c48db3dd24fb3f1b6c3832182b37ba4f8cc8144f6dc6dfb5ee1b9
-
Filesize
134KB
MD5e5c0fd76b28849ea17e101570d1de0a6
SHA1ae058d5c36fe832aebf33b05ef8bfe2b22ce1a1c
SHA256342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0
SHA51225f16d57a92be4c85eb2df359d7b8d570573c916aef801271e1d519164ac261f5337c1082a5c48db3dd24fb3f1b6c3832182b37ba4f8cc8144f6dc6dfb5ee1b9
-
Filesize
134KB
MD5e5c0fd76b28849ea17e101570d1de0a6
SHA1ae058d5c36fe832aebf33b05ef8bfe2b22ce1a1c
SHA256342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0
SHA51225f16d57a92be4c85eb2df359d7b8d570573c916aef801271e1d519164ac261f5337c1082a5c48db3dd24fb3f1b6c3832182b37ba4f8cc8144f6dc6dfb5ee1b9
-
Filesize
134KB
MD5e5c0fd76b28849ea17e101570d1de0a6
SHA1ae058d5c36fe832aebf33b05ef8bfe2b22ce1a1c
SHA256342d6c8cf7169e937dc7328b750c39528740e649a58fecad34d63fa51a37b6d0
SHA51225f16d57a92be4c85eb2df359d7b8d570573c916aef801271e1d519164ac261f5337c1082a5c48db3dd24fb3f1b6c3832182b37ba4f8cc8144f6dc6dfb5ee1b9