Analysis
-
max time kernel
161s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe
Resource
win10v2004-20220812-en
General
-
Target
0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe
-
Size
94KB
-
MD5
169fb6a4a4ae9aeac09b5644c8645930
-
SHA1
aaedf511f216f57d2a5ee8e66cda9c33f79fb227
-
SHA256
0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df
-
SHA512
dd6280cc6c7cbf525db22c60c4a3ffb4264eb7950623e9e1f09b53e28bd1f4ff0ff23b48f59897a6ecfd949bd92d944602de9bb77e44d63177cc3ed0c3f80132
-
SSDEEP
1536:Fvj2yQ1RgVeIYx8qCRP+SzTLdXRIhNdHM8ANsDLni7IQpmbdG:Fb2ySIYx8qWbRRINHJRvMIQpE
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\system\winlogon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\system\\winlogon.exe:*:Enabled:winlogon.exe" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Update = "C:\\Users\\Admin\\AppData\\Roaming\\system\\winlogon.exe" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 4252 winlogon.exe 4300 winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Users\\Admin\\AppData\\Roaming\\system\\winlogon.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 320 set thread context of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 4252 set thread context of 4300 4252 winlogon.exe 82 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1628 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 320 wrote to memory of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 320 wrote to memory of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 320 wrote to memory of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 320 wrote to memory of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 320 wrote to memory of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 320 wrote to memory of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 320 wrote to memory of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 320 wrote to memory of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 320 wrote to memory of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 320 wrote to memory of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 320 wrote to memory of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 320 wrote to memory of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 320 wrote to memory of 1628 320 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 80 PID 1628 wrote to memory of 4252 1628 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 81 PID 1628 wrote to memory of 4252 1628 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 81 PID 1628 wrote to memory of 4252 1628 0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe 81 PID 4252 wrote to memory of 4300 4252 winlogon.exe 82 PID 4252 wrote to memory of 4300 4252 winlogon.exe 82 PID 4252 wrote to memory of 4300 4252 winlogon.exe 82 PID 4252 wrote to memory of 4300 4252 winlogon.exe 82 PID 4252 wrote to memory of 4300 4252 winlogon.exe 82 PID 4252 wrote to memory of 4300 4252 winlogon.exe 82 PID 4252 wrote to memory of 4300 4252 winlogon.exe 82 PID 4252 wrote to memory of 4300 4252 winlogon.exe 82 PID 4252 wrote to memory of 4300 4252 winlogon.exe 82 PID 4252 wrote to memory of 4300 4252 winlogon.exe 82 PID 4252 wrote to memory of 4300 4252 winlogon.exe 82 PID 4252 wrote to memory of 4300 4252 winlogon.exe 82 PID 4252 wrote to memory of 4300 4252 winlogon.exe 82 PID 4300 wrote to memory of 2292 4300 winlogon.exe 83 PID 4300 wrote to memory of 2292 4300 winlogon.exe 83 PID 4300 wrote to memory of 2292 4300 winlogon.exe 83 PID 4300 wrote to memory of 3348 4300 winlogon.exe 85 PID 4300 wrote to memory of 3348 4300 winlogon.exe 85 PID 4300 wrote to memory of 3348 4300 winlogon.exe 85 PID 4300 wrote to memory of 4888 4300 winlogon.exe 87 PID 4300 wrote to memory of 4888 4300 winlogon.exe 87 PID 4300 wrote to memory of 4888 4300 winlogon.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe"C:\Users\Admin\AppData\Local\Temp\0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe"C:\Users\Admin\AppData\Local\Temp\0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\system\winlogon.exeC:\Users\Admin\AppData\Roaming\system\winlogon.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Roaming\system\winlogon.exeC:\Users\Admin\AppData\Roaming\system\winlogon.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List" /v "C:\Users\Admin\AppData\Roaming\system\winlogon.exe" /t reg_sz /d "C:\Users\Admin\AppData\Roaming\system\winlogon.exe:*:Enabled:winlogon.exe" /f5⤵
- Modifies firewall policy service
PID:2292
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" /v "Update" /t reg_sz /d "C:\Users\Admin\AppData\Roaming\system\winlogon.exe" /f5⤵
- Adds policy Run key to start application
PID:3348
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Update" /t reg_sz /d "C:\Users\Admin\AppData\Roaming\system\winlogon.exe" /f5⤵
- Adds Run key to start application
PID:4888
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe
Filesize94KB
MD5169fb6a4a4ae9aeac09b5644c8645930
SHA1aaedf511f216f57d2a5ee8e66cda9c33f79fb227
SHA2560d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df
SHA512dd6280cc6c7cbf525db22c60c4a3ffb4264eb7950623e9e1f09b53e28bd1f4ff0ff23b48f59897a6ecfd949bd92d944602de9bb77e44d63177cc3ed0c3f80132
-
Filesize
94KB
MD5169fb6a4a4ae9aeac09b5644c8645930
SHA1aaedf511f216f57d2a5ee8e66cda9c33f79fb227
SHA2560d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df
SHA512dd6280cc6c7cbf525db22c60c4a3ffb4264eb7950623e9e1f09b53e28bd1f4ff0ff23b48f59897a6ecfd949bd92d944602de9bb77e44d63177cc3ed0c3f80132
-
Filesize
94KB
MD5169fb6a4a4ae9aeac09b5644c8645930
SHA1aaedf511f216f57d2a5ee8e66cda9c33f79fb227
SHA2560d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df
SHA512dd6280cc6c7cbf525db22c60c4a3ffb4264eb7950623e9e1f09b53e28bd1f4ff0ff23b48f59897a6ecfd949bd92d944602de9bb77e44d63177cc3ed0c3f80132
-
Filesize
94KB
MD5169fb6a4a4ae9aeac09b5644c8645930
SHA1aaedf511f216f57d2a5ee8e66cda9c33f79fb227
SHA2560d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df
SHA512dd6280cc6c7cbf525db22c60c4a3ffb4264eb7950623e9e1f09b53e28bd1f4ff0ff23b48f59897a6ecfd949bd92d944602de9bb77e44d63177cc3ed0c3f80132