Analysis

  • max time kernel
    161s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 16:18

General

  • Target

    0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe

  • Size

    94KB

  • MD5

    169fb6a4a4ae9aeac09b5644c8645930

  • SHA1

    aaedf511f216f57d2a5ee8e66cda9c33f79fb227

  • SHA256

    0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df

  • SHA512

    dd6280cc6c7cbf525db22c60c4a3ffb4264eb7950623e9e1f09b53e28bd1f4ff0ff23b48f59897a6ecfd949bd92d944602de9bb77e44d63177cc3ed0c3f80132

  • SSDEEP

    1536:Fvj2yQ1RgVeIYx8qCRP+SzTLdXRIhNdHM8ANsDLni7IQpmbdG:Fb2ySIYx8qWbRRINHJRvMIQpE

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 5 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe
    "C:\Users\Admin\AppData\Local\Temp\0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:320
    • C:\Users\Admin\AppData\Local\Temp\0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe
      "C:\Users\Admin\AppData\Local\Temp\0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe"
      2⤵
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Users\Admin\AppData\Roaming\system\winlogon.exe
        C:\Users\Admin\AppData\Roaming\system\winlogon.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4252
        • C:\Users\Admin\AppData\Roaming\system\winlogon.exe
          C:\Users\Admin\AppData\Roaming\system\winlogon.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4300
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List" /v "C:\Users\Admin\AppData\Roaming\system\winlogon.exe" /t reg_sz /d "C:\Users\Admin\AppData\Roaming\system\winlogon.exe:*:Enabled:winlogon.exe" /f
            5⤵
            • Modifies firewall policy service
            PID:2292
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" /v "Update" /t reg_sz /d "C:\Users\Admin\AppData\Roaming\system\winlogon.exe" /f
            5⤵
            • Adds policy Run key to start application
            PID:3348
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Update" /t reg_sz /d "C:\Users\Admin\AppData\Roaming\system\winlogon.exe" /f
            5⤵
            • Adds Run key to start application
            PID:4888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df.exe

    Filesize

    94KB

    MD5

    169fb6a4a4ae9aeac09b5644c8645930

    SHA1

    aaedf511f216f57d2a5ee8e66cda9c33f79fb227

    SHA256

    0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df

    SHA512

    dd6280cc6c7cbf525db22c60c4a3ffb4264eb7950623e9e1f09b53e28bd1f4ff0ff23b48f59897a6ecfd949bd92d944602de9bb77e44d63177cc3ed0c3f80132

  • C:\Users\Admin\AppData\Roaming\System\winlogon.exe

    Filesize

    94KB

    MD5

    169fb6a4a4ae9aeac09b5644c8645930

    SHA1

    aaedf511f216f57d2a5ee8e66cda9c33f79fb227

    SHA256

    0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df

    SHA512

    dd6280cc6c7cbf525db22c60c4a3ffb4264eb7950623e9e1f09b53e28bd1f4ff0ff23b48f59897a6ecfd949bd92d944602de9bb77e44d63177cc3ed0c3f80132

  • C:\Users\Admin\AppData\Roaming\System\winlogon.exe

    Filesize

    94KB

    MD5

    169fb6a4a4ae9aeac09b5644c8645930

    SHA1

    aaedf511f216f57d2a5ee8e66cda9c33f79fb227

    SHA256

    0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df

    SHA512

    dd6280cc6c7cbf525db22c60c4a3ffb4264eb7950623e9e1f09b53e28bd1f4ff0ff23b48f59897a6ecfd949bd92d944602de9bb77e44d63177cc3ed0c3f80132

  • C:\Users\Admin\AppData\Roaming\system\winlogon.exe

    Filesize

    94KB

    MD5

    169fb6a4a4ae9aeac09b5644c8645930

    SHA1

    aaedf511f216f57d2a5ee8e66cda9c33f79fb227

    SHA256

    0d22817d1f69bc71e452e9effc708a9a10c70784009793e18862c1e627f019df

    SHA512

    dd6280cc6c7cbf525db22c60c4a3ffb4264eb7950623e9e1f09b53e28bd1f4ff0ff23b48f59897a6ecfd949bd92d944602de9bb77e44d63177cc3ed0c3f80132

  • memory/320-144-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/320-132-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1628-145-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1628-134-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1628-143-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1628-139-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1628-140-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1628-137-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1628-141-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1628-135-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4252-149-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4252-162-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB