Analysis

  • max time kernel
    46s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 09:23

Errors

Reason
Machine shutdown

General

  • Target

    917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe

  • Size

    81KB

  • MD5

    30cf084eeeb56ee7c01a2e214f348d76

  • SHA1

    2b43dfd8c398a4925ea66653d351f84af669d3e3

  • SHA256

    917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62

  • SHA512

    f94dc5a93122999ad35dd3c07bc0db08cfd88ad0e4dc55c7768b3d75e441f290d5a259237cf5401cbc407d50223eb513b03eb3d45f891872b0ff49be2f423f16

  • SSDEEP

    384:PJG14lR/NpKAN+UJfo8vJh/7neuwyv3ZUKcreuDreuwyv3ZUKcreuDz:RFtFe8vJtDeunUreufeunUreuf

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe
    "C:\Users\Admin\AppData\Local\Temp\917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1368
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib +h +s "C:\Windows\system32\winsock.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1700
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h +s "C:\Windows\system32\winsock.exe"
        3⤵
        • Drops file in System32 directory
        • Views/modifies file attributes
        PID:976
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib +h +s "C:\Windows\system32\winkernel32.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h +s "C:\Windows\system32\winkernel32.exe"
        3⤵
        • Drops file in System32 directory
        • Views/modifies file attributes
        PID:1504
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c shutdown -r
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Windows\SysWOW64\shutdown.exe
        shutdown -r
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:576
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1744
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:2040

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\winkernel32.exe

        Filesize

        84KB

        MD5

        38d23b46f6efcba0291d0fcd8749b9c4

        SHA1

        22c78b4a3ca543dddb7fad0df9bc8e35a1a13052

        SHA256

        15345a6500084d3f25591384991a183f7757563eee03b337ccafa84bd3249392

        SHA512

        b2251e39da2e6a0932509d1129ef4d5a3494b758550e85dc0e6fdce584f60f638a52dc9744dc0833e34b7961a15c7fda4c66ca5ceca4e10ff04982238be62a53

      • C:\Windows\SysWOW64\winsock.exe

        Filesize

        83KB

        MD5

        1ebbff278064ece069d0d2024c802401

        SHA1

        559aaef53f89b25a4cb15f54fea4ce57d2305dea

        SHA256

        a9f5debfffb59f5ca5c478cdc252683623ce4d7de7603b0219f51e7edfb351d9

        SHA512

        281564e3ba114a6d5fb64f47ef1b882e85c099e031bff906839f6e28075431eee56eeb40d7b1e25786ce4d8df40bf1de6b8451f67393eed64f0327b4eeb9bd85

      • memory/1744-62-0x000007FEFB641000-0x000007FEFB643000-memory.dmp

        Filesize

        8KB