Resubmissions

13/01/2023, 04:24

230113-e1hrkaec23 10

Analysis

  • max time kernel
    134s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/01/2023, 04:24

Errors

Reason
Machine shutdown

General

  • Target

    https://github.com/Endermanch/MalwareDatabase/blob/master/NoEscape.zip?raw=true

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 16 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/Endermanch/MalwareDatabase/blob/master/NoEscape.zip?raw=true
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4856
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2400
    • C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.zip\NoEscape.exe
      "C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.zip\NoEscape.exe"
      1⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Disables RegEdit via registry modification
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Drops file in Windows directory
      PID:3456
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0 /state0:0xa3adc855 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:4788

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9GDYTKFK\NoEscape.zip.onut6xd.partial

            Filesize

            616KB

            MD5

            ef4fdf65fc90bfda8d1d2ae6d20aff60

            SHA1

            9431227836440c78f12bfb2cb3247d59f4d4640b

            SHA256

            47f6d3a11ffd015413ffb96432ec1f980fba5dd084990dd61a00342c5f6da7f8

            SHA512

            6f560fa6dc34bfe508f03dabbc395d46a7b5ba9d398e03d27dbacce7451a3494fbf48ccb1234d40746ac7fe960a265776cb6474cf513adb8ccef36206a20cbe9

          • memory/3456-121-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-123-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-124-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-125-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-126-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-127-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-128-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-129-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-130-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-131-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-132-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-133-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-134-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-135-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-137-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-138-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-139-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-141-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-142-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-144-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-146-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-148-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-150-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-153-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-154-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-156-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-155-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-152-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-151-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-149-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-159-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-158-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-157-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-147-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-145-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-143-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-140-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-136-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-122-0x0000000000400000-0x00000000005CC000-memory.dmp

            Filesize

            1.8MB

          • memory/3456-160-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-161-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-162-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-164-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-165-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-163-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-166-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-167-0x0000000077320000-0x00000000774AE000-memory.dmp

            Filesize

            1.6MB

          • memory/3456-168-0x0000000000400000-0x00000000005CC000-memory.dmp

            Filesize

            1.8MB