Analysis

  • max time kernel
    107s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:44

Errors

Reason
Machine shutdown

General

  • Target

    https://github.com/Endermanch/MalwareDatabase/blob/master/NoEscape.zip

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/Endermanch/MalwareDatabase/blob/master/NoEscape.zip
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4492
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4492 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2360
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:404
    • C:\Users\Admin\Downloads\NoEscape\NoEscape.exe
      "C:\Users\Admin\Downloads\NoEscape\NoEscape.exe"
      1⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Disables RegEdit via registry modification
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Drops file in Windows directory
      PID:4528
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa3981855 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:988
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
      1⤵
        PID:1480

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Winlogon Helper DLL

      1
      T1004

      Privilege Escalation

      Bypass User Account Control

      1
      T1088

      Defense Evasion

      Modify Registry

      5
      T1112

      Bypass User Account Control

      1
      T1088

      Disabling Security Tools

      1
      T1089

      Discovery

      Query Registry

      1
      T1012

      Command and Control

      Web Service

      1
      T1102

      Impact

      Defacement

      1
      T1491

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
        Filesize

        471B

        MD5

        bdbbd793778777706223b00a4ea24ed0

        SHA1

        bf09527cebe8906bfe6aa1e885bc9fb1b3ec54e4

        SHA256

        8b1034038298faf34d3f580c1ded7212f40d146de7e62cff20826c8b53f80c36

        SHA512

        7397d981e28bee91dd0e08c3a38444d8524204118548e8db810f5a277cbb08c20a64350063cf36ee4a943edba249f1d0ed350d4cfbc0671461cf27c2534c1f13

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
        Filesize

        404B

        MD5

        60203f1abf437b2e0560f6298abff584

        SHA1

        3ee6af400c6b6fe7bb7803a868ba8e812f705ef9

        SHA256

        3324b7ab4241c6740a2f488815147ffbd58315f87a56116670190aedb26b7188

        SHA512

        8ea7965020c49eb35a81c1a6e7632d57f49fbe6f191fc675a4e958140b27c635e4ce5826dcf2dbcd3e5e2c95e40cc44214039addad6e0bae5e5d4329771d9983

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verA60.tmp
        Filesize

        15KB

        MD5

        1a545d0052b581fbb2ab4c52133846bc

        SHA1

        62f3266a9b9925cd6d98658b92adec673cbe3dd3

        SHA256

        557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

        SHA512

        bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\cz9baam\imagestore.dat
        Filesize

        1KB

        MD5

        4ac6f69fa3293baca03fd4bbac70c5a0

        SHA1

        a073b299a2e5cbda2c020584e415e697c07d968c

        SHA256

        13247ef85744557d083799e4fde8d4cbc817cce2c2605b54ddbb1b012fad167e

        SHA512

        cef7f5b5cb9ed422fff9eee86a1bc3cb1a0ed1465aac5e55794ffc80403f30c157f66786f4fc5e522b60c7f93d2394a8560970936a766879b0550398c507054e

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RP56V4OA\NoEscape[1].zip
        Filesize

        616KB

        MD5

        ef4fdf65fc90bfda8d1d2ae6d20aff60

        SHA1

        9431227836440c78f12bfb2cb3247d59f4d4640b

        SHA256

        47f6d3a11ffd015413ffb96432ec1f980fba5dd084990dd61a00342c5f6da7f8

        SHA512

        6f560fa6dc34bfe508f03dabbc395d46a7b5ba9d398e03d27dbacce7451a3494fbf48ccb1234d40746ac7fe960a265776cb6474cf513adb8ccef36206a20cbe9

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RP56V4OA\favicon[1].png
        Filesize

        958B

        MD5

        346e09471362f2907510a31812129cd2

        SHA1

        323b99430dd424604ae57a19a91f25376e209759

        SHA256

        74cf90ac2fe6624ab1056cacea11cf7ed4f8bef54bbb0e869638013bba45bc08

        SHA512

        a62b0fcc02e671d6037725cf67935f8ca1c875f764ce39fed267420935c0b7bad69ab50d3f9f8c628e9b3cff439885ee416989e31ceaa5d32ae596dd7e5fedbd

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RP56V4OA\suggestions[1].en-US
        Filesize

        17KB

        MD5

        5a34cb996293fde2cb7a4ac89587393a

        SHA1

        3c96c993500690d1a77873cd62bc639b3a10653f

        SHA256

        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

        SHA512

        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

      • C:\Users\Admin\Downloads\NoEscape.zip.4eugclj.partial
        Filesize

        616KB

        MD5

        ef4fdf65fc90bfda8d1d2ae6d20aff60

        SHA1

        9431227836440c78f12bfb2cb3247d59f4d4640b

        SHA256

        47f6d3a11ffd015413ffb96432ec1f980fba5dd084990dd61a00342c5f6da7f8

        SHA512

        6f560fa6dc34bfe508f03dabbc395d46a7b5ba9d398e03d27dbacce7451a3494fbf48ccb1234d40746ac7fe960a265776cb6474cf513adb8ccef36206a20cbe9

      • C:\Users\Public\Desktop\᪶៸ᘢᝳޢ⭉᜽ᄒ⫇᪹ठ╬ⱬᔰቆᣐ⛃⴮₎⯶
        Filesize

        666B

        MD5

        e49f0a8effa6380b4518a8064f6d240b

        SHA1

        ba62ffe370e186b7f980922067ac68613521bd51

        SHA256

        8dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13

        SHA512

        de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4

      • memory/4528-336-0x0000000000400000-0x00000000005CC000-memory.dmp
        Filesize

        1.8MB

      • memory/4528-512-0x0000000000400000-0x00000000005CC000-memory.dmp
        Filesize

        1.8MB