Analysis
-
max time kernel
8s -
max time network
8s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 19:21
Behavioral task
behavioral1
Sample
686f37ebc5f5c5817e05aefdc474d9a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
686f37ebc5f5c5817e05aefdc474d9a8.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
686f37ebc5f5c5817e05aefdc474d9a8.exe
-
Size
537KB
-
MD5
686f37ebc5f5c5817e05aefdc474d9a8
-
SHA1
9c6e5e3ef98b5ef6242d9147b60b200a93c05ada
-
SHA256
0432bc478bbc120c0e6900e0741795edf5f58f6af018db858a6f7789a8d67c7f
-
SHA512
020f06128c4e14623623c7c216555275e9435550c1ebf4877d9ed5b604026dbc6e49abd55f5d5cb5cd275613fed36698dea8d76f3d4dbb13ddcc78610c7a3234
-
SSDEEP
12288:XUJaxvrSCu77Z1RLeQiOfFHNv9FnKyYHhQzRyY5FiXJ2i7O7a2RtzE:EQ877j0WFHV9EyYBWRf5IJrGHRtz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\gog.exe" 686f37ebc5f5c5817e05aefdc474d9a8.exe -
resource yara_rule behavioral1/memory/2324-0-0x0000000000400000-0x00000000005CF000-memory.dmp upx behavioral1/memory/2324-5-0x0000000000400000-0x00000000005CF000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 686f37ebc5f5c5817e05aefdc474d9a8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 686f37ebc5f5c5817e05aefdc474d9a8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe 2324 686f37ebc5f5c5817e05aefdc474d9a8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\686f37ebc5f5c5817e05aefdc474d9a8.exe"C:\Users\Admin\AppData\Local\Temp\686f37ebc5f5c5817e05aefdc474d9a8.exe"1⤵
- Modifies WinLogon for persistence
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2324
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2812
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2596