Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 12:00
Static task
static1
Behavioral task
behavioral1
Sample
bb3489733dd75ee9c4d66b11ee74d447.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb3489733dd75ee9c4d66b11ee74d447.exe
Resource
win10v2004-20240226-en
General
-
Target
bb3489733dd75ee9c4d66b11ee74d447.exe
-
Size
348KB
-
MD5
bb3489733dd75ee9c4d66b11ee74d447
-
SHA1
261ff8a92b8d7aadb557961e20cf9c13277deb6f
-
SHA256
c3e1c1f1d8bfeebb2aa7b97f8ba61d8a9c41e54a73f223141332d080aaa95de3
-
SHA512
93248841168115fec74eb587e26541e376890d492f7a5fca04456f5899ae828b8314243654214325e89b4b321a4a560f43bcbba674b653e0ffdd3e9ed0057f0b
-
SSDEEP
3072:JpIGmvln+RX0GWDocLiAqq02JtXcuVchWdsItjIj3XOXjC+/c:QGmvlYD0o+cuWUNtYOtc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe\"" bb3489733dd75ee9c4d66b11ee74d447.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe\"" winlogon.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2952 netsh.exe -
Deletes itself 1 IoCs
pid Process 1852 winlogon.exe -
Executes dropped EXE 1 IoCs
pid Process 1852 winlogon.exe -
resource yara_rule behavioral2/memory/3248-1-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/3248-5-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/3248-22-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1852-24-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1852-26-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1852-27-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1852-28-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1852-30-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1852-31-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1852-32-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1852-33-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1852-34-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1852-35-0x0000000000400000-0x0000000000459000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe\"" bb3489733dd75ee9c4d66b11ee74d447.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe\"" bb3489733dd75ee9c4d66b11ee74d447.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe\"" winlogon.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1196 3248 WerFault.exe 87 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3248 bb3489733dd75ee9c4d66b11ee74d447.exe 1852 winlogon.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3248 wrote to memory of 2952 3248 bb3489733dd75ee9c4d66b11ee74d447.exe 99 PID 3248 wrote to memory of 2952 3248 bb3489733dd75ee9c4d66b11ee74d447.exe 99 PID 3248 wrote to memory of 2952 3248 bb3489733dd75ee9c4d66b11ee74d447.exe 99 PID 3248 wrote to memory of 1852 3248 bb3489733dd75ee9c4d66b11ee74d447.exe 100 PID 3248 wrote to memory of 1852 3248 bb3489733dd75ee9c4d66b11ee74d447.exe 100 PID 3248 wrote to memory of 1852 3248 bb3489733dd75ee9c4d66b11ee74d447.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb3489733dd75ee9c4d66b11ee74d447.exe"C:\Users\Admin\AppData\Local\Temp\bb3489733dd75ee9c4d66b11ee74d447.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\winlogon.exe" CityScape Enable2⤵
- Modifies Windows Firewall
PID:2952
-
-
C:\Users\Admin\AppData\Roaming\winlogon.exe/d C:\Users\Admin\AppData\Local\Temp\bb3489733dd75ee9c4d66b11ee74d447.exe2⤵
- Modifies WinLogon for persistence
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 7762⤵
- Program crash
PID:1196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3248 -ip 32481⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5bde69ccb31786ccdd00935af634b2a99
SHA1a2a70ae523fb5ba6a553ed0fb5a805984d3221b6
SHA25607dd7ec4eaa7982455b9d58fd29c0c22f08212d89aa855d1eae21c0f91829a17
SHA512b7ae244edf83e8e99be079ef84353d92f6b46060eecb7ed0a10d9444d1119d7b85b6e97a014028a3702a3099b5067bd50c1da372a5c22f0d173bb64d9fa78c61
-
Filesize
348KB
MD515dcaef0389ab787ce9910730b9c851e
SHA17387214e38184f1a6a92e0b63378ae027e1d0508
SHA25607bc5d3190a22052acc2374723b3fd9bb672322d78db6d9b52075d746c4dacf1
SHA512ccb58c17aca09b94398a3600e6b654db8b66c3796c5bb62c5c4c00c19e43563fc59b7db43508433d5fb1a42f79b3fc2b6817355963a7a207e059c5f80cf73d35