Analysis
-
max time kernel
1800s -
max time network
1181s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 15:49
Behavioral task
behavioral1
Sample
Cozios-Imagelogger-main/cozios ImageLogger.exe
Resource
win7-20231129-en
General
-
Target
Cozios-Imagelogger-main/cozios ImageLogger.exe
-
Size
81KB
-
MD5
23f472ba6e59df467b80af92f43eaf22
-
SHA1
7dd4433d3f059ea4a13454991f841c756aba3e47
-
SHA256
498b02baa4dee1f19d4d06e45e5eda8bbf386fcce695f07846ac5374c654e406
-
SHA512
ecaa60619bc59a546a8100518d5866fc993ae2be340454e6b1ea6a9dc05efa33946198a0e798488659c99c959d937cc63e09ce746d254bcab8a12c233a088468
-
SSDEEP
1536:DUxwcx/BVuCkmPMVhAz0M4zyAkIQH1by/4XOp4QzcQ633I6VclN:DU+cx/Bw/mPMVhA1BH1byl4Ql633IIY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
idjtweoowocnoy
-
delay
1
-
install
true
-
install_file
Cozios Imagelogger.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/LwwcrLg4
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
NOTEPAD.EXEdescription ioc process File opened (read-only) \??\F: NOTEPAD.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Modifies registry class 1 IoCs
Processes:
7zFM.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings 7zFM.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
taskmgr.exe7zFM.exepid process 3400 taskmgr.exe 2040 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
Processes:
cozios ImageLogger.exetaskmgr.exe7zFM.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2796 cozios ImageLogger.exe Token: SeIncreaseQuotaPrivilege 2796 cozios ImageLogger.exe Token: SeSecurityPrivilege 2796 cozios ImageLogger.exe Token: SeTakeOwnershipPrivilege 2796 cozios ImageLogger.exe Token: SeLoadDriverPrivilege 2796 cozios ImageLogger.exe Token: SeSystemProfilePrivilege 2796 cozios ImageLogger.exe Token: SeSystemtimePrivilege 2796 cozios ImageLogger.exe Token: SeProfSingleProcessPrivilege 2796 cozios ImageLogger.exe Token: SeIncBasePriorityPrivilege 2796 cozios ImageLogger.exe Token: SeCreatePagefilePrivilege 2796 cozios ImageLogger.exe Token: SeBackupPrivilege 2796 cozios ImageLogger.exe Token: SeRestorePrivilege 2796 cozios ImageLogger.exe Token: SeShutdownPrivilege 2796 cozios ImageLogger.exe Token: SeDebugPrivilege 2796 cozios ImageLogger.exe Token: SeSystemEnvironmentPrivilege 2796 cozios ImageLogger.exe Token: SeRemoteShutdownPrivilege 2796 cozios ImageLogger.exe Token: SeUndockPrivilege 2796 cozios ImageLogger.exe Token: SeManageVolumePrivilege 2796 cozios ImageLogger.exe Token: 33 2796 cozios ImageLogger.exe Token: 34 2796 cozios ImageLogger.exe Token: 35 2796 cozios ImageLogger.exe Token: 36 2796 cozios ImageLogger.exe Token: SeIncreaseQuotaPrivilege 2796 cozios ImageLogger.exe Token: SeSecurityPrivilege 2796 cozios ImageLogger.exe Token: SeTakeOwnershipPrivilege 2796 cozios ImageLogger.exe Token: SeLoadDriverPrivilege 2796 cozios ImageLogger.exe Token: SeSystemProfilePrivilege 2796 cozios ImageLogger.exe Token: SeSystemtimePrivilege 2796 cozios ImageLogger.exe Token: SeProfSingleProcessPrivilege 2796 cozios ImageLogger.exe Token: SeIncBasePriorityPrivilege 2796 cozios ImageLogger.exe Token: SeCreatePagefilePrivilege 2796 cozios ImageLogger.exe Token: SeBackupPrivilege 2796 cozios ImageLogger.exe Token: SeRestorePrivilege 2796 cozios ImageLogger.exe Token: SeShutdownPrivilege 2796 cozios ImageLogger.exe Token: SeDebugPrivilege 2796 cozios ImageLogger.exe Token: SeSystemEnvironmentPrivilege 2796 cozios ImageLogger.exe Token: SeRemoteShutdownPrivilege 2796 cozios ImageLogger.exe Token: SeUndockPrivilege 2796 cozios ImageLogger.exe Token: SeManageVolumePrivilege 2796 cozios ImageLogger.exe Token: 33 2796 cozios ImageLogger.exe Token: 34 2796 cozios ImageLogger.exe Token: 35 2796 cozios ImageLogger.exe Token: 36 2796 cozios ImageLogger.exe Token: SeDebugPrivilege 3400 taskmgr.exe Token: SeSystemProfilePrivilege 3400 taskmgr.exe Token: SeCreateGlobalPrivilege 3400 taskmgr.exe Token: SeRestorePrivilege 2040 7zFM.exe Token: 35 2040 7zFM.exe Token: SeDebugPrivilege 2540 powershell.exe Token: SeDebugPrivilege 960 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe 3400 taskmgr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7zFM.exepowershell.exepowershell.exedescription pid process target process PID 2040 wrote to memory of 4720 2040 7zFM.exe NOTEPAD.EXE PID 2040 wrote to memory of 4720 2040 7zFM.exe NOTEPAD.EXE PID 2540 wrote to memory of 3060 2540 powershell.exe more.com PID 2540 wrote to memory of 3060 2540 powershell.exe more.com PID 2540 wrote to memory of 3060 2540 powershell.exe more.com PID 960 wrote to memory of 392 960 powershell.exe more.com PID 960 wrote to memory of 392 960 powershell.exe more.com PID 960 wrote to memory of 392 960 powershell.exe more.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cozios-Imagelogger-main\cozios ImageLogger.exe"C:\Users\Admin\AppData\Local\Temp\Cozios-Imagelogger-main\cozios ImageLogger.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:3364
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" F:\$RECYCLE.BIN\S-1-5-21-711569230-3659488422-571408806-1000\desktop.ini2⤵
- Enumerates connected drives
PID:4720
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1804
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\more.com"C:\Windows\system32\more.com"2⤵PID:3060
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\more.com"C:\Windows\system32\more.com"2⤵PID:392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD53337d66209faa998d52d781d0ff2d804
SHA16594b85a70f998f79f43cdf1ca56137997534156
SHA2569b946b062865f68b9f0f43a011d33d7ea0926a3c8f78fb20d9cab6144314e1bd
SHA5128bbd14bd73111f7b55712f5d1e1b727e41db8e6e0c1243ee6809ff32b509e52dec7af34c064151fb5beccd59dda434a3f83abe987c561a25abfbb4cbcf9c7f1f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize5KB
MD558fdf7488d9acfa2b3494ed6c7056482
SHA102fa604e05633aab735b1a4e485646533879e065
SHA256ad75f8308c9b9aaf29094ab66d0d087f4ac2e3e18d9a67aa43220e9cf9f96dcb
SHA5128c6bd3bde867544bb0141cd7980ad3ab9709ad5e9466392c807599cad95e646a46dc8dcbb4daad66036bf63f095df11b7fb43394339edc3ee2671a77f347a8b2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize5KB
MD5359cc4072a6fc2a287a1ee5ac2ec881b
SHA1e17c26a90dbc57fd4632d848b405fc04d65cb4ea
SHA256220764a998fe6a153fdfb7da2812361a571b943f19b57d27fda769db1845b6e0
SHA512bdc90c69630da2a72ebc8fdbb5765a1064a36e99756a5f04add4b7991af6c68d5337c553ab6e506cf1ecdc838c56ffc1f21a523c67db3277c8096229bb04c4b6