Analysis
-
max time kernel
119s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 21:01
Static task
static1
Behavioral task
behavioral1
Sample
53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe
Resource
win7-20240903-en
General
-
Target
53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe
-
Size
88KB
-
MD5
b7edb1da49a202107c84903f263ab0e0
-
SHA1
556ad05f4d6b65a8ccff2fde7e2d34cb5160effb
-
SHA256
53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21
-
SHA512
41be10aab94d3c159518dfc4f0641d9b920ebea9f8767cb940fffba5bccd017cf6404ce8a98005af01d6a47d00c545971e8428118bfbef15b592fc07c674e330
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEc:6D0ctAVA/bmxIMnoKjyR/Nc
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4924-60-0x00000000013B0000-0x00000000013B5000-memory.dmp family_andromeda behavioral2/memory/4924-64-0x00000000013B0000-0x00000000013B5000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\40309 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msvwitit.com" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe -
Executes dropped EXE 3 IoCs
Processes:
winlogonr.exewinlogonr.exewinlogonr.exepid Process 4088 winlogonr.exe 3180 winlogonr.exe 552 winlogonr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\winlogonr\\winlogonr.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
winlogonr.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum winlogonr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 winlogonr.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exewinlogonr.exedescription pid Process procid_target PID 1284 set thread context of 2980 1284 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 93 PID 4088 set thread context of 3180 4088 winlogonr.exe 101 PID 4088 set thread context of 552 4088 winlogonr.exe 102 -
Processes:
resource yara_rule behavioral2/memory/2980-6-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2980-5-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2980-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2980-3-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2980-36-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2980-56-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3180-66-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
Processes:
svchost.exedescription ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msvwitit.com svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
winlogonr.exewinlogonr.exewinlogonr.exesvchost.exe53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.execmd.exereg.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
winlogonr.exepid Process 552 winlogonr.exe 552 winlogonr.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
winlogonr.exepid Process 552 winlogonr.exe 552 winlogonr.exe -
Suspicious use of AdjustPrivilegeToken 57 IoCs
Processes:
winlogonr.exedescription pid Process Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe Token: SeDebugPrivilege 3180 winlogonr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exewinlogonr.exewinlogonr.exepid Process 1284 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 2980 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 4088 winlogonr.exe 3180 winlogonr.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.execmd.exewinlogonr.exewinlogonr.exedescription pid Process procid_target PID 1284 wrote to memory of 2980 1284 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 93 PID 1284 wrote to memory of 2980 1284 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 93 PID 1284 wrote to memory of 2980 1284 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 93 PID 1284 wrote to memory of 2980 1284 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 93 PID 1284 wrote to memory of 2980 1284 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 93 PID 1284 wrote to memory of 2980 1284 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 93 PID 1284 wrote to memory of 2980 1284 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 93 PID 1284 wrote to memory of 2980 1284 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 93 PID 2980 wrote to memory of 1896 2980 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 94 PID 2980 wrote to memory of 1896 2980 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 94 PID 2980 wrote to memory of 1896 2980 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 94 PID 1896 wrote to memory of 748 1896 cmd.exe 97 PID 1896 wrote to memory of 748 1896 cmd.exe 97 PID 1896 wrote to memory of 748 1896 cmd.exe 97 PID 2980 wrote to memory of 4088 2980 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 98 PID 2980 wrote to memory of 4088 2980 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 98 PID 2980 wrote to memory of 4088 2980 53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe 98 PID 4088 wrote to memory of 3180 4088 winlogonr.exe 101 PID 4088 wrote to memory of 3180 4088 winlogonr.exe 101 PID 4088 wrote to memory of 3180 4088 winlogonr.exe 101 PID 4088 wrote to memory of 3180 4088 winlogonr.exe 101 PID 4088 wrote to memory of 3180 4088 winlogonr.exe 101 PID 4088 wrote to memory of 3180 4088 winlogonr.exe 101 PID 4088 wrote to memory of 3180 4088 winlogonr.exe 101 PID 4088 wrote to memory of 3180 4088 winlogonr.exe 101 PID 4088 wrote to memory of 552 4088 winlogonr.exe 102 PID 4088 wrote to memory of 552 4088 winlogonr.exe 102 PID 4088 wrote to memory of 552 4088 winlogonr.exe 102 PID 4088 wrote to memory of 552 4088 winlogonr.exe 102 PID 4088 wrote to memory of 552 4088 winlogonr.exe 102 PID 4088 wrote to memory of 552 4088 winlogonr.exe 102 PID 552 wrote to memory of 4924 552 winlogonr.exe 103 PID 552 wrote to memory of 4924 552 winlogonr.exe 103 PID 552 wrote to memory of 4924 552 winlogonr.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe"C:\Users\Admin\AppData\Local\Temp\53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe"C:\Users\Admin\AppData\Local\Temp\53c78d4db969c683d2f898d2eecf3dcd63cf7f086e34ca91d73c91ba4f5f3a21N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YCMSK.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:748
-
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3180
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4924
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD56831b89d0b8dc3e07588d733e75c122b
SHA18c70088c3224bbaf535ed19ec0f6bd5231c543be
SHA2569fe102f2c6dff35f03787b85f725d12347cf491c897730a7f2e818f65177ffc2
SHA512699fb44a25032ee4ad0ace1f941c826b333baddb65049c22e80b272909e85f4c8a00fef73fe2d97fa8998a0b6969b13461237bfc1e8f9bf711849d17d0cda6da
-
Filesize
88KB
MD5e1477684061dbf4f5e041b866cd9248a
SHA1862347562f83d8bda03d48f16d85e7b2ae013f39
SHA2563528acf6e37e57702750edfda39b9deee96c37f2a3aefbd0221a614d0fec2129
SHA5121ac6e8be917c4434219199c0366fb294d4241a47a8226016384e0ea8bb4eb479cc55af6ac579fa7517e0cfbb62eb757516ce18e158f5a9545915dc333b902747