Analysis
-
max time kernel
119s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe
Resource
win7-20240903-en
General
-
Target
99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe
-
Size
88KB
-
MD5
7c28769f85f896d0831d1ab08ff4182b
-
SHA1
efc1b2b2aeef83aad21302e97fcf976f9b6af357
-
SHA256
99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db
-
SHA512
1c3f97c8d6219dda494c168d96539d94c3028375d5695a28a26298e4ca3abb0f7a6bee1a8864a96f84a22354d19ca84fd149ebf0e94f13744a4fcbe270fa97a8
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEL:6D0ctAVA/bmxIMnoKjyR/NL
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 2 IoCs
resource yara_rule behavioral2/memory/4528-63-0x00000000009F0000-0x00000000009F5000-memory.dmp family_andromeda behavioral2/memory/4528-67-0x00000000009F0000-0x00000000009F5000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\289 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msxrrmg.bat" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe -
Executes dropped EXE 3 IoCs
pid Process 4640 winlogonr.exe 2576 winlogonr.exe 1204 winlogonr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\winlogonr\\winlogonr.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum winlogonr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 winlogonr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4724 set thread context of 2740 4724 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 94 PID 4640 set thread context of 2576 4640 winlogonr.exe 104 PID 4640 set thread context of 1204 4640 winlogonr.exe 105 -
resource yara_rule behavioral2/memory/2740-8-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2740-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2740-12-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2740-38-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2740-54-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2576-61-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msxrrmg.bat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1204 winlogonr.exe 1204 winlogonr.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1204 winlogonr.exe 1204 winlogonr.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe Token: SeDebugPrivilege 2576 winlogonr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4724 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 2740 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 4640 winlogonr.exe 2576 winlogonr.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 4724 wrote to memory of 2740 4724 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 94 PID 4724 wrote to memory of 2740 4724 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 94 PID 4724 wrote to memory of 2740 4724 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 94 PID 4724 wrote to memory of 2740 4724 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 94 PID 4724 wrote to memory of 2740 4724 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 94 PID 4724 wrote to memory of 2740 4724 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 94 PID 4724 wrote to memory of 2740 4724 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 94 PID 4724 wrote to memory of 2740 4724 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 94 PID 2740 wrote to memory of 1848 2740 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 95 PID 2740 wrote to memory of 1848 2740 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 95 PID 2740 wrote to memory of 1848 2740 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 95 PID 1848 wrote to memory of 2076 1848 cmd.exe 99 PID 1848 wrote to memory of 2076 1848 cmd.exe 99 PID 1848 wrote to memory of 2076 1848 cmd.exe 99 PID 2740 wrote to memory of 4640 2740 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 100 PID 2740 wrote to memory of 4640 2740 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 100 PID 2740 wrote to memory of 4640 2740 99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe 100 PID 4640 wrote to memory of 2576 4640 winlogonr.exe 104 PID 4640 wrote to memory of 2576 4640 winlogonr.exe 104 PID 4640 wrote to memory of 2576 4640 winlogonr.exe 104 PID 4640 wrote to memory of 2576 4640 winlogonr.exe 104 PID 4640 wrote to memory of 2576 4640 winlogonr.exe 104 PID 4640 wrote to memory of 2576 4640 winlogonr.exe 104 PID 4640 wrote to memory of 2576 4640 winlogonr.exe 104 PID 4640 wrote to memory of 2576 4640 winlogonr.exe 104 PID 4640 wrote to memory of 1204 4640 winlogonr.exe 105 PID 4640 wrote to memory of 1204 4640 winlogonr.exe 105 PID 4640 wrote to memory of 1204 4640 winlogonr.exe 105 PID 4640 wrote to memory of 1204 4640 winlogonr.exe 105 PID 4640 wrote to memory of 1204 4640 winlogonr.exe 105 PID 4640 wrote to memory of 1204 4640 winlogonr.exe 105 PID 1204 wrote to memory of 4528 1204 winlogonr.exe 106 PID 1204 wrote to memory of 4528 1204 winlogonr.exe 106 PID 1204 wrote to memory of 4528 1204 winlogonr.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe"C:\Users\Admin\AppData\Local\Temp\99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe"C:\Users\Admin\AppData\Local\Temp\99ae9cc4150756bbfb18f34381118146cc851f3707d03ba79cf6639d7d8f02db.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LFKYH.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2076
-
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4528
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD56831b89d0b8dc3e07588d733e75c122b
SHA18c70088c3224bbaf535ed19ec0f6bd5231c543be
SHA2569fe102f2c6dff35f03787b85f725d12347cf491c897730a7f2e818f65177ffc2
SHA512699fb44a25032ee4ad0ace1f941c826b333baddb65049c22e80b272909e85f4c8a00fef73fe2d97fa8998a0b6969b13461237bfc1e8f9bf711849d17d0cda6da
-
Filesize
88KB
MD592bdb37b53f2fd12914efdae18bf2289
SHA1d6588e94a5ce84d6e8408d6d98d71f712c9a2740
SHA256b134c6390ff9fd5b7a6d8351b25747c04fcaaad3bde402a2cbeb8b3e7e514547
SHA512eaf6006d8cf1d03280b1d31799b7ac86154302f0b303e06922f2f8b9dc709666afae249fec437cbb56568028d672ec490b883ecb6c300b480e5a1dbd1b5f04f0