Analysis
-
max time kernel
153s -
max time network
131s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
07-10-2021 13:01
Static task
static1
Behavioral task
behavioral1
Sample
1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe
-
Size
824KB
-
MD5
7d17a868abac9de81fe79087eee31471
-
SHA1
2d3f58ea051db43964243b8aefb7279e45e7bda9
-
SHA256
1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26
-
SHA512
85ec6c3cf0908b306712041fc9d971d27349641245c29f126e01443dcc6ccd78530c789b15d345938c194009c890b42f7c95bc65deae1ef7372e5744651f9540
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "empty" 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe -
Disables Task Manager via registry modification
-
Drops desktop.ini file(s) 1 IoCs
Processes:
1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exedescription ioc process File created C:\Users\Admin\Downloads\desktop.ini 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\Desktop\Wallpaper 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exepid process 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exedescription pid process Token: SeDebugPrivilege 2072 1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe"C:\Users\Admin\AppData\Local\Temp\1d871d84ee02630558411e47c81ef2aa8bef8f6cd8daaf594f133f545f772c26.exe"1⤵
- Modifies WinLogon for persistence
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072