Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-12-2021 21:51
Static task
static1
Behavioral task
behavioral1
Sample
36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe
-
Size
22KB
-
MD5
f3d01e4949038741366e368d190fb95a
-
SHA1
94ae951d78c1cc28a698b770839272d22b1d56f2
-
SHA256
36702a02201cea4b0f0096758491fb058ef8d9a84d98bf93db3101ee1050276f
-
SHA512
9a40115f50bd6e493c729b78df9af601428f29fa9b2bf101ff51100e4d0890e8104c7ae766472fa08a86db5b7f72f1b64656362a90f4a46db5f63b9105c172bb
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\mdcxw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe" 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 27 IoCs
Processes:
36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exedescription pid process Token: SeDebugPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: 33 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: SeIncBasePriorityPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: 33 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: SeIncBasePriorityPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: 33 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: SeIncBasePriorityPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: 33 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: SeIncBasePriorityPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: 33 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: SeIncBasePriorityPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: 33 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: SeIncBasePriorityPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: 33 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: SeIncBasePriorityPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: 33 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: SeIncBasePriorityPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: 33 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: SeIncBasePriorityPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: 33 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: SeIncBasePriorityPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: 33 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: SeIncBasePriorityPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: 33 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: SeIncBasePriorityPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: 33 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe Token: SeIncBasePriorityPrivilege 4000 36702A02201CEA4B0F0096758491FB058EF8D9A84D98B.exe