Analysis
-
max time kernel
9s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 23:31
Static task
static1
Behavioral task
behavioral1
Sample
9a05b73d4ec97aeee3ee4b77ca31e98b2eaa635f66265e958798709a7498e0d2.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
9a05b73d4ec97aeee3ee4b77ca31e98b2eaa635f66265e958798709a7498e0d2.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
9a05b73d4ec97aeee3ee4b77ca31e98b2eaa635f66265e958798709a7498e0d2.exe
-
Size
596KB
-
MD5
6476fe16311345b38ae0aa53ec605ace
-
SHA1
a2de426d35265eec22783e7efca18c0272b9cb4e
-
SHA256
9a05b73d4ec97aeee3ee4b77ca31e98b2eaa635f66265e958798709a7498e0d2
-
SHA512
ac8f38a74f9ea6c4cbe9f14ad0e3c455ac2e7099cc53c8269fa9510054cc3f8fa757ec284170814cf119dc1d08998069a50caa377696b90d2d579c76407f2dd4
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
9a05b73d4ec97aeee3ee4b77ca31e98b2eaa635f66265e958798709a7498e0d2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,\"C:\\Users\\Admin\\AppData\\Local\\Pic1fPBkmq\\LOHejsSdpL.exe\" -s" 9a05b73d4ec97aeee3ee4b77ca31e98b2eaa635f66265e958798709a7498e0d2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
System policy modification 1 TTPs 1 IoCs
Processes:
9a05b73d4ec97aeee3ee4b77ca31e98b2eaa635f66265e958798709a7498e0d2.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 9a05b73d4ec97aeee3ee4b77ca31e98b2eaa635f66265e958798709a7498e0d2.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1728-54-0x0000000076171000-0x0000000076173000-memory.dmpFilesize
8KB