Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 13:48

General

  • Target

    caae33001110e9c1adf6f9fb8aba20dc0a3c28d1a6513c5628a7b1641cadca04.exe

  • Size

    583KB

  • MD5

    f7cc7e018dbde0bef8362522e54413eb

  • SHA1

    9e51cb51e84175bbde01183e6753ecbb0bd9fcf8

  • SHA256

    caae33001110e9c1adf6f9fb8aba20dc0a3c28d1a6513c5628a7b1641cadca04

  • SHA512

    b2df39fc6a87dc3870e24ddf76f0f93bd7bbda506bd47ef9f4bbad24cd8db0347408178d3c4a8a9a9da1eac50e784c392bd6f236e09a8d09198809189848f5cd

  • SSDEEP

    12288:o0xUgH6HeGUpiDGc2hKs7U7TNePcTnvgGsi3VC4WxCNRf1g/+:VZHB5cU5KgGsiFdWIxg/+

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:604
    • C:\Users\Admin\AppData\Local\Temp\caae33001110e9c1adf6f9fb8aba20dc0a3c28d1a6513c5628a7b1641cadca04.exe
      "C:\Users\Admin\AppData\Local\Temp\caae33001110e9c1adf6f9fb8aba20dc0a3c28d1a6513c5628a7b1641cadca04.exe"
      1⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3124
      • C:\Users\Admin\AppData\Local\Temp\caae33001110e9c1adf6f9fb8aba20dc0a3c28d1a6513c5628a7b1641cadca04.exe
        "C:\Users\Admin\AppData\Local\Temp\caae33001110e9c1adf6f9fb8aba20dc0a3c28d1a6513c5628a7b1641cadca04.exe"
        2⤵
        • Modifies WinLogon for persistence
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2540

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/604-183-0x0000000014210000-0x0000000014228000-memory.dmp

      Filesize

      96KB

    • memory/604-220-0x00000000142F0000-0x0000000014308000-memory.dmp

      Filesize

      96KB

    • memory/604-235-0x0000000014350000-0x0000000014368000-memory.dmp

      Filesize

      96KB

    • memory/604-230-0x0000000014330000-0x0000000014348000-memory.dmp

      Filesize

      96KB

    • memory/604-143-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/604-148-0x0000000014130000-0x0000000014148000-memory.dmp

      Filesize

      96KB

    • memory/604-153-0x0000000014150000-0x0000000014168000-memory.dmp

      Filesize

      96KB

    • memory/604-158-0x0000000014170000-0x0000000014188000-memory.dmp

      Filesize

      96KB

    • memory/604-163-0x0000000014190000-0x00000000141A8000-memory.dmp

      Filesize

      96KB

    • memory/604-168-0x00000000141B0000-0x00000000141C8000-memory.dmp

      Filesize

      96KB

    • memory/604-173-0x00000000141D0000-0x00000000141E8000-memory.dmp

      Filesize

      96KB

    • memory/604-178-0x00000000141F0000-0x0000000014208000-memory.dmp

      Filesize

      96KB

    • memory/604-225-0x0000000014310000-0x0000000014328000-memory.dmp

      Filesize

      96KB

    • memory/604-193-0x0000000014250000-0x0000000014268000-memory.dmp

      Filesize

      96KB

    • memory/604-188-0x0000000014230000-0x0000000014248000-memory.dmp

      Filesize

      96KB

    • memory/604-198-0x0000000014270000-0x0000000014288000-memory.dmp

      Filesize

      96KB

    • memory/604-203-0x0000000014290000-0x00000000142A8000-memory.dmp

      Filesize

      96KB

    • memory/604-215-0x00000000142D0000-0x00000000142E8000-memory.dmp

      Filesize

      96KB

    • memory/604-210-0x00000000142B0000-0x00000000142C8000-memory.dmp

      Filesize

      96KB

    • memory/2540-207-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/2540-204-0x0000000000640000-0x0000000000650000-memory.dmp

      Filesize

      64KB

    • memory/2540-135-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2540-138-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/2540-137-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB