Analysis

  • max time kernel
    176s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 18:08

General

  • Target

    02382301e126820b7699087499679013dc8a1e8df00670209970bc80b0d7ea75.exe

  • Size

    442KB

  • MD5

    897c49b2a83524f3993a6421768fbdd0

  • SHA1

    4919437c1555c5d2b9aa0b97efac239f46b93a4a

  • SHA256

    02382301e126820b7699087499679013dc8a1e8df00670209970bc80b0d7ea75

  • SHA512

    388fb0253fdd9c11db5d437b6b6d2f4ffde51bd5d30f853319332369a5a34c7d2f282a53f9d8e3378754d23fbb5d827e7b87b082c5bc2a1bc37f55b1309ee2f4

  • SSDEEP

    12288:BOzBNFC08Za7kUZtLXjdtEc7PaHvHDzwP2g9+:By/Cza7nXBtdyHPDzwP2b

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:588
    • C:\Users\Admin\AppData\Local\Temp\02382301e126820b7699087499679013dc8a1e8df00670209970bc80b0d7ea75.exe
      "C:\Users\Admin\AppData\Local\Temp\02382301e126820b7699087499679013dc8a1e8df00670209970bc80b0d7ea75.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1052

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/588-173-0x0000000035C20000-0x0000000035C48000-memory.dmp

            Filesize

            160KB

          • memory/588-178-0x0000000035C50000-0x0000000035C78000-memory.dmp

            Filesize

            160KB

          • memory/588-143-0x0000000035B00000-0x0000000035B28000-memory.dmp

            Filesize

            160KB

          • memory/588-148-0x0000000035B30000-0x0000000035B58000-memory.dmp

            Filesize

            160KB

          • memory/588-153-0x0000000035B60000-0x0000000035B88000-memory.dmp

            Filesize

            160KB

          • memory/588-158-0x0000000035B90000-0x0000000035BB8000-memory.dmp

            Filesize

            160KB

          • memory/588-163-0x0000000035BC0000-0x0000000035BE8000-memory.dmp

            Filesize

            160KB

          • memory/588-168-0x0000000035BF0000-0x0000000035C18000-memory.dmp

            Filesize

            160KB

          • memory/588-138-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/588-214-0x0000000035DA0000-0x0000000035DC8000-memory.dmp

            Filesize

            160KB

          • memory/588-209-0x0000000035D70000-0x0000000035D98000-memory.dmp

            Filesize

            160KB

          • memory/588-184-0x0000000035C80000-0x0000000035CA8000-memory.dmp

            Filesize

            160KB

          • memory/588-189-0x0000000035CB0000-0x0000000035CD8000-memory.dmp

            Filesize

            160KB

          • memory/588-194-0x0000000035CE0000-0x0000000035D08000-memory.dmp

            Filesize

            160KB

          • memory/588-199-0x0000000035D10000-0x0000000035D38000-memory.dmp

            Filesize

            160KB

          • memory/588-204-0x0000000035D40000-0x0000000035D68000-memory.dmp

            Filesize

            160KB

          • memory/1052-179-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB

          • memory/1052-132-0x0000000000400000-0x000000000042D000-memory.dmp

            Filesize

            180KB