Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
36e8f25b777f815132291890af012e49b819c6126b748f6a56b11a78ff3c89fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
36e8f25b777f815132291890af012e49b819c6126b748f6a56b11a78ff3c89fe.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
36e8f25b777f815132291890af012e49b819c6126b748f6a56b11a78ff3c89fe.exe
-
Size
100KB
-
MD5
57dc3bbb9f9affad307f88b5ef1e2973
-
SHA1
e3ec5fa6f95f755053ad784339ac915e1cdda916
-
SHA256
36e8f25b777f815132291890af012e49b819c6126b748f6a56b11a78ff3c89fe
-
SHA512
364a8b9a88514b46e7efb482859f20c03fc8a862be92642b9557c156201f171fa7840aea036af96e6ab0b5f8f4b1162e91f4c7667769c23425350643f5d7f6e1
-
SSDEEP
1536:aEFPLbPmmMwZA4oFreO4GLjRQFi9wLdy7uZXMKLDXLHosSSSeSSS+y:aGfyVbjRQwq46XbrLHoI
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rvljyte.dll 36e8f25b777f815132291890af012e49b819c6126b748f6a56b11a78ff3c89fe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 816 36e8f25b777f815132291890af012e49b819c6126b748f6a56b11a78ff3c89fe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36e8f25b777f815132291890af012e49b819c6126b748f6a56b11a78ff3c89fe.exe"C:\Users\Admin\AppData\Local\Temp\36e8f25b777f815132291890af012e49b819c6126b748f6a56b11a78ff3c89fe.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:816
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2028
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1264