Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 08:14
Static task
static1
Behavioral task
behavioral1
Sample
1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe
-
Size
239KB
-
MD5
70723927bd50ea337f1a59ca1a0a24c0
-
SHA1
d8a2fb5c3652bb1e0a840658562aed3caff49591
-
SHA256
1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27
-
SHA512
16f42d49829020adb0e759eb569f64fa4a70b26b4ffacde6d98413d0dfddc9acc9b29c073281b001bc032ed27560e8be5525433beb426f0da8d88d3deaae85a0
-
SSDEEP
6144:ccfqGJSFKnLQXBgBrX227mz4DgAxOvKWr8:/tJS40x0pDgAxOv/8
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\1F9E6F~1.EXE," 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1F9E6F~1.EXE" 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b63824e7 = "t9ïD*ëDX\r\x06šÇ[q\x17°‚~½\x1aÿÊ¿7\x16Úh«$’:ÇkÂ>-2\x16µm\v¦/‰ÝÉM*\u009d½\x7fÎ#h\a‘@‚œJ\x0eÜ\x1d>cò\fŽU>®\u00a0H;O|øÛ\x1fZŒ\x12GRz;8šM»\n\x04æ!\u009d@\x1105‚JOQ·~`\x13'þQîS9è\n1V\x12“!þèûÈÉ»—Z\x03\x18^¢Éƒkf\x1a\x1b9³Ò@!ëÃÒûa볉V!P£~R3‹Ê&É®€O«Ï¿ÊÆñcú{?š\nHÙˆA€ù·OØ\x1bŠ\x1f9\br3¹;Ù\x1a\x1f7â£Ëë—8Rƒ>¢7»s#†" 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1F9E6F~1.EXE" 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1908 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe 1908 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe 1908 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe 1908 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe 1908 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe 1908 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe 1908 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1908 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe Token: SeSecurityPrivilege 1908 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe Token: SeSecurityPrivilege 1908 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe Token: SeSecurityPrivilege 1908 1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe"C:\Users\Admin\AppData\Local\Temp\1f9e6f25014b732d66ca0c90cc67fae0b97d92f285208cf5ed9d296d2e902a27.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908