Analysis
-
max time kernel
104s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 08:56
Static task
static1
Behavioral task
behavioral1
Sample
0f00ccd8e20025aea0e0f9fe49a93d4ac51228852aeb5bf4d50557b90fe7c134.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0f00ccd8e20025aea0e0f9fe49a93d4ac51228852aeb5bf4d50557b90fe7c134.exe
Resource
win10v2004-20220901-en
General
-
Target
0f00ccd8e20025aea0e0f9fe49a93d4ac51228852aeb5bf4d50557b90fe7c134.exe
-
Size
91KB
-
MD5
7c63da12a17748f542ec88a2ea2f90c0
-
SHA1
4f8c2056323884b44c261a48b70f2015fbb9f856
-
SHA256
0f00ccd8e20025aea0e0f9fe49a93d4ac51228852aeb5bf4d50557b90fe7c134
-
SHA512
5af592fc88b541d5df94eea820072b112d7ffed9003f0021e1f0aaabd35fb14e942fea1957a99e11817fdd647189c83ff914ee3997ee67b4c183cf16fe48fd00
-
SSDEEP
768:WeWGCQxs9kGd96NDkSV2bIXzl4CnTDHGsDf8RUFqoD4bDIsFDBnoZ76p6D5Ga34:1WGxs9kGdYk8wO4Cnt8RUyhoZ+Cl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3740 Winkyk.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Winkyk.exe 0f00ccd8e20025aea0e0f9fe49a93d4ac51228852aeb5bf4d50557b90fe7c134.exe File opened for modification C:\Windows\SysWOW64\Winkyk.exe Winkyk.exe File created C:\Windows\SysWOW64\Winkyk.exe Winkyk.exe File opened for modification C:\Windows\SysWOW64\Winkyk.exe 0f00ccd8e20025aea0e0f9fe49a93d4ac51228852aeb5bf4d50557b90fe7c134.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2680 0f00ccd8e20025aea0e0f9fe49a93d4ac51228852aeb5bf4d50557b90fe7c134.exe Token: SeTcbPrivilege 3740 Winkyk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f00ccd8e20025aea0e0f9fe49a93d4ac51228852aeb5bf4d50557b90fe7c134.exe"C:\Users\Admin\AppData\Local\Temp\0f00ccd8e20025aea0e0f9fe49a93d4ac51228852aeb5bf4d50557b90fe7c134.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
C:\Windows\SysWOW64\Winkyk.exeC:\Windows\SysWOW64\Winkyk.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3740
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5480e0792fc80295b76385ea4d5c1209c
SHA1b7681debcbddc50d376f7f735c1d637924f93e61
SHA25681a1107f6377739d389f8a795965ee7371529285b613b3754b17e3de2b763b6c
SHA512f0a6b89eb58a9feff3491b89447f70a60335049e66c322513ba3f35e273cbc443ee46901169a861e1f1b92df6ade0317df0531ce481c1944a8e7375e59b159c6
-
Filesize
88KB
MD5480e0792fc80295b76385ea4d5c1209c
SHA1b7681debcbddc50d376f7f735c1d637924f93e61
SHA25681a1107f6377739d389f8a795965ee7371529285b613b3754b17e3de2b763b6c
SHA512f0a6b89eb58a9feff3491b89447f70a60335049e66c322513ba3f35e273cbc443ee46901169a861e1f1b92df6ade0317df0531ce481c1944a8e7375e59b159c6