Analysis
-
max time kernel
31s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 21:28
Static task
static1
Behavioral task
behavioral1
Sample
0c10a05ab2a9159a80b27c8e6088dd951535f0550b0075cdeb579e516f6aa8fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0c10a05ab2a9159a80b27c8e6088dd951535f0550b0075cdeb579e516f6aa8fa.exe
Resource
win10v2004-20220812-en
General
-
Target
0c10a05ab2a9159a80b27c8e6088dd951535f0550b0075cdeb579e516f6aa8fa.exe
-
Size
90KB
-
MD5
55e12c0bfe2f6e96dc91b6033675a220
-
SHA1
2c51a9386b5be9d9021c831551b00253c0a91c5d
-
SHA256
0c10a05ab2a9159a80b27c8e6088dd951535f0550b0075cdeb579e516f6aa8fa
-
SHA512
abe55346e1ac78fd239781e6a3b66e0e6e6b61c5f921139b80a2f837da8972f9d7620a4e9f079e965fa5dc37fc9c776ce09ce3f20399ddbd29efc864a068c05e
-
SSDEEP
768:WeWGCQxs9kGd96NDkSV2bIXzl4CnTDHGsDf8RUFqoD4bDIsFDBnoY4U+p6D5oE:1WGxs9kGdYk8wO4Cnt8RUyhoYcCo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 Winktb.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Winktb.exe 0c10a05ab2a9159a80b27c8e6088dd951535f0550b0075cdeb579e516f6aa8fa.exe File created C:\Windows\SysWOW64\Winktb.exe 0c10a05ab2a9159a80b27c8e6088dd951535f0550b0075cdeb579e516f6aa8fa.exe File opened for modification C:\Windows\SysWOW64\Winktb.exe Winktb.exe File created C:\Windows\SysWOW64\Winktb.exe Winktb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1032 0c10a05ab2a9159a80b27c8e6088dd951535f0550b0075cdeb579e516f6aa8fa.exe Token: SeTcbPrivilege 2036 Winktb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c10a05ab2a9159a80b27c8e6088dd951535f0550b0075cdeb579e516f6aa8fa.exe"C:\Users\Admin\AppData\Local\Temp\0c10a05ab2a9159a80b27c8e6088dd951535f0550b0075cdeb579e516f6aa8fa.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
C:\Windows\SysWOW64\Winktb.exeC:\Windows\SysWOW64\Winktb.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2036
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD522c70ab18057826daa0d7885bfe1981b
SHA1161f37a6ce5564f0f855c958aa3d2f72d56fb311
SHA256ef64318e0daaa9a423a733d0295f5e86134bda5bba77f8b877879aa178750d3f
SHA5127bfb118f7198584add536a43f341b371e9306dd08e217708535d5b354971c3ee8f7a5a588266ade0cd8cc8d6cb658835258b75f08341d71f3e35936d75c105dd
-
Filesize
85KB
MD522c70ab18057826daa0d7885bfe1981b
SHA1161f37a6ce5564f0f855c958aa3d2f72d56fb311
SHA256ef64318e0daaa9a423a733d0295f5e86134bda5bba77f8b877879aa178750d3f
SHA5127bfb118f7198584add536a43f341b371e9306dd08e217708535d5b354971c3ee8f7a5a588266ade0cd8cc8d6cb658835258b75f08341d71f3e35936d75c105dd