Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 11:46

General

  • Target

    d219e281769631a2a60ec575f9c2e18591aa240f784a40a399d88ac1cdf03494.exe

  • Size

    314KB

  • MD5

    9bce1f3dea515267168b491859b037a6

  • SHA1

    c71a9555c982894e016934eab01da71c6e2d4530

  • SHA256

    d219e281769631a2a60ec575f9c2e18591aa240f784a40a399d88ac1cdf03494

  • SHA512

    966e97e9bdac33bca28a95e4e03fbd4d189daeb54cd577b98dce91536c32edfac7ed2ba599703968523fd8c635f2a1a459a3866e9b3967c6eb5e693eed9f45d2

  • SSDEEP

    6144:A0E11ym+jcV9I+dx/brnEdxHdUemx2rB8ark4xD08X3BoBlaIBpMBM:AlX9+y9ItS+GarJD08nBdaMBM

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:592
    • C:\Users\Admin\AppData\Local\Temp\d219e281769631a2a60ec575f9c2e18591aa240f784a40a399d88ac1cdf03494.exe
      "C:\Users\Admin\AppData\Local\Temp\d219e281769631a2a60ec575f9c2e18591aa240f784a40a399d88ac1cdf03494.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2244

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/592-186-0x0000000007E70000-0x0000000007E87000-memory.dmp

            Filesize

            92KB

          • memory/592-141-0x0000000007D50000-0x0000000007D67000-memory.dmp

            Filesize

            92KB

          • memory/592-146-0x0000000007D70000-0x0000000007D87000-memory.dmp

            Filesize

            92KB

          • memory/592-151-0x0000000007D90000-0x0000000007DA7000-memory.dmp

            Filesize

            92KB

          • memory/592-156-0x0000000007DB0000-0x0000000007DC7000-memory.dmp

            Filesize

            92KB

          • memory/592-161-0x0000000007DD0000-0x0000000007DE7000-memory.dmp

            Filesize

            92KB

          • memory/592-166-0x0000000007DF0000-0x0000000007E07000-memory.dmp

            Filesize

            92KB

          • memory/592-171-0x0000000007E10000-0x0000000007E27000-memory.dmp

            Filesize

            92KB

          • memory/592-181-0x0000000007E50000-0x0000000007E67000-memory.dmp

            Filesize

            92KB

          • memory/592-176-0x0000000007E30000-0x0000000007E47000-memory.dmp

            Filesize

            92KB

          • memory/592-196-0x0000000007EB0000-0x0000000007EC7000-memory.dmp

            Filesize

            92KB

          • memory/592-191-0x0000000007E90000-0x0000000007EA7000-memory.dmp

            Filesize

            92KB

          • memory/592-136-0x0000000000400000-0x0000000000417000-memory.dmp

            Filesize

            92KB

          • memory/592-227-0x0000000007F70000-0x0000000007F87000-memory.dmp

            Filesize

            92KB

          • memory/592-202-0x0000000007ED0000-0x0000000007EE7000-memory.dmp

            Filesize

            92KB

          • memory/592-207-0x0000000007EF0000-0x0000000007F07000-memory.dmp

            Filesize

            92KB

          • memory/592-212-0x0000000007F10000-0x0000000007F27000-memory.dmp

            Filesize

            92KB

          • memory/592-217-0x0000000007F30000-0x0000000007F47000-memory.dmp

            Filesize

            92KB

          • memory/592-222-0x0000000007F50000-0x0000000007F67000-memory.dmp

            Filesize

            92KB

          • memory/2244-197-0x0000000000570000-0x0000000000581000-memory.dmp

            Filesize

            68KB