Analysis
-
max time kernel
141s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 15:40
Static task
static1
Behavioral task
behavioral1
Sample
050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe
Resource
win10v2004-20220812-en
General
-
Target
050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe
-
Size
609KB
-
MD5
7c393aa5a34cc49ce0a0ca6b62da2ea4
-
SHA1
a5b071ebd991bf21385d981ed066912f61129f1d
-
SHA256
050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738
-
SHA512
4b9a6652b07965f1efef763827ea093b804db7762969a0a2983c13824e28bca5f648de435c056bc487d9c3cd5c17371d60f173d41335b6f74b4bfaafd11d73f7
-
SSDEEP
12288:/QF7YaS5DRVh4S0UWjIQsDbsI7cqFlYvE7TTtw3gGSCB48Jot/:82RVh4zIQsD37cYYMPTtugA+eot
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\VXyp7dAoE27slGpl\\wFCcEGTWEmh5.exe\",explorer.exe" 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1880 set thread context of 1936 1880 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1880 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1880 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe Token: SeDebugPrivilege 1936 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1936 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1936 1880 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe 27 PID 1880 wrote to memory of 1936 1880 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe 27 PID 1880 wrote to memory of 1936 1880 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe 27 PID 1880 wrote to memory of 1936 1880 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe 27 PID 1880 wrote to memory of 1936 1880 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe 27 PID 1880 wrote to memory of 1936 1880 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe 27 PID 1880 wrote to memory of 1936 1880 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe 27 PID 1880 wrote to memory of 1936 1880 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe 27 PID 1880 wrote to memory of 1936 1880 050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe"C:\Users\Admin\AppData\Local\Temp\050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe"C:\Users\Admin\AppData\Local\Temp\050ba96d0efe30e1b9f525ac12941a25affd0e7ff51efba8f2d7602387792738.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1936
-