Analysis
-
max time kernel
0s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 20:23
Static task
static1
Behavioral task
behavioral1
Sample
33262bbaf186d30fe7e320da5047c473ee18688b25d964cc9d28391c6893b741.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
33262bbaf186d30fe7e320da5047c473ee18688b25d964cc9d28391c6893b741.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
33262bbaf186d30fe7e320da5047c473ee18688b25d964cc9d28391c6893b741.exe
-
Size
92KB
-
MD5
849fe6e986a41cfd9c65257daad5765e
-
SHA1
123f17a7fa76f283119a598527bed138d10442af
-
SHA256
33262bbaf186d30fe7e320da5047c473ee18688b25d964cc9d28391c6893b741
-
SHA512
7a644788e5f11b0ebcd516dfc7e1028e2a2189d6257e9f0fba093593cc454b9ea0bcbbe392cc5bf23a3eb3541f8e513a46ce9e63c44f3c924550f9d7a44589f9
-
SSDEEP
1536:2KZ2XcobMm+qa59UmhMo8qHAiKDxxQ57PQ0pKhJrv5endOl3STdzhKI:xxoCfUm18qHaU5johunYsTdzhKI
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\xmeizob.dll 33262bbaf186d30fe7e320da5047c473ee18688b25d964cc9d28391c6893b741.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1204 33262bbaf186d30fe7e320da5047c473ee18688b25d964cc9d28391c6893b741.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33262bbaf186d30fe7e320da5047c473ee18688b25d964cc9d28391c6893b741.exe"C:\Users\Admin\AppData\Local\Temp\33262bbaf186d30fe7e320da5047c473ee18688b25d964cc9d28391c6893b741.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2044