Analysis
-
max time kernel
116s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 14:11
Static task
static1
Behavioral task
behavioral1
Sample
f19331ecb941b3db1435d161eddd4afefdb376c427ae7792bbb8d215b345e515.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f19331ecb941b3db1435d161eddd4afefdb376c427ae7792bbb8d215b345e515.exe
Resource
win10v2004-20220812-en
General
-
Target
f19331ecb941b3db1435d161eddd4afefdb376c427ae7792bbb8d215b345e515.exe
-
Size
77KB
-
MD5
a2837f6c25718e57c4ed63c25980ecc0
-
SHA1
2fa4715af45a6e20a496f2ce748ea5d4a6526094
-
SHA256
f19331ecb941b3db1435d161eddd4afefdb376c427ae7792bbb8d215b345e515
-
SHA512
73b4c3b4fd4ac7a67e937caaec1b1bc914a240403e3074996ef1b2cd17ce7675507614faea487ad45867b9bd77e893264838209469093a867cef16595a999625
-
SSDEEP
768:zXS6Lnze1gshn5ew/QuBdL/4Ckir4SWeq3HwFdkt+Afs2DBnoCCu8wO7YZK6Kcgu:TSSnze1gsJ55n/4CkOwwF+bhoq8wO0O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3040 Winkvbt.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Winkvbt.exe f19331ecb941b3db1435d161eddd4afefdb376c427ae7792bbb8d215b345e515.exe File created C:\Windows\SysWOW64\Winkvbt.exe f19331ecb941b3db1435d161eddd4afefdb376c427ae7792bbb8d215b345e515.exe File opened for modification C:\Windows\SysWOW64\Winkvbt.exe Winkvbt.exe File created C:\Windows\SysWOW64\Winkvbt.exe Winkvbt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1936 f19331ecb941b3db1435d161eddd4afefdb376c427ae7792bbb8d215b345e515.exe Token: SeTcbPrivilege 3040 Winkvbt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f19331ecb941b3db1435d161eddd4afefdb376c427ae7792bbb8d215b345e515.exe"C:\Users\Admin\AppData\Local\Temp\f19331ecb941b3db1435d161eddd4afefdb376c427ae7792bbb8d215b345e515.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
C:\Windows\SysWOW64\Winkvbt.exeC:\Windows\SysWOW64\Winkvbt.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3040
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD560bdcb69d5bf79028c118b2ce926f6f3
SHA10f003fda91ecab31e5cdb10a754f42665d26a536
SHA2562da832910ab4bca3029e92513ef3e1b3ecf48d0ed2ecdcdf52661db647d3eb06
SHA512b4901e8241bb873700a3f539ce3bee65847209a20a41b905e50ac600470636cd604a920557596531746ba4a53c1792351ed76de2a3ba2ec693f373461e82cd01
-
Filesize
84KB
MD560bdcb69d5bf79028c118b2ce926f6f3
SHA10f003fda91ecab31e5cdb10a754f42665d26a536
SHA2562da832910ab4bca3029e92513ef3e1b3ecf48d0ed2ecdcdf52661db647d3eb06
SHA512b4901e8241bb873700a3f539ce3bee65847209a20a41b905e50ac600470636cd604a920557596531746ba4a53c1792351ed76de2a3ba2ec693f373461e82cd01