Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe
Resource
win10v2004-20220812-en
General
-
Target
2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe
-
Size
279KB
-
MD5
5c5563159fd0966bf1caa74c79f020d0
-
SHA1
ed8c0fe4bc4cd24f58be1701242f6215971b501f
-
SHA256
2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3
-
SHA512
1a197488953530541603b5957aebe9d8073f0f72c5f6195f5eead973c9b422029ed88c31e4db1e454ab070519767fc69b7828175cb2670c5cb3f52731ac4ed46
-
SSDEEP
6144:wlGGQgTEldXbJzcWUUWWagxiR7KQbMX5Xa71Qb+YW3Ns4zeZ:w/3IzXbJznFWWt8VS5XawW3Ns4zeZ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\2DCFDB~1.EXE," 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2DCFDB~1.EXE" 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\db492187 = "ÏiJ–W\u0081„ÍÚÕâ\tgÈ¢™#î8\"\x02Ç'òC˜ß\x1aòæ£{\x12â„H«\n\x12Î/7”¿'/‹e\x1bŒ¿\x16Ëß\x1f×ïÎs¨/Ùæ²PÎ)H\u008f•V~ï\u009d*çoÓ\x1d¸yáݲáU\x1a·j“Ä°F\x11HP‘50¾–þ\x06æ:ÆÞ¢NsŠÞ\x18Ökûó\x04\x16v\vŽþľΫÎÌ~&(TTS*nÖd̤Ö„^³ŠÖ›¾ÜöTæ6^VRúP6Þ¶Â\\\x06NS\x1a›^xkfF\x1c¼²«æ<þ#¤h”t¦ó~ä®Àk¸|¦æ0œº\x06¶îü¾Ä°ä4Vë¨vs:ÖBFsã6ÆnŽd\x04f°\fKÎŽ\x10K®D¦ƒÎ\x1aæ°ü&&&\x06ÎîF°ƒ6dŠzØœ" 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2DCFDB~1.EXE" 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1076 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe 1076 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe 1076 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe 1076 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe 1076 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe 1076 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1076 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe Token: SeSecurityPrivilege 1076 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe Token: SeSecurityPrivilege 1076 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe Token: SeSecurityPrivilege 1076 2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe"C:\Users\Admin\AppData\Local\Temp\2dcfdb4a899159863879ae98e6970dc5521c08716d1aa652c6cedadc2dd18db3.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076