Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2022 06:59

General

  • Target

    ecc0838f5aa479ce6ba861e7ba5db38806a3743e941a5ff3aac8b010410d0873.exe

  • Size

    250KB

  • MD5

    3b1c507c0d0cd3a9d57ff6df2eec8440

  • SHA1

    d29ff8bd5182a1f9f493205ff8add0d789a982a9

  • SHA256

    ecc0838f5aa479ce6ba861e7ba5db38806a3743e941a5ff3aac8b010410d0873

  • SHA512

    c36463da0069c9ef710ce69e85f805c6d3973635c6202494a9f8262327598332c9fcc1b7b377f43de02e6b69b1502c880927e435cd56504605f228cb5705f514

  • SSDEEP

    6144:7cjlsubtn6BV+/1PSSggDhBkLq2pjMoyYKRKESBv:AiuZ6Bq1aMWqBTSV

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecc0838f5aa479ce6ba861e7ba5db38806a3743e941a5ff3aac8b010410d0873.exe
    "C:\Users\Admin\AppData\Local\Temp\ecc0838f5aa479ce6ba861e7ba5db38806a3743e941a5ff3aac8b010410d0873.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3684

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3684-132-0x000000007FDE0000-0x000000007FE47000-memory.dmp

    Filesize

    412KB

  • memory/3684-133-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/3684-134-0x0000000002620000-0x00000000026D2000-memory.dmp

    Filesize

    712KB

  • memory/3684-135-0x00000000027E0000-0x0000000002898000-memory.dmp

    Filesize

    736KB