Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe
Resource
win10v2004-20220812-en
General
-
Target
88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe
-
Size
269KB
-
MD5
07fc8ee27f20150efc4483e5119cb910
-
SHA1
f44dc386cd377eb0520b3c38111376581a3a3dbf
-
SHA256
88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902
-
SHA512
31df896c4ae3ce9328ae24583480371ec00ef86e6309e19f00a3420bad4d79973000e581c484d1b5b0eac22e7732720be3349c55b1b4775aa8f972e7862deb7a
-
SSDEEP
6144:oU6t/XL0KrEoAMKmJLhUGkFZmp6T8sEZIlJ3iRkW5f9:JEYKrEGKmlhUGSmC8vqJU5l
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\88EE1F~1.EXE," 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\88EE1F~1.EXE" 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e3cab05c = "¡\b\x18\u0090:€¿qYÌúÔc\x12é\ny{\x0fK>D·\u0081[iך9H8‡$9\u009d1fvL7Ü¢b©›ø\\|€ø»-õŒ6Žp‰’©§¨äÞ\u0081¾‡….†l‰w†\x19g§‚Ь¡\f%\x01ƒ\x13\"ô‰“?\x1dt¿?\fm¾\x1cwFÎÊ\nµ)$Âc*1ú\x1d¶²\x02C\x1aÍ‚>3}’;#¼cäbBéCŒâÜ\"23µ³\u0081\x032åÆ\tk-ã\x15‚)‚’Œ\nŒe1Tý-’\x02i\x01©5Å\x1aÚ”1!F2e,b‘\x02M\rû-\x19…|„êU¥]\u008d\x02äÎë†rÂ\x04zÛ\r^´Ä•vE¹ú-]œ3~5sq\x1e2‚\x0eÚB’‹æ]]½ë*z\x04êq•:bzÝM\\\u008dRÁý2<ôÝŠ«Úã#" 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\88EE1F~1.EXE" 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe Token: SeSecurityPrivilege 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe Token: SeSecurityPrivilege 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe Token: SeSecurityPrivilege 4464 88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe"C:\Users\Admin\AppData\Local\Temp\88ee1fbc75938165a861bb17733392072dd76b14def4fe0ed4b9cecac19ba902.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464