Analysis
-
max time kernel
53s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 12:05
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Cidox.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Cidox.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
1 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
Trojan-Ransom.Win32.Cidox.exe
-
Size
96KB
-
MD5
ca8f2bdbea9a238c9cf2e5b83598b21e
-
SHA1
f2817fa3716ff6c5dd5ec7d87497f1fa9d58e5cc
-
SHA256
2ab4618b7929c39a3dd186e05668231b44e6e1e89b77d46ee6a8118b6a61f723
-
SHA512
159a0e4ff4ba65a2000c83f10ece1ecb36a9c275d85c75ad7c6ef9f8231720b8d9490288664c2dc04a35e453c15bf909950161809a25930d82da5f69132c846d
-
SSDEEP
1536:F5wyF5v0gQTuY9DhVbfk9HfJ97GPiYl/Dp/kLa+daxo5:DsWUN5k9Hh9705DpMz4xo5
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\hkgtfjk.dll Trojan-Ransom.Win32.Cidox.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 900 Trojan-Ransom.Win32.Cidox.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Cidox.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Cidox.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:900
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2008
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1696