Analysis
-
max time kernel
244s -
max time network
322s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 23:45
Behavioral task
behavioral1
Sample
93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe
Resource
win10v2004-20221111-en
General
-
Target
93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe
-
Size
276KB
-
MD5
42d7cab85b6091321fcb6b263567dfc0
-
SHA1
ff1bd9453ca46e863ae592121a283a30ff8ab100
-
SHA256
93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c
-
SHA512
051bfcd0339f74834dc564dc592b4610a1595bdd433c185752d31b93479b79f9eddc04387f3ed383230fffbd1c9c5260bc98b568a44a2a309722baaa5dd52656
-
SSDEEP
6144:5cNYk1yuwEDBum3qYWnl0pd0EX3Zq2b6wfIDYm0PLv:5cWkbgTYWnYnt/IDYhPL
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe -
resource yara_rule behavioral2/memory/5084-132-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/5084-133-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeSecurityPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeTakeOwnershipPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeLoadDriverPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeSystemProfilePrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeSystemtimePrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeProfSingleProcessPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeIncBasePriorityPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeCreatePagefilePrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeBackupPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeRestorePrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeShutdownPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeDebugPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeSystemEnvironmentPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeChangeNotifyPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeRemoteShutdownPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeUndockPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeManageVolumePrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeImpersonatePrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: SeCreateGlobalPrivilege 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: 33 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: 34 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: 35 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe Token: 36 5084 93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe"C:\Users\Admin\AppData\Local\Temp\93e7c03e9e0dfcabcdbd4b621d1d1a1daa0959ff42dfc7c6cbf128a31cc2e08c.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5084