Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:02
Static task
static1
Behavioral task
behavioral1
Sample
93860f88686b44d22b38a6a8d40ba3a0b6ebe64d4217fda46fb5d23a005e493f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
93860f88686b44d22b38a6a8d40ba3a0b6ebe64d4217fda46fb5d23a005e493f.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
93860f88686b44d22b38a6a8d40ba3a0b6ebe64d4217fda46fb5d23a005e493f.exe
-
Size
88KB
-
MD5
040b9d41782a28966c850809decfdfe5
-
SHA1
8435ef36ae56d7d58931923c296748ca12d5f734
-
SHA256
93860f88686b44d22b38a6a8d40ba3a0b6ebe64d4217fda46fb5d23a005e493f
-
SHA512
f1a369d556d2f9443c933db3562d1ebe3d06820dd5f9725d532dc4ea79c561ac1d86671676ee8ceb93a871a338a4334c77a7eecaf374594fc89fcd98fccc625c
-
SSDEEP
1536:/PtLHLbIAgOQ9daaeikmi2uURbS+HSPy+ti4Xkmm+6HouXJlIU:/Fr/ZPQDaodbRTSPy8KZjHoCJlIU
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
Processes:
93860f88686b44d22b38a6a8d40ba3a0b6ebe64d4217fda46fb5d23a005e493f.exedescription ioc process File created C:\Windows\SysWOW64\xovszaa.dll 93860f88686b44d22b38a6a8d40ba3a0b6ebe64d4217fda46fb5d23a005e493f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
93860f88686b44d22b38a6a8d40ba3a0b6ebe64d4217fda46fb5d23a005e493f.exedescription pid process Token: SeShutdownPrivilege 1184 93860f88686b44d22b38a6a8d40ba3a0b6ebe64d4217fda46fb5d23a005e493f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\93860f88686b44d22b38a6a8d40ba3a0b6ebe64d4217fda46fb5d23a005e493f.exe"C:\Users\Admin\AppData\Local\Temp\93860f88686b44d22b38a6a8d40ba3a0b6ebe64d4217fda46fb5d23a005e493f.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1788
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:648