Analysis
-
max time kernel
74s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:40
Static task
static1
Behavioral task
behavioral1
Sample
4ee3dd248d2fa027fb0970ef3f3bf8b9c78c3503e6b7e3e58d0a0a25e698ed45.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4ee3dd248d2fa027fb0970ef3f3bf8b9c78c3503e6b7e3e58d0a0a25e698ed45.exe
Resource
win10v2004-20221111-en
General
-
Target
4ee3dd248d2fa027fb0970ef3f3bf8b9c78c3503e6b7e3e58d0a0a25e698ed45.exe
-
Size
116KB
-
MD5
b39b33ae7ede8f836dc1cdfdcd5489b6
-
SHA1
1efd383de9e4db7950b51433d93cfb47a900ee5c
-
SHA256
4ee3dd248d2fa027fb0970ef3f3bf8b9c78c3503e6b7e3e58d0a0a25e698ed45
-
SHA512
27738d61ed992908726250d170e6dc2200921aa108f9637a16435e54f48085a644848a0436da42f22146e03a556e8bd1164b01d3852f3f6822d23e04b865d0cc
-
SSDEEP
3072:X96lm06rv/2glOv/fLAFabL/1HZ9iYEl:X9/0IblOv/DCSd
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
4ee3dd248d2fa027fb0970ef3f3bf8b9c78c3503e6b7e3e58d0a0a25e698ed45.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\System32\\WindowsUpdate.exe" 4ee3dd248d2fa027fb0970ef3f3bf8b9c78c3503e6b7e3e58d0a0a25e698ed45.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
4ee3dd248d2fa027fb0970ef3f3bf8b9c78c3503e6b7e3e58d0a0a25e698ed45.exepid process 1272 4ee3dd248d2fa027fb0970ef3f3bf8b9c78c3503e6b7e3e58d0a0a25e698ed45.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4ee3dd248d2fa027fb0970ef3f3bf8b9c78c3503e6b7e3e58d0a0a25e698ed45.exedescription pid process Token: SeDebugPrivilege 1272 4ee3dd248d2fa027fb0970ef3f3bf8b9c78c3503e6b7e3e58d0a0a25e698ed45.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ee3dd248d2fa027fb0970ef3f3bf8b9c78c3503e6b7e3e58d0a0a25e698ed45.exe"C:\Users\Admin\AppData\Local\Temp\4ee3dd248d2fa027fb0970ef3f3bf8b9c78c3503e6b7e3e58d0a0a25e698ed45.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272