Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:44
Behavioral task
behavioral1
Sample
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe
Resource
win10v2004-20221111-en
General
-
Target
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe
-
Size
756KB
-
MD5
ea6e9d8f151d1437cba55259bd7627fa
-
SHA1
a913d0af4e1c115ffdd1e05faa3df480e6cd2024
-
SHA256
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9
-
SHA512
4a795ddd4f2d0d0ffde973162a9b8636d2cb9bc7f921d59a72c100b27789c8f89fd746fb4a9c4bfaebc7148dafc2fef0998cc623af142b4f8bc000080232c2cf
-
SSDEEP
12288:09HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hx4:4Z1xuVVjfFoynPaVBUR8f+kN10EBc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Z71v3uLvbWMc\\/rat/rat" 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\Z71v3uLvbWMc\\/rat/rat" 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe -
Drops file in System32 directory 4 IoCs
Processes:
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exedescription ioc process File created C:\Windows\SysWOW64\rat\rat 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe File created C:\Windows\SysWOW64\Z71v3uLvbWMc\rat\rat 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe File opened for modification C:\Windows\SysWOW64\Z71v3uLvbWMc\rat\rat 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe File opened for modification C:\Windows\SysWOW64\Z71v3uLvbWMc\ 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exedescription pid process Token: SeIncreaseQuotaPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeSecurityPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeTakeOwnershipPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeLoadDriverPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeSystemProfilePrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeSystemtimePrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeProfSingleProcessPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeIncBasePriorityPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeCreatePagefilePrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeBackupPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeRestorePrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeShutdownPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeDebugPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeSystemEnvironmentPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeChangeNotifyPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeRemoteShutdownPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeUndockPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeManageVolumePrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeImpersonatePrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeCreateGlobalPrivilege 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: 33 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: 34 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: 35 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: 36 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exepid process 4392 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe"C:\Users\Admin\AppData\Local\Temp\1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4392