Analysis
-
max time kernel
18s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:55
Static task
static1
Behavioral task
behavioral1
Sample
018f3f7e2e731500654aa680c6dbfacd5a2cbe0ca9aead83b632453aaa531a88.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
018f3f7e2e731500654aa680c6dbfacd5a2cbe0ca9aead83b632453aaa531a88.exe
Resource
win10v2004-20221111-en
General
-
Target
018f3f7e2e731500654aa680c6dbfacd5a2cbe0ca9aead83b632453aaa531a88.exe
-
Size
112KB
-
MD5
457172bf57a9e415545c31756c6f16b6
-
SHA1
66008496c53954cbd931579fe9464e1eb02833cd
-
SHA256
018f3f7e2e731500654aa680c6dbfacd5a2cbe0ca9aead83b632453aaa531a88
-
SHA512
92852e17a3333848ce6b88b08d83e6c2b28b6b6c8fddd5cdb16faa8bfb3c2a0adda3529159014e35a83a679c60c1b2269bf72f22ecb7697e3dd6894b4f6a4da9
-
SSDEEP
1536:XSSnze1gsJ55n/4CkOwwF+bhoOHLnjXIRXMMGBkyJMjZROYJT3bQghxHCZ:iSn3sziCkd5bho+nsRcaC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Winklyt.exepid process 1608 Winklyt.exe -
Drops file in System32 directory 4 IoCs
Processes:
018f3f7e2e731500654aa680c6dbfacd5a2cbe0ca9aead83b632453aaa531a88.exeWinklyt.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Winklyt.exe 018f3f7e2e731500654aa680c6dbfacd5a2cbe0ca9aead83b632453aaa531a88.exe File created C:\Windows\SysWOW64\Winklyt.exe 018f3f7e2e731500654aa680c6dbfacd5a2cbe0ca9aead83b632453aaa531a88.exe File opened for modification C:\Windows\SysWOW64\Winklyt.exe Winklyt.exe File created C:\Windows\SysWOW64\Winklyt.exe Winklyt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
018f3f7e2e731500654aa680c6dbfacd5a2cbe0ca9aead83b632453aaa531a88.exeWinklyt.exedescription pid process Token: SeTcbPrivilege 864 018f3f7e2e731500654aa680c6dbfacd5a2cbe0ca9aead83b632453aaa531a88.exe Token: SeTcbPrivilege 1608 Winklyt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\018f3f7e2e731500654aa680c6dbfacd5a2cbe0ca9aead83b632453aaa531a88.exe"C:\Users\Admin\AppData\Local\Temp\018f3f7e2e731500654aa680c6dbfacd5a2cbe0ca9aead83b632453aaa531a88.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:864
-
C:\Windows\SysWOW64\Winklyt.exeC:\Windows\SysWOW64\Winklyt.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1608
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5d50b0b394d96961e391228bf10ae84bc
SHA107e6176ecdd916604c34ad4a25853c21e82e3589
SHA256852eb7fdb3cba7e6ab8e307076c5184bdd18ca01939d3a63c8fa017fca086cc6
SHA512a8fd079c3d90bb7b28c170fc05b39cdcd491f2cdc634e44c9732b406058a1cce170154b81b5cdad2e60f1145cbfcd2897d62266da8045c80b2f053ee2cc44fe2
-
Filesize
82KB
MD5d50b0b394d96961e391228bf10ae84bc
SHA107e6176ecdd916604c34ad4a25853c21e82e3589
SHA256852eb7fdb3cba7e6ab8e307076c5184bdd18ca01939d3a63c8fa017fca086cc6
SHA512a8fd079c3d90bb7b28c170fc05b39cdcd491f2cdc634e44c9732b406058a1cce170154b81b5cdad2e60f1145cbfcd2897d62266da8045c80b2f053ee2cc44fe2