Analysis
-
max time kernel
49s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
6650991c5cebc26728ea6860cac5383a2f89337545c7620869c0d8761c840547.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6650991c5cebc26728ea6860cac5383a2f89337545c7620869c0d8761c840547.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
6650991c5cebc26728ea6860cac5383a2f89337545c7620869c0d8761c840547.exe
-
Size
88KB
-
MD5
5917194b2d0f80b31be10f7b06caef08
-
SHA1
ac7d7f8f16333c89225b3a696a629e461c9d5e02
-
SHA256
6650991c5cebc26728ea6860cac5383a2f89337545c7620869c0d8761c840547
-
SHA512
db954bc2f5cee08a7428afc80ef4f10c831261460d9eebe6d4d4411bfd3e920b902383f06f7e76fdc1be9e7a52abb2600366b5a2b0e210a50efb24a88feca402
-
SSDEEP
1536:LZ3Rb1u2fFTr37kEUGcvPxANeAi8v86zRi3zXMmuGYHoosJlIU:LtLHFTD7zPcZAnv89ghVHoosJlIU
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\bmhspni.dll 6650991c5cebc26728ea6860cac5383a2f89337545c7620869c0d8761c840547.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1900 6650991c5cebc26728ea6860cac5383a2f89337545c7620869c0d8761c840547.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6650991c5cebc26728ea6860cac5383a2f89337545c7620869c0d8761c840547.exe"C:\Users\Admin\AppData\Local\Temp\6650991c5cebc26728ea6860cac5383a2f89337545c7620869c0d8761c840547.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1124
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1112