Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 04:27

General

  • Target

    1aa5039741223d0ff8d16863ec60fd56df4658f2b7d840ad5dff81638a0bd12e.exe

  • Size

    106KB

  • MD5

    c28f5e46d36d2c92b2cb3c530d72de1b

  • SHA1

    c274fa3d08b8e6ea4e72b981325e00b077a190e6

  • SHA256

    1aa5039741223d0ff8d16863ec60fd56df4658f2b7d840ad5dff81638a0bd12e

  • SHA512

    fae700f494fae8a7de6f622d79ec3eb91ae0936d0e8cc2b11ea97f0d4c12d01d72781124c681f96d469f971f4f51e8ca99c5a55baa23cbe7d06627bf345c6352

  • SSDEEP

    1536:7B9nJmfKs2a62tVn+7CzEYlKkR0yfy2R5xnzfzncx1XK3bYrzpJKj7mcDeY:7ofKHb2VlNtavUjotK3srzpJKPmI

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:592
    • C:\Users\Admin\AppData\Local\Temp\1aa5039741223d0ff8d16863ec60fd56df4658f2b7d840ad5dff81638a0bd12e.exe
      "C:\Users\Admin\AppData\Local\Temp\1aa5039741223d0ff8d16863ec60fd56df4658f2b7d840ad5dff81638a0bd12e.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1128

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/592-136-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/592-141-0x0000000018850000-0x0000000018874000-memory.dmp

            Filesize

            144KB

          • memory/592-146-0x0000000018880000-0x00000000188A4000-memory.dmp

            Filesize

            144KB

          • memory/592-151-0x00000000188B0000-0x00000000188D4000-memory.dmp

            Filesize

            144KB

          • memory/592-156-0x00000000188E0000-0x0000000018904000-memory.dmp

            Filesize

            144KB

          • memory/592-161-0x0000000018910000-0x0000000018934000-memory.dmp

            Filesize

            144KB

          • memory/592-166-0x0000000018940000-0x0000000018964000-memory.dmp

            Filesize

            144KB

          • memory/592-171-0x0000000018970000-0x0000000018994000-memory.dmp

            Filesize

            144KB

          • memory/592-176-0x00000000189A0000-0x00000000189C4000-memory.dmp

            Filesize

            144KB

          • memory/592-181-0x00000000189D0000-0x00000000189F4000-memory.dmp

            Filesize

            144KB

          • memory/592-186-0x0000000018A00000-0x0000000018A24000-memory.dmp

            Filesize

            144KB

          • memory/592-191-0x0000000018A30000-0x0000000018A54000-memory.dmp

            Filesize

            144KB

          • memory/592-196-0x0000000018A60000-0x0000000018A84000-memory.dmp

            Filesize

            144KB

          • memory/592-201-0x0000000018A90000-0x0000000018AB4000-memory.dmp

            Filesize

            144KB

          • memory/592-206-0x0000000018AC0000-0x0000000018AE4000-memory.dmp

            Filesize

            144KB

          • memory/592-211-0x0000000018AF0000-0x0000000018B14000-memory.dmp

            Filesize

            144KB

          • memory/592-216-0x0000000018B20000-0x0000000018B44000-memory.dmp

            Filesize

            144KB

          • memory/592-221-0x0000000018B50000-0x0000000018B74000-memory.dmp

            Filesize

            144KB

          • memory/592-226-0x0000000018B80000-0x0000000018BA4000-memory.dmp

            Filesize

            144KB