Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 12:53
Static task
static1
Behavioral task
behavioral1
Sample
cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exe
Resource
win10v2004-20220812-en
General
-
Target
cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exe
-
Size
316KB
-
MD5
d562dfff70b5b587deaf89b746adc4af
-
SHA1
0d8bb6001d2cee4b9fff54b6d06feb2d9114a075
-
SHA256
cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749
-
SHA512
75e0bca7b1bcfdc163074f74c5153c03facba1c1ef0db3611d31d2648ccfce094e3740bec4871d17f6908fb9aa7e533414cc48a373f225635e64680225198fce
-
SSDEEP
3072:XrtwjXqCZgQHWaWb1r4cW8fw7/lH1v3aUlmDFLQRZqKwhCtka7P/W+Ln:BwnZ0B43l7/lH1vKiSM
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\WINDOWS\\winlogon.exe" cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exe -
Modifies firewall policy service 2 TTPs 2 IoCs
Processes:
cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\winlogon.exe = "C:\\WINDOWS\\winlogon.exe" cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exe -
Drops file in System32 directory 1 IoCs
Processes:
cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exedescription ioc process File opened for modification C:\WINDOWS\SysWOW64\MSWINSCK.OCX cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exepid process 1644 cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exe"C:\Users\Admin\AppData\Local\Temp\cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exe"1⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1644