Analysis

  • max time kernel
    91s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 12:53

General

  • Target

    cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exe

  • Size

    316KB

  • MD5

    d562dfff70b5b587deaf89b746adc4af

  • SHA1

    0d8bb6001d2cee4b9fff54b6d06feb2d9114a075

  • SHA256

    cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749

  • SHA512

    75e0bca7b1bcfdc163074f74c5153c03facba1c1ef0db3611d31d2648ccfce094e3740bec4871d17f6908fb9aa7e533414cc48a373f225635e64680225198fce

  • SSDEEP

    3072:XrtwjXqCZgQHWaWb1r4cW8fw7/lH1v3aUlmDFLQRZqKwhCtka7P/W+Ln:BwnZ0B43l7/lH1vKiSM

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exe
    "C:\Users\Admin\AppData\Local\Temp\cf9d6513f428eb06b3410660fb19b5119b937eb4a2133b4262f56ca6e838c749.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies firewall policy service
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:4908

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads