Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 16:36
Static task
static1
Behavioral task
behavioral1
Sample
1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe
Resource
win10v2004-20220901-en
General
-
Target
1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe
-
Size
541KB
-
MD5
378a1bc54157f559dcd2d44a968aae8e
-
SHA1
4c22a9396fcb85a7c84efab452bf4994ad0a8ded
-
SHA256
1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f
-
SHA512
917d5604c0f09f87857e54978f1dfb8e9313881393fa1da4101606968747c1e764016b82adf758b12653e11b83032eb1dbc5383258fc498f5058e4e972ee356b
-
SSDEEP
12288:YR2siYxfXbvBv7LNN5BMR6TpEQy94Cj9jXUxgs:YRl5tXbvNz5e6TvCj9jXU2s
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\System\\5CXVXYs67wqo.exe\",explorer.exe" 1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe File opened for modification C:\Windows\assembly\Desktop.ini 1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe -
Drops file in Windows directory 3 IoCs
Processes:
1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exedescription ioc process File opened for modification C:\Windows\assembly 1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe File created C:\Windows\assembly\Desktop.ini 1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe File opened for modification C:\Windows\assembly\Desktop.ini 1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exepid process 4868 1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exedescription pid process Token: SeDebugPrivilege 4868 1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe Token: SeDebugPrivilege 4868 1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exepid process 4868 1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe"C:\Users\Admin\AppData\Local\Temp\1c06364242025d376588209d7696b2a7d30b7dc821dce8e6e97765199022c96f.exe"1⤵
- Modifies WinLogon for persistence
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4868