Analysis
-
max time kernel
33s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
9a9b3f677de49a58c5e50f5b8ad1ad07604bc5d093bbd7da93d5cd407b810790.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a9b3f677de49a58c5e50f5b8ad1ad07604bc5d093bbd7da93d5cd407b810790.exe
Resource
win10v2004-20220812-en
General
-
Target
9a9b3f677de49a58c5e50f5b8ad1ad07604bc5d093bbd7da93d5cd407b810790.exe
-
Size
78KB
-
MD5
c2cdde45ecdab0faf24797ab020094ed
-
SHA1
061590684182b78f2b39216c9efcfecfb6c92db6
-
SHA256
9a9b3f677de49a58c5e50f5b8ad1ad07604bc5d093bbd7da93d5cd407b810790
-
SHA512
a81c4337a7180498ade50d3b7b30cbc3d2a7aa3adb1277dda15d0fd2f72afef652b1e71de8660c64687df10e713f678f6f1835f472b6ebe6c9a1e7eaa4960461
-
SSDEEP
1536:zaWLF1kxTnUI4CFPtv6iSJnaGlbVxhojVEg:zaWExTnUTCFPtvanaGlbVxhojV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2008 Winkuox.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Winkuox.exe Winkuox.exe File opened for modification C:\Windows\SysWOW64\Winkuox.exe 9a9b3f677de49a58c5e50f5b8ad1ad07604bc5d093bbd7da93d5cd407b810790.exe File created C:\Windows\SysWOW64\Winkuox.exe 9a9b3f677de49a58c5e50f5b8ad1ad07604bc5d093bbd7da93d5cd407b810790.exe File opened for modification C:\Windows\SysWOW64\Winkuox.exe Winkuox.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1664 9a9b3f677de49a58c5e50f5b8ad1ad07604bc5d093bbd7da93d5cd407b810790.exe Token: SeTcbPrivilege 2008 Winkuox.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a9b3f677de49a58c5e50f5b8ad1ad07604bc5d093bbd7da93d5cd407b810790.exe"C:\Users\Admin\AppData\Local\Temp\9a9b3f677de49a58c5e50f5b8ad1ad07604bc5d093bbd7da93d5cd407b810790.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
C:\Windows\SysWOW64\Winkuox.exeC:\Windows\SysWOW64\Winkuox.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2008
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD50f9539cfe1ad93b079a6c5425e618903
SHA18b97bd26eac0c56c273f531078a2ae1266b82d8d
SHA2569354dcb9f846098d8936a956028dc2317346f3ed32553d06353e71c1a06fccfc
SHA512dcb14971488e8cbb36583bfa571089028efffb5a983532622265baf53a2b691c3e560287dc09c348a15417b9c5730a86526455d0a0cfe13ec8c3540e3a503a0c
-
Filesize
79KB
MD50f9539cfe1ad93b079a6c5425e618903
SHA18b97bd26eac0c56c273f531078a2ae1266b82d8d
SHA2569354dcb9f846098d8936a956028dc2317346f3ed32553d06353e71c1a06fccfc
SHA512dcb14971488e8cbb36583bfa571089028efffb5a983532622265baf53a2b691c3e560287dc09c348a15417b9c5730a86526455d0a0cfe13ec8c3540e3a503a0c