Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 04:07
Static task
static1
Behavioral task
behavioral1
Sample
a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe
Resource
win10v2004-20220901-en
General
-
Target
a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe
-
Size
243KB
-
MD5
97a508f2b6823ec2818259c64ff56c8c
-
SHA1
3096fcdec8cceea94086843267e33ab78b1326e1
-
SHA256
a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1
-
SHA512
957d7fdd89b63628e2f0f489a8d34d4e9af7879021ac201cb736153816a0724416e4eef445392a432c2d9ebf4d8a2f4e14a8f2aad2f57742ae6c6e9546f44c01
-
SSDEEP
6144:TnScTKd/ASzisjWzxCyEBQFyTrfdiaXuQtqc7YKqkYh:VTKCS2sjWC1rfd/Rtqc7HqkYh
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\A3D4E0~1.EXE," a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\A3D4E0~1.EXE" a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\6c386149 = "ÈÐX\vq×”EŽ\u009dÆ®\vÀŠo2Æ®7e¢6Ú)è³Ææ†ûd²½\x15•.nw¾@n>H\x7fÙº¥ÖX•(uÕh\x01;¤iÚÜ/zRN\x12·DPÔwQê“dVËn/KDÚÚ6_ê³s³Î‘@\x04`j\x0eá7ŸnFT\x16rŒ$–é‚&št;J\x12ör&|©\x16\u0081A6C\x06N\x12é\x06Ñ’\x03ºnÚá‚ò\x0e¡\x02\x16|ªvÑR¢™nòL›Ùd,êÆzž\x1eRræéÒL¾®Ì\x16\x03rB‘ÛîꌚŠ±™Šºá²\x13:J6™”†B#+ªŒ\x1e\x02î.^\x1eŠlÞ\x13‘éÁò’\x16f‹ÚÎ\x14âk\u0081Œ¦\tª.æ6j’Ɔ~ÛJã\x14ò$‘J\x0eiÜën\n>löÁ4Îñ2\næ" a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\A3D4E0~1.EXE" a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2020 a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe 2020 a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe 2020 a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe 2020 a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe 2020 a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe 2020 a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe 2020 a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2020 a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe Token: SeSecurityPrivilege 2020 a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe Token: SeSecurityPrivilege 2020 a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe Token: SeSecurityPrivilege 2020 a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe"C:\Users\Admin\AppData\Local\Temp\a3d4e0ce0b5583d94677131be80a4d83ef4baba9f4e89e610840e9903ff100b1.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020