Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/11/2022, 23:20

General

  • Target

    aef9a06f43b8b9edb3ff3be008a6d55104014194891ecc2b8c65c8e037275e25.exe

  • Size

    293KB

  • MD5

    1c827b23f806d56d6d50b214b249a3be

  • SHA1

    a04087fc07fe2398e9fdb5c4473d3c8fd9e0a567

  • SHA256

    aef9a06f43b8b9edb3ff3be008a6d55104014194891ecc2b8c65c8e037275e25

  • SHA512

    1dd34c8203c1c8d3acdde0e36ccea78b8b8cf2948d30a705d55db7eae208166e63741dd9e55dde0ef3c08be230d04046dd27dffdcd6cc49101bcc4e6dddbad9c

  • SSDEEP

    6144:gNwYOYeJpZ15X/wVaTM86j0XaFGLcNYvE26SMM6glM9cOeWbOmEx:cOYeJ/cETYj0XasINjhKMnJ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aef9a06f43b8b9edb3ff3be008a6d55104014194891ecc2b8c65c8e037275e25.exe
    "C:\Users\Admin\AppData\Local\Temp\aef9a06f43b8b9edb3ff3be008a6d55104014194891ecc2b8c65c8e037275e25.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4912

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4912-132-0x000000007FDE0000-0x000000007FE49000-memory.dmp

          Filesize

          420KB

        • memory/4912-133-0x0000000000400000-0x00000000004AF000-memory.dmp

          Filesize

          700KB

        • memory/4912-134-0x00000000027B0000-0x0000000002862000-memory.dmp

          Filesize

          712KB

        • memory/4912-135-0x00000000028A0000-0x0000000002958000-memory.dmp

          Filesize

          736KB

        • memory/4912-136-0x000000007FDE0000-0x000000007FE49000-memory.dmp

          Filesize

          420KB

        • memory/4912-137-0x00000000028A0000-0x0000000002958000-memory.dmp

          Filesize

          736KB