Analysis

  • max time kernel
    150s
  • max time network
    207s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 22:30

General

  • Target

    7bf9607e29b2908938eecb81d372f3c931f03cb23db546e88ad245dd0e38e43b.exe

  • Size

    260KB

  • MD5

    41e0cef3bb6871be4bf9d4ed3c920e95

  • SHA1

    d043c06b4061d3baf0a6d03a833d16e9f9f145d1

  • SHA256

    7bf9607e29b2908938eecb81d372f3c931f03cb23db546e88ad245dd0e38e43b

  • SHA512

    1ad91ce5a650b98c07d6f52bc06cd3ec7893e29cc27b7a0bf9919af8c354bddbc3b0f792e9efa386d7f168d37b3aed188ab358d57de316c4b947d11b74e9dc89

  • SSDEEP

    6144:yFAqgNMrMNnHGUS0mATGBqxwO54kBzPpSC5T0i8S:yUNKMQUzSwh5bBzseT0m

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bf9607e29b2908938eecb81d372f3c931f03cb23db546e88ad245dd0e38e43b.exe
    "C:\Users\Admin\AppData\Local\Temp\7bf9607e29b2908938eecb81d372f3c931f03cb23db546e88ad245dd0e38e43b.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1364-54-0x0000000075611000-0x0000000075613000-memory.dmp

    Filesize

    8KB

  • memory/1364-55-0x0000000000400000-0x000000000064C000-memory.dmp

    Filesize

    2.3MB

  • memory/1364-56-0x0000000001E20000-0x0000000001E87000-memory.dmp

    Filesize

    412KB

  • memory/1364-57-0x0000000000400000-0x000000000064C000-memory.dmp

    Filesize

    2.3MB

  • memory/1364-58-0x0000000001E20000-0x0000000001E87000-memory.dmp

    Filesize

    412KB

  • memory/1364-59-0x0000000002980000-0x0000000002A32000-memory.dmp

    Filesize

    712KB

  • memory/1364-60-0x0000000002980000-0x0000000002A32000-memory.dmp

    Filesize

    712KB

  • memory/1364-61-0x0000000002980000-0x0000000002A32000-memory.dmp

    Filesize

    712KB

  • memory/1364-63-0x0000000002980000-0x0000000002A32000-memory.dmp

    Filesize

    712KB

  • memory/1364-64-0x0000000002980000-0x0000000002A32000-memory.dmp

    Filesize

    712KB

  • memory/1364-66-0x0000000002980000-0x0000000002A32000-memory.dmp

    Filesize

    712KB

  • memory/1364-67-0x0000000002B40000-0x0000000002BF8000-memory.dmp

    Filesize

    736KB

  • memory/1364-68-0x0000000002B40000-0x0000000002BF8000-memory.dmp

    Filesize

    736KB