Analysis
-
max time kernel
181s -
max time network
230s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe
Resource
win10v2004-20221111-en
General
-
Target
917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe
-
Size
344KB
-
MD5
43d089619cdbe52da0a108b53323357a
-
SHA1
8fa6c6521b78704c573fbd861620d4a3c3509f07
-
SHA256
917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604
-
SHA512
4b3024f8a6c349dd6d7e18d5e852c48d3ba5d9c740049317ee9a5526ef0094db432276065c5adf77aefbc36385de313aab3c31c58d0ad568ba640d26433c4892
-
SSDEEP
6144:yeraajBGcKWx9lLxfBJ2tIxlQxJzLuEZjZzhns4ihvNyTiQhK6dfHYP:oajBGcKWBLxfBxedLuMMyTi/6lM
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\917BA1~1.EXE," 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\917BA1~1.EXE" 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\917BA1~1.EXE" 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\8da03f5d = "\x13Y—¾\x10Æ9ØÄ\x1aÇnÒÅŸr³KÄ’o\nÜ¿w\u00a0Ò'_Ç\x06^XTš\x1eT\x11Â*\x19Ë•6«6ÈÒú±Ïªh³…\vΩ\nËX\t2€’\x01Ÿ;¿b" 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2016 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe 2016 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe 2016 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe 2016 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe 2016 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe 2016 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe 2016 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe 2016 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2016 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe Token: SeSecurityPrivilege 2016 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe Token: SeSecurityPrivilege 2016 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe Token: SeSecurityPrivilege 2016 917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe"C:\Users\Admin\AppData\Local\Temp\917ba1a065c5c11bd53060f2a032b3bb407acd1d11c85a2a5411e1fde7e1e604.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016