Analysis
-
max time kernel
145s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 00:30
Static task
static1
Behavioral task
behavioral1
Sample
9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe
Resource
win10v2004-20220812-en
General
-
Target
9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe
-
Size
294KB
-
MD5
77ff8f94406a316dd6de2a10b7bb36ec
-
SHA1
07ea4740fcb67c0731a64647b0dbf7420c9a4e2e
-
SHA256
9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a
-
SHA512
94e276115a5eb4bfb780c534d73f0b6ce716562083b0ae6a89266006b47b705ed67239d4a1e584b9dba417fbb867c86462c4cddd7bef25341b65513786ee5aef
-
SSDEEP
6144:tpQCd1au9KZBXD7Bp3A4JwQzVKINYtYpeRrBaS8dt:tpQyau9KbfBpw3QzVKINI/r8S8d
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\955041~1.EXE," 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\955041~1.EXE" 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b09adc62 = "H\x18?O\x13׺Hm\x13vX£\u00a0|ôZ.Þñ6ò_\x02õ›©w„¶\x17\x0f©Ú\x02&G ô\x10‘£…\u008f±|\"\x03tˆ\u00ad¶jdÒ\x0fÑ\x13\x16TDû\x06ø\"\x1fÓú%Ï{¦°—ô_fâóá\x11_¥·@«wDÜðÔ¬ŸP@R\x1dã^{ë–Ê‚*j[XúÚ^úixÐZÚ\x02õ\x1aà¢\beAJ`šZ!¥\"uÐ\u0081ÓÁÁè¸\u0090˜\nø\x1ah®í°urÎ&ÞyqzX•° ëåÀ&ê’ ’MÈè5À" 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\955041~1.EXE" 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1436 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe 1436 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe 1436 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe 1436 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe 1436 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe 1436 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe 1436 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1436 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe Token: SeSecurityPrivilege 1436 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe Token: SeSecurityPrivilege 1436 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe Token: SeSecurityPrivilege 1436 9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe"C:\Users\Admin\AppData\Local\Temp\9550418274df3892fd24be3c05e8ceb9ab759627b16139cfe5c82fa2f678bc7a.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436