Analysis
-
max time kernel
169s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe
Resource
win10v2004-20220901-en
General
-
Target
7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe
-
Size
245KB
-
MD5
138cec51bd5fef0a31f6a0d7a5e677b9
-
SHA1
d0aab7e3950018cd5f3f176db5b381d25adbe164
-
SHA256
7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab
-
SHA512
14bf0c78eab7a98b7d7fad39f49097ecce325e62d3b0d1e47e0296e742c348c67091d93cb063276da751b382b6f72496a5fb874a5ebac6f37103ed3d4fbce492
-
SSDEEP
6144:mMWHbRh4N04G+U2cnJLaWVKhxQd91ShzXakv0h:zu4G4GlJLJKnw91SlXW
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\7D75B7~1.EXE," 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7D75B7~1.EXE" 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\3dfcd63f = "ÈOÇ.\x1bÉѶÀä\x016\nÒàX}\u00a0\x17ê\x7f\x1a\x01ÌìbÙ|„' )T\azço†\tº˜\f¯®¢¹\u00adTÌÊËò\x1e×\vuŒéÏÆ%óaVÌ@P¨u?,\x1bÆÕf5;Ú·¢‰Oç\x7fºûfÇvùè\x14žGl\x03¤ÛUVDÖKØ\x1dň…\u00a0]\u0090-e¸ñ8àk\u0090=k[\x11Ë\r\x1dÙ©!Ñt\x154TÓ\u0090…<¨!x¼e˹1Ø;8\x01\x10\x13Ísë;\vü…ø›Mc+í½\x05\x11Ë0\x10ͽda+½µÕ\u00a0€!Ó«°…Å-ÝÀ\x1dk+àh¹kcȨe|ˆØåE\x155à0,cÅmûëuÓ¤QHÍÛ5( ¤…\x19\x03˜-¸Ã\u008dE€ì»-k=cEHpüEܻьp¨1˜½iÑ…" 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7D75B7~1.EXE" 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 872 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe 872 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe 872 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe 872 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe 872 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe 872 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe 872 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 872 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe Token: SeSecurityPrivilege 872 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe Token: SeSecurityPrivilege 872 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe Token: SeSecurityPrivilege 872 7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe"C:\Users\Admin\AppData\Local\Temp\7d75b7874ebda81709fd06aade4c25a94edb785f7f396102d4a35deb895f8fab.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872