Analysis

  • max time kernel
    160s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 09:20

General

  • Target

    acead326affe79166dec279e2e02f1c7bff83b1c0da692348ce352f2d1b688b1.exe

  • Size

    76KB

  • MD5

    98e1281af6ca4fccb1e497e9f6611163

  • SHA1

    c12e4acccb7b05afc536c12b47abd17586ce463a

  • SHA256

    acead326affe79166dec279e2e02f1c7bff83b1c0da692348ce352f2d1b688b1

  • SHA512

    77a2d6b31d08c4ca42909a6c73de399d35f26d0bae87fe9efb4ddd19f55dece56de9ab73dc7725b959199aa7ca8dd807e034318b0601b9fbb8c3792146f561c9

  • SSDEEP

    1536:sgEuWlEyVc/3h2PDAu3h9a1NCVDdCFVssS5N3A:t9Wlg/R2PDAu9+ssS5N3A

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1124
      • C:\Users\Admin\AppData\Local\Temp\acead326affe79166dec279e2e02f1c7bff83b1c0da692348ce352f2d1b688b1.exe
        "C:\Users\Admin\AppData\Local\Temp\acead326affe79166dec279e2e02f1c7bff83b1c0da692348ce352f2d1b688b1.exe"
        2⤵
        • Modifies WinLogon for persistence
        • Drops file in Drivers directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4896

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1124-132-0x0000000013140000-0x000000001317B000-memory.dmp

      Filesize

      236KB