Analysis
-
max time kernel
1s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 17:03
Static task
static1
Behavioral task
behavioral1
Sample
d4e9513a59cdf7c5c8929167269ccadc288673a8d64251b4f40e10a92a188d48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4e9513a59cdf7c5c8929167269ccadc288673a8d64251b4f40e10a92a188d48.exe
Resource
win10v2004-20221111-en
Errors
General
-
Target
d4e9513a59cdf7c5c8929167269ccadc288673a8d64251b4f40e10a92a188d48.exe
-
Size
113KB
-
MD5
dd81bf48be10ab867cbce265d02a7fa9
-
SHA1
08e7e322aa569e2d621ef4c7a15804e7953e9176
-
SHA256
d4e9513a59cdf7c5c8929167269ccadc288673a8d64251b4f40e10a92a188d48
-
SHA512
66078b4cfc4c9cefa781d562705b8471ad3ea79fc914a399b11b960f40705c0f59b30728551d4307bb8010d0c7c35459963302bee51aa8ee81038576a7406d52
-
SSDEEP
1536:X5LnbKjp2Lvu9v8iFXItzM63a/jp20q7c88dSaR5AI988af95p1Xmsoew/lDtW:JLbKjoLvgv8KSQ+g203S25Kd1Wsovto
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ukesqbh.dll d4e9513a59cdf7c5c8929167269ccadc288673a8d64251b4f40e10a92a188d48.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2032 d4e9513a59cdf7c5c8929167269ccadc288673a8d64251b4f40e10a92a188d48.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4e9513a59cdf7c5c8929167269ccadc288673a8d64251b4f40e10a92a188d48.exe"C:\Users\Admin\AppData\Local\Temp\d4e9513a59cdf7c5c8929167269ccadc288673a8d64251b4f40e10a92a188d48.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:276