Analysis

  • max time kernel
    188s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 17:09

General

  • Target

    d2487003c96e86b3c5187c65356f485e320bb969b50e99b97b1a33794d8a26bf.exe

  • Size

    257KB

  • MD5

    1c1a9cd82a8e256c75011aca7c398a13

  • SHA1

    059e7a95a2dee3eda18e6118dd0e34b749f5b821

  • SHA256

    d2487003c96e86b3c5187c65356f485e320bb969b50e99b97b1a33794d8a26bf

  • SHA512

    d40beb698e5770678bc15d2c75a8cdfc72705f18669eaf35e92e92c771b39d7d84905d87e5cde5dccc9feabce25e40294089918418368cb3234067429ec86ba5

  • SSDEEP

    6144:WYVe9FeDjJ54UypCaexr6D7XOYEVsxVC0RPXbFib:WYVekNYHsi+5VsxFJXZib

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2487003c96e86b3c5187c65356f485e320bb969b50e99b97b1a33794d8a26bf.exe
    "C:\Users\Admin\AppData\Local\Temp\d2487003c96e86b3c5187c65356f485e320bb969b50e99b97b1a33794d8a26bf.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:208

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/208-132-0x0000000000760000-0x00000000007B9000-memory.dmp

    Filesize

    356KB

  • memory/208-133-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/208-134-0x00000000023B0000-0x0000000002462000-memory.dmp

    Filesize

    712KB

  • memory/208-135-0x0000000002470000-0x0000000002528000-memory.dmp

    Filesize

    736KB

  • memory/208-136-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/208-137-0x0000000002470000-0x0000000002528000-memory.dmp

    Filesize

    736KB