Analysis
-
max time kernel
180s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 17:54
Static task
static1
Behavioral task
behavioral1
Sample
c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe
Resource
win10v2004-20221111-en
General
-
Target
c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe
-
Size
304KB
-
MD5
63a9df4359c7838068fecae06ab7a5c5
-
SHA1
20bde5f0399bc14329ea683cd4f5152190dcd057
-
SHA256
c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9
-
SHA512
fb6c1fb0903bf981f2a491e75d8e0a7d516ecfa9aab23a90231e19118114073e27d00036248b1f01165f5e99132669f6ce3e2f0dc27bd7c119ce4b344b881d76
-
SSDEEP
6144:wcXlK4wFuk6c9oBJbszio36UPJnbgH0eJu8o2q5aLEMdM/w:RXlK3x96Z613JtgPJo2q8AM2/w
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\C79C61~1.EXE," c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\C79C61~1.EXE" c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\dd772cb6 = "\x1fïØ\v‡™¿ß\x11Åq¬Ðs8Í%í2¥(\x15u€{N\u00adò\x10ð" c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\C79C61~1.EXE" c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1736 c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe 1736 c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe 1736 c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe 1736 c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe 1736 c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe 1736 c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe 1736 c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe 1736 c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1736 c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe Token: SeSecurityPrivilege 1736 c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe Token: SeSecurityPrivilege 1736 c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe Token: SeSecurityPrivilege 1736 c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe"C:\Users\Admin\AppData\Local\Temp\c79c6121ef9ffbbcdc4cc90a9b0fdf5deb4595b756aed8e03266a6a12b44def9.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736