Analysis
-
max time kernel
154s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 18:07
Static task
static1
Behavioral task
behavioral1
Sample
c45eb0f8bcad12ac47566c048e33ab36152b5f8e12f34a0d8b3f7a00d6180387.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c45eb0f8bcad12ac47566c048e33ab36152b5f8e12f34a0d8b3f7a00d6180387.exe
Resource
win10v2004-20220812-en
General
-
Target
c45eb0f8bcad12ac47566c048e33ab36152b5f8e12f34a0d8b3f7a00d6180387.exe
-
Size
14KB
-
MD5
41d37ea07c5237c87ef69336b1e530be
-
SHA1
1b7e9517327c5dd0d22a46f6728e81936c4a41fa
-
SHA256
c45eb0f8bcad12ac47566c048e33ab36152b5f8e12f34a0d8b3f7a00d6180387
-
SHA512
73390d5b51fc5f2f227c562c38c131ff10205b9c6df10cc8cf44375aa8a348a5140f94e5766c22dba556a2c2eac53d525af6deacf3a43e26a565454cfc1ac086
-
SSDEEP
384:CcfGqHxrz554Ep/oehlanftPzY1RkeZ+JC:C8GOxrX4E9llanfF01RkY+J
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 912 c45eb0f8bcad12ac47566c048e33ab36152b5f8e12f34a0d8b3f7a00d6180387.exe -
Modifies WinLogon 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\kdufroa\MaxWait = "1" c45eb0f8bcad12ac47566c048e33ab36152b5f8e12f34a0d8b3f7a00d6180387.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\kdufroa\zmakjuui = 6249c054892501535462 c45eb0f8bcad12ac47566c048e33ab36152b5f8e12f34a0d8b3f7a00d6180387.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\kdufroa c45eb0f8bcad12ac47566c048e33ab36152b5f8e12f34a0d8b3f7a00d6180387.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify c45eb0f8bcad12ac47566c048e33ab36152b5f8e12f34a0d8b3f7a00d6180387.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\kdufroa\DllName = "C:\\Users\\Admin\\AppData\\Local\\kdufroa.dll" c45eb0f8bcad12ac47566c048e33ab36152b5f8e12f34a0d8b3f7a00d6180387.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\kdufroa\Startup = "kdufroa" c45eb0f8bcad12ac47566c048e33ab36152b5f8e12f34a0d8b3f7a00d6180387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\kdufroa\Impersonate = "1" c45eb0f8bcad12ac47566c048e33ab36152b5f8e12f34a0d8b3f7a00d6180387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\kdufroa\Asynchronous = "1" c45eb0f8bcad12ac47566c048e33ab36152b5f8e12f34a0d8b3f7a00d6180387.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD56116de03384bff7317ba77ef160158b7
SHA1775177a9acc04d13367b7e1eae0bf5c9e400236f
SHA256136c16e9d8509fd3c81f17d3853722088a012ee52ea92d297af1bfd226dce9f5
SHA5122930638603d8252ad8b664ccbe5668f1e1827306f89e32d88aaa7c2657a1a131ad2a066779ab724be51e217d5a38d494cff5017f819bebd5a7ca521bbf09131a