Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe
Resource
win10v2004-20221111-en
General
-
Target
351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe
-
Size
321KB
-
MD5
11c331aa2a83af7358b86b747f7d6854
-
SHA1
e039a67b67851922e7bd4f40866756a78e96d95a
-
SHA256
351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5
-
SHA512
4002c79afd11f56e283a901ed3b35c258fa166ef91585dbab6bd71cca32553b447b646a5c9b59f8b0acd12bb57f75b4626c8b15acf8035f0f63c585bf174ff83
-
SSDEEP
6144:nTFvhumXZoYt+8wBGUErC36rFd8ya010nvhrTugoYtGg92Iv:lhuG+Tw06rFd8c10nUgoKdz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\351900~1.EXE," 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\351900~1.EXE" 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b36ecf65 = "CÝ/ŽÜ'\x14ûV\u0081Œ\x19¢*´ëB²>+Ð\x1eÞÔ\x10\x13Ý“¸\x06‰&‚š\u0081\x0f\u00ad–\x0f\x1beé:¬5\x1eØ\x12ó\x1d¦ÔrW½UhÁÁŒÀ‹)ìÀ\x1eÛ\n©œ)\x7fMœKÝ\u008f\r›zævïLFMÓ’¢Ø¾VË5\x1ahƒ\"!¾ÛFzz\x02À" 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\351900~1.EXE" 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 960 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe 960 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe 960 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe 960 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe 960 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe 960 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe 960 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 960 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe Token: SeSecurityPrivilege 960 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe Token: SeSecurityPrivilege 960 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe Token: SeSecurityPrivilege 960 351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe"C:\Users\Admin\AppData\Local\Temp\351900b6967eb047808a1221ff8dfdc8aabb9572e5c770a65c8aa684488cdbd5.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:960