Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 23:16

General

  • Target

    ba5d7daeb6997a17a9a422057f8bd5c96c9e038d19741d13dc0911b82f14660e.exe

  • Size

    74KB

  • MD5

    ad98a92e2b8fcb2e033a3423315dd1a5

  • SHA1

    8d278e49cdf94a143d4793a90cabb03545a3b599

  • SHA256

    ba5d7daeb6997a17a9a422057f8bd5c96c9e038d19741d13dc0911b82f14660e

  • SHA512

    e03debc5f580dbcc3398fda61c0f112ff35bd5dae0b3ec5691c93023ad59dc17ad3c5d54b8c6c4767bc62885d7d3f5c147d0f1d8e3123524ef76786833291e20

  • SSDEEP

    1536:MotnnVnfh9gDUlFvvjMmOFeVIw/ObVgo1OZXIqCg1sGvwSTf4u4/POG38:Znn/9WULDB5/QVhd81sGvTkl138

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
    • C:\Users\Admin\AppData\Local\Temp\ba5d7daeb6997a17a9a422057f8bd5c96c9e038d19741d13dc0911b82f14660e.exe
      "C:\Users\Admin\AppData\Local\Temp\ba5d7daeb6997a17a9a422057f8bd5c96c9e038d19741d13dc0911b82f14660e.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1688

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/616-170-0x0000000013290000-0x00000000132A7000-memory.dmp

      Filesize

      92KB

    • memory/616-160-0x0000000013250000-0x0000000013267000-memory.dmp

      Filesize

      92KB

    • memory/616-230-0x0000000013410000-0x0000000013427000-memory.dmp

      Filesize

      92KB

    • memory/616-140-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/616-225-0x00000000133F0000-0x0000000013407000-memory.dmp

      Filesize

      92KB

    • memory/616-145-0x00000000131F0000-0x0000000013207000-memory.dmp

      Filesize

      92KB

    • memory/616-150-0x0000000013210000-0x0000000013227000-memory.dmp

      Filesize

      92KB

    • memory/616-180-0x00000000132D0000-0x00000000132E7000-memory.dmp

      Filesize

      92KB

    • memory/616-175-0x00000000132B0000-0x00000000132C7000-memory.dmp

      Filesize

      92KB

    • memory/616-165-0x0000000013270000-0x0000000013287000-memory.dmp

      Filesize

      92KB

    • memory/616-220-0x00000000133D0000-0x00000000133E7000-memory.dmp

      Filesize

      92KB

    • memory/616-215-0x00000000133B0000-0x00000000133C7000-memory.dmp

      Filesize

      92KB

    • memory/616-155-0x0000000013230000-0x0000000013247000-memory.dmp

      Filesize

      92KB

    • memory/616-185-0x00000000132F0000-0x0000000013307000-memory.dmp

      Filesize

      92KB

    • memory/616-190-0x0000000013310000-0x0000000013327000-memory.dmp

      Filesize

      92KB

    • memory/616-195-0x0000000013330000-0x0000000013347000-memory.dmp

      Filesize

      92KB

    • memory/616-200-0x0000000013350000-0x0000000013367000-memory.dmp

      Filesize

      92KB

    • memory/616-205-0x0000000013370000-0x0000000013387000-memory.dmp

      Filesize

      92KB

    • memory/616-210-0x0000000013390000-0x00000000133A7000-memory.dmp

      Filesize

      92KB

    • memory/1688-132-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1688-133-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1688-139-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1688-137-0x00000000005B0000-0x00000000005C2000-memory.dmp

      Filesize

      72KB