Analysis
-
max time kernel
150s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe
Resource
win10v2004-20221111-en
General
-
Target
bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe
-
Size
294KB
-
MD5
50ce560b3e5b86da15cc8be873468bc6
-
SHA1
4f2e3c770dedf9005eb34765983d4b255a746060
-
SHA256
bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca
-
SHA512
c13045ef7a2c4560e4af181c2028a59039b834a929ff32e9472e5bd98584ebb60b9a4086f8cfb01f5234fa4b6460b1fc83889ad8f5d95c0f7182a44fec49bbc1
-
SSDEEP
6144:zpQCd1au9KZBXD7Bp3A4JwQzVKINYtYpeRrBaS8dt:zpQyau9KbfBpw3QzVKINI/r8S8d
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\BF503F~1.EXE," bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BF503F~1.EXE" bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d52ac00c = "©n`²Æe„oªÕàú¤ÎVÍLDó†\x1cVàz\x03×æ{\x04\x14é{wL†\\(¦œIÌ<}¹(d\x06~¦'Fá\x1d\x10ûy;\x19â`áe\x7f\x7fV]Chh€çäJ\x02§ä\ta×K^7V,½¸2\u0090b|hW\x19ŒXm'5q{O1FV\x1c¤½Ê<Ю|ÚVÜž4ˆÍ}G\f/¬^W" bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BF503F~1.EXE" bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe Token: SeSecurityPrivilege 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe Token: SeSecurityPrivilege 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe Token: SeSecurityPrivilege 1224 bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe"C:\Users\Admin\AppData\Local\Temp\bf503fdb9344b22c8e067e71fb5c33bbcd2f3807305a1690a808045943ed65ca.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1224