Analysis
-
max time kernel
151s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe
Resource
win10v2004-20221111-en
General
-
Target
c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe
-
Size
254KB
-
MD5
c556a47af0c8b354b3877b2a8ef02702
-
SHA1
74beee59dfd50cfdc732862dd3cdbe189b9c031b
-
SHA256
c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071
-
SHA512
65dbfccca9ba655f341787e3d53cbf226bc77296ff136a270d8677cdd25b05f970dd6168b7b2e35e10d52d45c2316396ef68deac17f4564526d7c9b02b237d05
-
SSDEEP
3072:C/w6gCmvZZ1g9nTR61F/tNnr4U7BRScmJ8Re1YBRyD+4KABiQ3AwZI9tBkPL/Z27:swVhk8cgSVLaGD8bQNZqU/Zq7Pmyjrx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\C8F261~1.EXE," c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\C8F261~1.EXE" c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\3e44aafb = "O¿ƒ\u0081\x17-äŽR\x16ôn¥Sø*}¸ëf»´Xá„\u008f?`K\x19n›«´\x1b<k\x162Еĥò\u008f5\u00a0m)Böt¨ù½\x14·\x1bÀh²ö†¸¾¥@émÌK”;*\x10Fz¢P±#\u008dœC3\x133Ô9Ñ꿾èA„úYj*m5žu>ÈDÄÅ<ÜýEïЧW+”}}]¥‹\x15³\bLn¾+¬ˆ/m\u00adŸü|}W…×Îuîžþuƒ<Ÿ0¬=4ËÍ+Ͷ‡\x10´>|$.\u00a0Døœ\x0et”½«\x06çÜíEÆw¼]LÛ&Mü`/®\u009d\x05»µÄ%|t]8„Näíõpµ´//\u009d}ÅÝ\vô\x14¾\x16œ¥þ–õtèû®öoFÇžìHs;×]\x16%“—[$¤€\x13\u00ad]}¼³n¼Ü" c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\C8F261~1.EXE" c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe Token: SeSecurityPrivilege 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe Token: SeSecurityPrivilege 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe Token: SeSecurityPrivilege 4456 c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe"C:\Users\Admin\AppData\Local\Temp\c8f2611c9d05456d9aed370c649e03eb36c07069f6ab0d7ea5d888f7edcef071.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4456