Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186.exe
Resource
win10v2004-20221111-en
General
-
Target
f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186.exe
-
Size
92KB
-
MD5
e564bdc3bd1df885f5dbc70b647e92f2
-
SHA1
73ccbd9cfb99f5965de3481bb5bd68c25113a615
-
SHA256
f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186
-
SHA512
9a14301b410505e6d1e4f39785bb58f55f3645ddf268f8b9311fdcfcd9e5bba21c168659652b4ce3b2b80b6ebf1c2e4ee2958424b885cbebec02d25eeb68c6aa
-
SSDEEP
1536:ewwOIF/p4Ro5S6b/uO5sdMdalp3lLo0JWX8z85GCQEwTU1+G4Ro//BwOI:ewwOI/4gecAG4gwOI
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\WINDOWS\\winlogon.exe" f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186.exe -
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\winlogon.exe = "C:\\WINDOWS\\winlogon.exe" f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\MICROSOFT\WINDOWS\CURRENTVERSION\RUN f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\Services = "C:\\Program Files\\Services.exe" f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1716 f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186.exe Token: SeBackupPrivilege 1716 f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1716 f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186.exe"C:\Users\Admin\AppData\Local\Temp\f0da152848a8be6d3aed5135f90d60dcce2b9b89e39e31be4e8bf8d7ddbdc186.exe"1⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1716