Analysis
-
max time kernel
37s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 03:26
Static task
static1
Behavioral task
behavioral1
Sample
c269089a2f49209f9be929b7ca49a3602064fa387e9860e376fe8a1d0cb9a2cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c269089a2f49209f9be929b7ca49a3602064fa387e9860e376fe8a1d0cb9a2cc.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
c269089a2f49209f9be929b7ca49a3602064fa387e9860e376fe8a1d0cb9a2cc.exe
-
Size
96KB
-
MD5
1eb2f06ef5fd11d30223d99e2aefd9b1
-
SHA1
7af4036540fa9d45432c5d88026575bd19950847
-
SHA256
c269089a2f49209f9be929b7ca49a3602064fa387e9860e376fe8a1d0cb9a2cc
-
SHA512
72dfdfbcdf4e1c9a2419867d0402609b14e688933932da755f9dbd17e000691be08f28c58ccc0405bb58d6302da151852ec4678d2c8049788ebfe03d0697d7a8
-
SSDEEP
1536:0GpO0jFjN9Io5EFICZ0NEEZe3gUr3M3QCHs0kLoSygKGe0YFoxor:0GpZxN9f5EFIS06EZe3n2Hs0kESygB1m
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\xliqyri.dll c269089a2f49209f9be929b7ca49a3602064fa387e9860e376fe8a1d0cb9a2cc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1920 c269089a2f49209f9be929b7ca49a3602064fa387e9860e376fe8a1d0cb9a2cc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c269089a2f49209f9be929b7ca49a3602064fa387e9860e376fe8a1d0cb9a2cc.exe"C:\Users\Admin\AppData\Local\Temp\c269089a2f49209f9be929b7ca49a3602064fa387e9860e376fe8a1d0cb9a2cc.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1512