Analysis

  • max time kernel
    37s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 03:26

Errors

Reason
Reading agent response: read tcp 10.127.0.1:46054->10.127.0.18:8000: read: connection reset by peer

General

  • Target

    c269089a2f49209f9be929b7ca49a3602064fa387e9860e376fe8a1d0cb9a2cc.exe

  • Size

    96KB

  • MD5

    1eb2f06ef5fd11d30223d99e2aefd9b1

  • SHA1

    7af4036540fa9d45432c5d88026575bd19950847

  • SHA256

    c269089a2f49209f9be929b7ca49a3602064fa387e9860e376fe8a1d0cb9a2cc

  • SHA512

    72dfdfbcdf4e1c9a2419867d0402609b14e688933932da755f9dbd17e000691be08f28c58ccc0405bb58d6302da151852ec4678d2c8049788ebfe03d0697d7a8

  • SSDEEP

    1536:0GpO0jFjN9Io5EFICZ0NEEZe3gUr3M3QCHs0kLoSygKGe0YFoxor:0GpZxN9f5EFIS06EZe3n2Hs0kESygB1m

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c269089a2f49209f9be929b7ca49a3602064fa387e9860e376fe8a1d0cb9a2cc.exe
    "C:\Users\Admin\AppData\Local\Temp\c269089a2f49209f9be929b7ca49a3602064fa387e9860e376fe8a1d0cb9a2cc.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1920
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1512

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1512-57-0x000007FEFC621000-0x000007FEFC623000-memory.dmp

      Filesize

      8KB

    • memory/1920-54-0x0000000001000000-0x0000000001019000-memory.dmp

      Filesize

      100KB

    • memory/1920-55-0x0000000076181000-0x0000000076183000-memory.dmp

      Filesize

      8KB

    • memory/1920-56-0x0000000001000000-0x0000000001019000-memory.dmp

      Filesize

      100KB