Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
c73f6938015c5fe905cdb4ff07d4a562f660ba8b9535ae91a9dbd80aa658ca78.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c73f6938015c5fe905cdb4ff07d4a562f660ba8b9535ae91a9dbd80aa658ca78.exe
Resource
win10v2004-20220901-en
General
-
Target
c73f6938015c5fe905cdb4ff07d4a562f660ba8b9535ae91a9dbd80aa658ca78.exe
-
Size
140KB
-
MD5
04b3cdae5875af50bbf83002d8ae8e55
-
SHA1
b74c3308cdb71b9082d60280aa20f0cecb0a40f1
-
SHA256
c73f6938015c5fe905cdb4ff07d4a562f660ba8b9535ae91a9dbd80aa658ca78
-
SHA512
4a020c3c833b27ca4f2e1bb2bf52d75a6e14f206680c91374b990850bbf810a7d4afc551c437436881b890e2bda4adfaeb1132b3f95f3182cc3f79e145ab0221
-
SSDEEP
3072:CGHFnzn7ZSBYfkVoFdRrqo0aRaA/HF673+UWHIfr:pRNkVsuaRaU6mHG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\WINDOWS\\Media\\Installed\\wmpupdate.exe" c73f6938015c5fe905cdb4ff07d4a562f660ba8b9535ae91a9dbd80aa658ca78.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\Media\Installed c73f6938015c5fe905cdb4ff07d4a562f660ba8b9535ae91a9dbd80aa658ca78.exe File opened for modification C:\WINDOWS\Media\Installed\wmpupdate.exe c73f6938015c5fe905cdb4ff07d4a562f660ba8b9535ae91a9dbd80aa658ca78.exe File opened for modification C:\WINDOWS\Media\Installed\MSWINSCK.OCX c73f6938015c5fe905cdb4ff07d4a562f660ba8b9535ae91a9dbd80aa658ca78.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4316 c73f6938015c5fe905cdb4ff07d4a562f660ba8b9535ae91a9dbd80aa658ca78.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c73f6938015c5fe905cdb4ff07d4a562f660ba8b9535ae91a9dbd80aa658ca78.exe"C:\Users\Admin\AppData\Local\Temp\c73f6938015c5fe905cdb4ff07d4a562f660ba8b9535ae91a9dbd80aa658ca78.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4316