Analysis
-
max time kernel
22s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 13:39
Behavioral task
behavioral1
Sample
e29fc34b3cc1ac7e22049d6233aed31e83e763ec7f0d271055c2be67afb6a0a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e29fc34b3cc1ac7e22049d6233aed31e83e763ec7f0d271055c2be67afb6a0a0.exe
Resource
win10v2004-20220812-en
General
-
Target
e29fc34b3cc1ac7e22049d6233aed31e83e763ec7f0d271055c2be67afb6a0a0.exe
-
Size
367KB
-
MD5
f37f31f8620c0a2ac54c9ad2f6a39f5a
-
SHA1
b1dc2aedfb25b63f7ad53dc605605fd3112def75
-
SHA256
e29fc34b3cc1ac7e22049d6233aed31e83e763ec7f0d271055c2be67afb6a0a0
-
SHA512
16dc8686812168b9ead551911c33dc6d46f0218c5b3765571dde56793b7e1651d59abac0ddd57b69ec4593200a8b6576d16b57ad0d1ef02affddb94aa67980b1
-
SSDEEP
6144:E6TPfhk3Nbf3b2AlVD3TJvyLlXLjnN9wlnV/DsoM67XXz48TY7EE29X4L1n+1vzN:EIfQNbfL22HADN+lV/Yo5344YIkn+JSE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e29fc34b3cc1ac7e22049d6233aed31e83e763ec7f0d271055c2be67afb6a0a0.exe" e29fc34b3cc1ac7e22049d6233aed31e83e763ec7f0d271055c2be67afb6a0a0.exe -
resource yara_rule behavioral1/memory/1800-55-0x0000000000400000-0x00000000005A5000-memory.dmp upx behavioral1/memory/1800-56-0x0000000000400000-0x00000000005A5000-memory.dmp upx -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1800 e29fc34b3cc1ac7e22049d6233aed31e83e763ec7f0d271055c2be67afb6a0a0.exe