Analysis
-
max time kernel
1s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
ad81ac97d81fc30478037f0e35dc3a782328964ad664685f1cfcb6c967cd051a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad81ac97d81fc30478037f0e35dc3a782328964ad664685f1cfcb6c967cd051a.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
ad81ac97d81fc30478037f0e35dc3a782328964ad664685f1cfcb6c967cd051a.exe
-
Size
96KB
-
MD5
1cf4dddaca41760efad383ca5632ef6b
-
SHA1
af7f56c96347d31337aca002ae60db22326d4d6c
-
SHA256
ad81ac97d81fc30478037f0e35dc3a782328964ad664685f1cfcb6c967cd051a
-
SHA512
33ff3791b9beda85c3c8ec45dde26cf25097cab3138954cfbce70fad6a6fc4e43487e0ca69502cb5ac9fc107f31e525820faf78205187646ecc8ac83abad038b
-
SSDEEP
1536:R1s4wWMK53vuYJhTCGXSEgoHt6JE9XDC4+4U7G/NajobOBgmQB:R1sNK53vukbSEgoHEo+4z/MjocgmQ
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\qtnvwnm.dll ad81ac97d81fc30478037f0e35dc3a782328964ad664685f1cfcb6c967cd051a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1688 ad81ac97d81fc30478037f0e35dc3a782328964ad664685f1cfcb6c967cd051a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad81ac97d81fc30478037f0e35dc3a782328964ad664685f1cfcb6c967cd051a.exe"C:\Users\Admin\AppData\Local\Temp\ad81ac97d81fc30478037f0e35dc3a782328964ad664685f1cfcb6c967cd051a.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1832