Analysis
-
max time kernel
1s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 10:23
Static task
static1
Behavioral task
behavioral1
Sample
a2f25ae138e96bb9821959847371a613e6ca378e2314000cdffd4b98d7e6aa52.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a2f25ae138e96bb9821959847371a613e6ca378e2314000cdffd4b98d7e6aa52.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
a2f25ae138e96bb9821959847371a613e6ca378e2314000cdffd4b98d7e6aa52.exe
-
Size
80KB
-
MD5
c04ef8bc00d27ef1a00c76bc87f31b63
-
SHA1
5ddae4e0300daafe71c6116653a972d2b390344c
-
SHA256
a2f25ae138e96bb9821959847371a613e6ca378e2314000cdffd4b98d7e6aa52
-
SHA512
513d7c00be30d1503f881a4449abe62e20bb9a26281437ec68d6536ff862c0efb1f1fe992b871ba2de95da6af97ceb1321e44841cea4285f59f3ff2b40e47b6a
-
SSDEEP
1536:B4OslC5xUp7A9DbPT5ZmfM5QOjAp8SxwfKtap4d+bakPMb7o5JlIp:/8C5qmND9c05QOjAp8SxGK+bx0b7o5Jo
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\esoejzd.dll a2f25ae138e96bb9821959847371a613e6ca378e2314000cdffd4b98d7e6aa52.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 812 a2f25ae138e96bb9821959847371a613e6ca378e2314000cdffd4b98d7e6aa52.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2f25ae138e96bb9821959847371a613e6ca378e2314000cdffd4b98d7e6aa52.exe"C:\Users\Admin\AppData\Local\Temp\a2f25ae138e96bb9821959847371a613e6ca378e2314000cdffd4b98d7e6aa52.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:812
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2032