Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 11:43
Static task
static1
Behavioral task
behavioral1
Sample
9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe
Resource
win10v2004-20220812-en
General
-
Target
9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe
-
Size
259KB
-
MD5
b2b218083c76956a3dd40de510b65c27
-
SHA1
4822b6d15e0c464c0d18790698c7c6234cb474df
-
SHA256
9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b
-
SHA512
70a057d0747629c4f186693a85005a20d7a4c8078272dac629e2de5fb36c1f7ab72bc79d8f3f77f757436b83fd012869b769b99e537229182931d48cb5068cdb
-
SSDEEP
6144:vx9PP90i6dC9i2e3ijBHJ6/gkToLcXKAJEBdW7YXxglx3Jysk+:p9n90i6YivuB8tgeLQaljJk
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\9816CD~1.EXE," 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9816CD~1.EXE" 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\7a985581 = "ÅÜ\x14\x03}#ŒM‹’âFA–„ÁÆp§\nR¿t*Gª‚mï\x14œ]Ct\x01 IîóbîÙÞzkšjóásD§dä«õ\x0eä\"Ž/\aZ¯]„Lw\t†è\fç²¢\x19£Ö\x01\u00a0@4óáBql\r¸Š~ÝWl·PÎü/Mþ¶[\u00a0€ëæù¦\x0eàÿ" 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9816CD~1.EXE" 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe Token: SeSecurityPrivilege 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe Token: SeSecurityPrivilege 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe Token: SeSecurityPrivilege 3720 9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe"C:\Users\Admin\AppData\Local\Temp\9816cd09e45d23bcb83e0367bf4abac7ca9fad0bd7cfa8ace827b3f18bd2a70b.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720