Analysis
-
max time kernel
1s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
d0ee3320e72e3e710d83884e514fb24b2246369d6f4846c8c9910b253c55ca64.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d0ee3320e72e3e710d83884e514fb24b2246369d6f4846c8c9910b253c55ca64.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
d0ee3320e72e3e710d83884e514fb24b2246369d6f4846c8c9910b253c55ca64.exe
-
Size
84KB
-
MD5
dc8923a3b7ba1a6192fc8bdf71573992
-
SHA1
fd6cd25577eb1f961beb6c256461c6b34acce4e5
-
SHA256
d0ee3320e72e3e710d83884e514fb24b2246369d6f4846c8c9910b253c55ca64
-
SHA512
e5cc013002448e6eb743fde79cb7d95c77bbd9ca4bb354295e7285b67c81339c1df758cfed0d4c33f19bffd494c89ffccddd73d0425d2f73578bf1e6ca892c18
-
SSDEEP
1536:OtMB0SLN2DrXA5JQmbMN5tCjFOXKdkLm4XPsyGE924UK7p8XR3VZV7oWoht5SvF2:82FJ2I5ZoRYFOXHqhyGE/UZTZ6T5I9Le
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\skjlusk.dll d0ee3320e72e3e710d83884e514fb24b2246369d6f4846c8c9910b253c55ca64.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1204 d0ee3320e72e3e710d83884e514fb24b2246369d6f4846c8c9910b253c55ca64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0ee3320e72e3e710d83884e514fb24b2246369d6f4846c8c9910b253c55ca64.exe"C:\Users\Admin\AppData\Local\Temp\d0ee3320e72e3e710d83884e514fb24b2246369d6f4846c8c9910b253c55ca64.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2044