Analysis
-
max time kernel
99s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
a3529460ade1b7e70ae5d87b386e3a6adf8257a966e455874aee438c6bda928d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a3529460ade1b7e70ae5d87b386e3a6adf8257a966e455874aee438c6bda928d.exe
Resource
win10v2004-20220901-en
General
-
Target
a3529460ade1b7e70ae5d87b386e3a6adf8257a966e455874aee438c6bda928d.exe
-
Size
92KB
-
MD5
f973ae2d06a09542f58dca5336ae93f5
-
SHA1
94eb702a35da745c8e0f1e71e8386dcd6e78e667
-
SHA256
a3529460ade1b7e70ae5d87b386e3a6adf8257a966e455874aee438c6bda928d
-
SHA512
1aa6465abf7b04209ac6622a2742442e4e03c0334255412cb5fbcd131f436d84bce3e190f17cbbdbb7b42db9c5dac32917103d05ad29f3eb5281a3cd82cedaec
-
SSDEEP
1536:G7IbKBxb/7Sgz56b0BSQkKfitPUhCjHBAEhEacLfHwzGo:NbKBM66CSQkK6tjfyacszGo
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\azxmmug.dll a3529460ade1b7e70ae5d87b386e3a6adf8257a966e455874aee438c6bda928d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 672 a3529460ade1b7e70ae5d87b386e3a6adf8257a966e455874aee438c6bda928d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3529460ade1b7e70ae5d87b386e3a6adf8257a966e455874aee438c6bda928d.exe"C:\Users\Admin\AppData\Local\Temp\a3529460ade1b7e70ae5d87b386e3a6adf8257a966e455874aee438c6bda928d.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:672
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1120