Analysis

  • max time kernel
    1s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 14:22

Errors

Reason
Reading agent response: read tcp 10.127.0.1:52516->10.127.0.30:8000: read: connection reset by peer

General

  • Target

    e6f029a622599e068e97ca6267cce2f62879951cd055a179baffde38c392865d.exe

  • Size

    100KB

  • MD5

    eed9183a8bc2b82d12b8c2e06f5013b8

  • SHA1

    e923c63a2ada07732bb2453c412d3a5ae496df2c

  • SHA256

    e6f029a622599e068e97ca6267cce2f62879951cd055a179baffde38c392865d

  • SHA512

    5769b981b4940daa6864b80d9b1bc6ef7bc620a16261c5290a5230f178fdc3f1687bde2defd303f8401bb9900ca0be61914f6821f896d2c24546097c99ca550d

  • SSDEEP

    3072:EfLu/t1WbI8Pg5LC+OiAXJdn+gF5joqt:4MGs5LCWAZP

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Drops file in System32 directory 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6f029a622599e068e97ca6267cce2f62879951cd055a179baffde38c392865d.exe
    "C:\Users\Admin\AppData\Local\Temp\e6f029a622599e068e97ca6267cce2f62879951cd055a179baffde38c392865d.exe"
    1⤵
    • Drops file in System32 directory
    • NTFS ADS
    • Suspicious use of AdjustPrivilegeToken
    PID:1600
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:872

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/872-57-0x000007FEFB781000-0x000007FEFB783000-memory.dmp

      Filesize

      8KB

    • memory/1600-55-0x00000000752B1000-0x00000000752B3000-memory.dmp

      Filesize

      8KB

    • memory/1600-54-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/1600-56-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB