Analysis

  • max time kernel
    151s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 18:41

General

  • Target

    a454c83344166a11e3e8ccbc1ba41b0719d4366d6fb586eaac2748a9316c39de.exe

  • Size

    62KB

  • MD5

    13bcf3215f2608d644b907dbf21593dd

  • SHA1

    f8629da99b6ab0889123b4de96f96fdda0d1c0fc

  • SHA256

    a454c83344166a11e3e8ccbc1ba41b0719d4366d6fb586eaac2748a9316c39de

  • SHA512

    49c35649d10fe4cbab740b8ccf88416c832f046154fd350a973ad6bb78ba31bc3f91afff702f58de4b01f7fefb20c2d47370812483dad132ba1273a8d1020a2c

  • SSDEEP

    1536:7e1RsalBI+UnRiy4MdD5Gt59IcPLs4zgK7trcqeIhuEJ2:7e1RsalBYnRiJ+5GzPLsjK7Bc/jEJ2

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:588
    • C:\Users\Admin\AppData\Local\Temp\a454c83344166a11e3e8ccbc1ba41b0719d4366d6fb586eaac2748a9316c39de.exe
      "C:\Users\Admin\AppData\Local\Temp\a454c83344166a11e3e8ccbc1ba41b0719d4366d6fb586eaac2748a9316c39de.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1972

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/588-182-0x0000000031890000-0x00000000318A7000-memory.dmp

      Filesize

      92KB

    • memory/588-141-0x0000000031790000-0x00000000317A7000-memory.dmp

      Filesize

      92KB

    • memory/588-146-0x00000000317B0000-0x00000000317C7000-memory.dmp

      Filesize

      92KB

    • memory/588-151-0x00000000317D0000-0x00000000317E7000-memory.dmp

      Filesize

      92KB

    • memory/588-156-0x00000000317F0000-0x0000000031807000-memory.dmp

      Filesize

      92KB

    • memory/588-161-0x0000000031810000-0x0000000031827000-memory.dmp

      Filesize

      92KB

    • memory/588-166-0x0000000031830000-0x0000000031847000-memory.dmp

      Filesize

      92KB

    • memory/588-171-0x0000000031850000-0x0000000031867000-memory.dmp

      Filesize

      92KB

    • memory/588-227-0x00000000319B0000-0x00000000319C7000-memory.dmp

      Filesize

      92KB

    • memory/588-177-0x0000000031870000-0x0000000031887000-memory.dmp

      Filesize

      92KB

    • memory/588-192-0x00000000318D0000-0x00000000318E7000-memory.dmp

      Filesize

      92KB

    • memory/588-187-0x00000000318B0000-0x00000000318C7000-memory.dmp

      Filesize

      92KB

    • memory/588-136-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/588-197-0x00000000318F0000-0x0000000031907000-memory.dmp

      Filesize

      92KB

    • memory/588-202-0x0000000031910000-0x0000000031927000-memory.dmp

      Filesize

      92KB

    • memory/588-207-0x0000000031930000-0x0000000031947000-memory.dmp

      Filesize

      92KB

    • memory/588-212-0x0000000031950000-0x0000000031967000-memory.dmp

      Filesize

      92KB

    • memory/588-217-0x0000000031970000-0x0000000031987000-memory.dmp

      Filesize

      92KB

    • memory/588-222-0x0000000031990000-0x00000000319A7000-memory.dmp

      Filesize

      92KB

    • memory/1972-176-0x0000000000640000-0x0000000000651000-memory.dmp

      Filesize

      68KB