Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
eaab589d2541504d0c1c302f52558278_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
eaab589d2541504d0c1c302f52558278_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
eaab589d2541504d0c1c302f52558278_JC.exe
-
Size
80KB
-
MD5
eaab589d2541504d0c1c302f52558278
-
SHA1
4b98386f8392eed2ebe9ac207a13aa1fd2350e8c
-
SHA256
8017037d312ec7e55a9bf0856bb887133454676deded1e9db0bb79434d5a2c7f
-
SHA512
92603098b46ce8e256daa418a08bdd57661e8b7265c6269713af9ea67689214dc0b96aac83d2de69a9fd801f8df5b794c602fbbc83ff803d3e988bfed6e4eca9
-
SSDEEP
1536:zaWLF1kxTnUI4CFPtv6iSJnaGlbVxhop+:zaWExTnUTCFPtvanaGlbVxhoE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4988 Winkhs.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Winkhs.exe Winkhs.exe File opened for modification C:\Windows\SysWOW64\Winkhs.exe eaab589d2541504d0c1c302f52558278_JC.exe File created C:\Windows\SysWOW64\Winkhs.exe eaab589d2541504d0c1c302f52558278_JC.exe File opened for modification C:\Windows\SysWOW64\Winkhs.exe Winkhs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 216 eaab589d2541504d0c1c302f52558278_JC.exe Token: SeTcbPrivilege 4988 Winkhs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaab589d2541504d0c1c302f52558278_JC.exe"C:\Users\Admin\AppData\Local\Temp\eaab589d2541504d0c1c302f52558278_JC.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:216
-
C:\Windows\SysWOW64\Winkhs.exeC:\Windows\SysWOW64\Winkhs.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4988
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5266c10d20133fb0a15494cdcd90e4677
SHA10e5f5fb784860d49f13c5202f45582926ed052de
SHA256142129b6fa27eb42fd3a1fe2c90a506525d639467c4bb6872b35ae5551409838
SHA512848e753048aba1af873b43484ca46006f87d8f1a8ee65ee40a5a68808a4b5b762e9f9204b7fa9787654fb68fa24a4e79c828905de2d2c0f939587e7db491278c
-
Filesize
79KB
MD5266c10d20133fb0a15494cdcd90e4677
SHA10e5f5fb784860d49f13c5202f45582926ed052de
SHA256142129b6fa27eb42fd3a1fe2c90a506525d639467c4bb6872b35ae5551409838
SHA512848e753048aba1af873b43484ca46006f87d8f1a8ee65ee40a5a68808a4b5b762e9f9204b7fa9787654fb68fa24a4e79c828905de2d2c0f939587e7db491278c
-
Filesize
79KB
MD5266c10d20133fb0a15494cdcd90e4677
SHA10e5f5fb784860d49f13c5202f45582926ed052de
SHA256142129b6fa27eb42fd3a1fe2c90a506525d639467c4bb6872b35ae5551409838
SHA512848e753048aba1af873b43484ca46006f87d8f1a8ee65ee40a5a68808a4b5b762e9f9204b7fa9787654fb68fa24a4e79c828905de2d2c0f939587e7db491278c