Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 14:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
001531dccf5d0762b2de9cfc79b7672c.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
001531dccf5d0762b2de9cfc79b7672c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
001531dccf5d0762b2de9cfc79b7672c.exe
-
Size
54KB
-
MD5
001531dccf5d0762b2de9cfc79b7672c
-
SHA1
7e2c760695dcc59a0a57d55a25089154bd55a811
-
SHA256
52e90cd3377d1c20f529cce5a94a03c83a8d8196df6dd1ca062a76a16196b21f
-
SHA512
57a7be11309a7d3e682b38f93f6a9779cd1db5877a6e46573877a00a9f48a9f7505c9b9ec529bd9a28b644261fb677bc8bf64000702a2ec04a6a98c8d550792b
-
SSDEEP
1536:ZXlqeEo6JeaFRSfXBYO7ifRkB+HFECKGRv:ZXlqto6gy2XBYO5BkFESR
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\001531dccf5d0762b2de9cfc79b7672c.exe" 001531dccf5d0762b2de9cfc79b7672c.exe -
resource yara_rule behavioral1/memory/2408-3-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2408-4-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\S14143157 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\001531dccf5d0762b2de9cfc79b7672c.exe" 001531dccf5d0762b2de9cfc79b7672c.exe -
Kills process with taskkill 1 IoCs
pid Process 1468 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1468 taskkill.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1468 2408 001531dccf5d0762b2de9cfc79b7672c.exe 28 PID 2408 wrote to memory of 1468 2408 001531dccf5d0762b2de9cfc79b7672c.exe 28 PID 2408 wrote to memory of 1468 2408 001531dccf5d0762b2de9cfc79b7672c.exe 28 PID 2408 wrote to memory of 1468 2408 001531dccf5d0762b2de9cfc79b7672c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\001531dccf5d0762b2de9cfc79b7672c.exe"C:\Users\Admin\AppData\Local\Temp\001531dccf5d0762b2de9cfc79b7672c.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM explorer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1468
-