Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 21:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
12b0a232a809b9ce95dbbd993927c9a6.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
12b0a232a809b9ce95dbbd993927c9a6.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
12b0a232a809b9ce95dbbd993927c9a6.exe
-
Size
276KB
-
MD5
12b0a232a809b9ce95dbbd993927c9a6
-
SHA1
66983468c5dfe5776ec15bf6f6b74183c0266f86
-
SHA256
51c2d268bfa50f68f7d7bffcc755d5da07a8d110e79f3bc540d179a791a9478c
-
SHA512
b719146969b3b03d945858a198894a58e66939bc43e151c206301678b3b938337bffd85ff80b30f9aa04e06030d5d9b22cc745da524b4027d04920667573ebe0
-
SSDEEP
6144:k/1HnOBywO+PnbfMIQFSQMX0Wy6XtdFCGJvi5w:kNQuU1XXdyvGJo
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\12B0A2~1.EXE," 12b0a232a809b9ce95dbbd993927c9a6.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\12B0A2~1.EXE" 12b0a232a809b9ce95dbbd993927c9a6.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\918df384 = "KÐ/ÝÅ\x02Tê7" 12b0a232a809b9ce95dbbd993927c9a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\12B0A2~1.EXE" 12b0a232a809b9ce95dbbd993927c9a6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe 664 12b0a232a809b9ce95dbbd993927c9a6.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 664 12b0a232a809b9ce95dbbd993927c9a6.exe Token: SeSecurityPrivilege 664 12b0a232a809b9ce95dbbd993927c9a6.exe Token: SeSecurityPrivilege 664 12b0a232a809b9ce95dbbd993927c9a6.exe Token: SeSecurityPrivilege 664 12b0a232a809b9ce95dbbd993927c9a6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12b0a232a809b9ce95dbbd993927c9a6.exe"C:\Users\Admin\AppData\Local\Temp\12b0a232a809b9ce95dbbd993927c9a6.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:664