Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 21:20

General

  • Target

    12c55895f54ce6a9840c3be8837f9dac.exe

  • Size

    2.7MB

  • MD5

    12c55895f54ce6a9840c3be8837f9dac

  • SHA1

    dcfff0d05b8893c083a25dc0ae7be76075071398

  • SHA256

    3b24e3d7238406c007bad4039d77f3eed128366c37d94c2986fdb118e9d5a57e

  • SHA512

    1347c2045d0ef513eb242de0b6663d14d225840b1f11d61a137860359cc9ffbf6b1481c9e1607005cd2d3fe1620a40fbb76bebdb33303a8b03ef4ad61afdb48b

  • SSDEEP

    3072:UUXJ1OXAgGTRuu2qqXGUtAmHVhAiMiB0TTN/7hQl:UUCXcTY5NAmTkTJ7hM

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 3 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:424
    • C:\Users\Admin\AppData\Local\Temp\12c55895f54ce6a9840c3be8837f9dac.exe
      "C:\Users\Admin\AppData\Local\Temp\12c55895f54ce6a9840c3be8837f9dac.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c c:\$$$$$$.bat
        2⤵
        • Deletes itself
        PID:2752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$$$$$$.bat

      Filesize

      201B

      MD5

      0609e4324721474e0a03ffbd1cfc41a1

      SHA1

      a60f0daaae4e5f7a06b0e3fe409ce3dfd7d85796

      SHA256

      b4a1b9dd0a476e9c6865b0ce4a2423e47351334d4165eb12bf7b511e866f29ec

      SHA512

      e1d0e61f30611553a8726d5bb60ad59ef7e34306357be5d5aa58cb73657b17e39a63b112fef7c59958cd3e55ce50a3f4bd690ae8ecc3a61cb1abe68bb224eaf4

    • C:\Windows\wignifgp.exe

      Filesize

      8.6MB

      MD5

      8686f894513f983a7f86a56d9f8eb580

      SHA1

      08ec5946975c57f952da06f55857ed2bc1d28944

      SHA256

      d2dffb56374a58d8f5a2b7a3fbbf1816c0c35a79d7fc9dc13d05dd4d8d8eeddd

      SHA512

      cbb52f034a4a34140acdca2a86b15b83c2ea48fb886f162fcf5f3f3f731149ea49530c7b8b1fb0919f9935c228e180367a3acb3012c7940d8bc40813735a7136

    • memory/424-13-0x00000000000C0000-0x00000000000C1000-memory.dmp

      Filesize

      4KB