Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 21:20

General

  • Target

    12c55895f54ce6a9840c3be8837f9dac.exe

  • Size

    2.7MB

  • MD5

    12c55895f54ce6a9840c3be8837f9dac

  • SHA1

    dcfff0d05b8893c083a25dc0ae7be76075071398

  • SHA256

    3b24e3d7238406c007bad4039d77f3eed128366c37d94c2986fdb118e9d5a57e

  • SHA512

    1347c2045d0ef513eb242de0b6663d14d225840b1f11d61a137860359cc9ffbf6b1481c9e1607005cd2d3fe1620a40fbb76bebdb33303a8b03ef4ad61afdb48b

  • SSDEEP

    3072:UUXJ1OXAgGTRuu2qqXGUtAmHVhAiMiB0TTN/7hQl:UUCXcTY5NAmTkTJ7hM

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12c55895f54ce6a9840c3be8837f9dac.exe
    "C:\Users\Admin\AppData\Local\Temp\12c55895f54ce6a9840c3be8837f9dac.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5016
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$$.bat
      2⤵
        PID:2360
    • C:\Windows\system32\winlogon.exe
      winlogon.exe
      1⤵
        PID:616

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\wignifgp.exe

              Filesize

              506KB

              MD5

              b70ef5a7ac7c85755793892312e33724

              SHA1

              0cb945d27efead72b6a5ac0f249d3df37feb5ef3

              SHA256

              e1539e1a8e4a8484e0ffd63b1967dcd91b2a950437c2357d585a3319fedbf30b

              SHA512

              2cc112678a776794e0b6acddea5871874aea4cf11078793cb6dbda51b11e67b6767f2ff79b05fe565ef07ac35cd1886862a9ef7e27af6d76b9c7e0fbc3b8fbac

            • \??\c:\$$$$$$.bat

              Filesize

              201B

              MD5

              0609e4324721474e0a03ffbd1cfc41a1

              SHA1

              a60f0daaae4e5f7a06b0e3fe409ce3dfd7d85796

              SHA256

              b4a1b9dd0a476e9c6865b0ce4a2423e47351334d4165eb12bf7b511e866f29ec

              SHA512

              e1d0e61f30611553a8726d5bb60ad59ef7e34306357be5d5aa58cb73657b17e39a63b112fef7c59958cd3e55ce50a3f4bd690ae8ecc3a61cb1abe68bb224eaf4

            • memory/5016-13-0x0000000020400000-0x000000002041C000-memory.dmp

              Filesize

              112KB

            • memory/5016-22-0x0000000000400000-0x0000000000425000-memory.dmp

              Filesize

              148KB