Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 23:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
42a1492b58e85a4b4b49b2d33608413c.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
42a1492b58e85a4b4b49b2d33608413c.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
42a1492b58e85a4b4b49b2d33608413c.exe
-
Size
260KB
-
MD5
42a1492b58e85a4b4b49b2d33608413c
-
SHA1
a26ac907b6ae83de36aaffc49959174f4c1c8b92
-
SHA256
618f070f15ea83b900caf9ff65a88cf6a4eeda03a8e32d47848cf9d90b9df6a7
-
SHA512
c9ea934db2af3df6f91de73892763185f891be2e7457866466f4e77f48ec2b17499b51f446c561f415d482362569ac55ba32b64001d7b960ba7577f353138380
-
SSDEEP
6144:AAPTOCuq51JsmiQFF0kJNOlsh2IiobuUnGsf8AD:AoB7BsHQz8JmG0D
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\42A149~1.EXE," 42a1492b58e85a4b4b49b2d33608413c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\42A149~1.EXE" 42a1492b58e85a4b4b49b2d33608413c.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\a29ee485 = "ø™~\x0eɯ3e\x1aèí\x1e’Çjc^¡§sÿ\x1azǾðêNMÿ<ôÙ²ZYš°Â \f[Ž‘ÜòŒ/\x1a\f](ÖKkŒ¥\x12\u0090}N\x19‡ºX ÄOÖŸ&Ù{\u0081®Ënª~aÖ{\t£nF3!û.\u0081ªÊÉòÒ\t[\tfc‰qnñû.™!;ébF–¡ÙÃv\x061QƒúÛ¢\x0eÁ\u00812FIÙ*¶éÂÁvÙ\x11Zâ©™\"3Y#£Q>Ó&ivCé>bÃ\"¾Kζ9Æê\x11ó‰›^©&±I!™ñ¦ûúñ®#»C\x1b–\x1bân꣙!ñ±q‰i!Kcv\x16\tÉË¢\"ó\u0081Qn¾–y¾Z‘\x02¶A\x11\x02Ù\x13®ó‰é\u0081)\x01Û™\x01‘Ë®yn+¢Ž«v\u0081Ê\x0e>‘QÁj«\x01¾" 42a1492b58e85a4b4b49b2d33608413c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\42A149~1.EXE" 42a1492b58e85a4b4b49b2d33608413c.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe 2432 42a1492b58e85a4b4b49b2d33608413c.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2432 42a1492b58e85a4b4b49b2d33608413c.exe Token: SeSecurityPrivilege 2432 42a1492b58e85a4b4b49b2d33608413c.exe Token: SeSecurityPrivilege 2432 42a1492b58e85a4b4b49b2d33608413c.exe Token: SeSecurityPrivilege 2432 42a1492b58e85a4b4b49b2d33608413c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42a1492b58e85a4b4b49b2d33608413c.exe"C:\Users\Admin\AppData\Local\Temp\42a1492b58e85a4b4b49b2d33608413c.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432