Analysis
-
max time kernel
9s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 02:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
01742442b57909a9306721f714c326c6.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
01742442b57909a9306721f714c326c6.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
01742442b57909a9306721f714c326c6.exe
-
Size
98KB
-
MD5
01742442b57909a9306721f714c326c6
-
SHA1
b50a39b8cd885f823633c832c23c843723a3a0a0
-
SHA256
75fe6870c215fb534ec249e637b4450bf5ca06f2ac3a784d08b2f8ebe45d1fdd
-
SHA512
e6eda482854d920d37120c8a43dee7ca5171162266ca568e4633ffd16f4d4efae720b093c909c42d72545bdb4c64c027f6ec127b72533b888dbb8dc4b9230b60
-
SSDEEP
3072:1Xypyveb1lPB3RH70MGQZx+87cK1tmfJamv:1XypcWnP9RH77/ZxT7cK/mfJa
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\sdra64.exe," 01742442b57909a9306721f714c326c6.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sdra64.exe 01742442b57909a9306721f714c326c6.exe File created C:\Windows\SysWOW64\sdra64.exe 01742442b57909a9306721f714c326c6.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4104 01742442b57909a9306721f714c326c6.exe 4104 01742442b57909a9306721f714c326c6.exe 4104 01742442b57909a9306721f714c326c6.exe 4104 01742442b57909a9306721f714c326c6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4104 01742442b57909a9306721f714c326c6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11 PID 4104 wrote to memory of 624 4104 01742442b57909a9306721f714c326c6.exe 11
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\01742442b57909a9306721f714c326c6.exe"C:\Users\Admin\AppData\Local\Temp\01742442b57909a9306721f714c326c6.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4104