Analysis
-
max time kernel
181s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 10:14
Behavioral task
behavioral1
Sample
166979528ee9b8f18e5dbacba9d2ad83.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
166979528ee9b8f18e5dbacba9d2ad83.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
166979528ee9b8f18e5dbacba9d2ad83.exe
-
Size
935KB
-
MD5
166979528ee9b8f18e5dbacba9d2ad83
-
SHA1
d7f8165d8631895bb6ab0dbfbe6b78edc7460b5f
-
SHA256
73ef6cff6f7e7b9d7da3f36ead5160297c358c7dce9bef5d5ca39b91ae713e18
-
SHA512
84403a08e832427c1a8644664177e5e3f22311086d90317d7fb2b22738919e6c0cf7bf50b32922cfff94c7ff597a2d884725ae6e989d323517b8aa9dac99d4ea
-
SSDEEP
24576:9jNJijNb/H3rPMoUAqXIbBTDicNDAhITJFHHK:lNgnMHASIVTJDAhITzHHK
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "userinit.exe,C:\\Windows\\system32\\ntos.exe," 166979528ee9b8f18e5dbacba9d2ad83.exe -
resource yara_rule behavioral1/memory/2720-0-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntos.exe 166979528ee9b8f18e5dbacba9d2ad83.exe File created C:\Windows\SysWOW64\ntos.exe 166979528ee9b8f18e5dbacba9d2ad83.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2720 166979528ee9b8f18e5dbacba9d2ad83.exe 2720 166979528ee9b8f18e5dbacba9d2ad83.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2720 166979528ee9b8f18e5dbacba9d2ad83.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\166979528ee9b8f18e5dbacba9d2ad83.exe"C:\Users\Admin\AppData\Local\Temp\166979528ee9b8f18e5dbacba9d2ad83.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720