Analysis

  • max time kernel
    209s
  • max time network
    224s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 09:46

General

  • Target

    150d98154489ecdbcb60056eb3630b5b.exe

  • Size

    2.8MB

  • MD5

    150d98154489ecdbcb60056eb3630b5b

  • SHA1

    e0e6b0455e326eaacc260cc745505355671386a1

  • SHA256

    28cfbb2fdb195bb371d07ec62ee7c037f5144cb3cf37c000d457309eec2e0fb2

  • SHA512

    f15f7aa760bda2d9fb09b8a15a69472498eb03c5db2f79faff1db555eefb5ad3699f472e6aaae55cc10304ca08d95e6b86d3472668ecccbb39aec143e4e20e14

  • SSDEEP

    1536:Mvzk+n/yZgaeEalqyVLo9dYJ+0ECg6aRhdsRJ+F:Mbk+6ZganMqykPE+0Ej6aji+F

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 19 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 39 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\150d98154489ecdbcb60056eb3630b5b.exe
    "C:\Users\Admin\AppData\Local\Temp\150d98154489ecdbcb60056eb3630b5b.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Windows\userinit.exe
      C:\Windows\userinit.exe
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3968
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4428
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2408
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4840
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3244
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2656
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:212
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3204
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3332
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2984
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4192
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1348
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1092
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2700
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:5024
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4556
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1800
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3004
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\system.exe

    Filesize

    1.0MB

    MD5

    f2a0d69416042bc86739002b214f44b5

    SHA1

    0ef5cf2598113b67832587896522dae352870553

    SHA256

    d57a22c276b4266aafa50965f6a0e0cee2b7c1ce401368a65ede862e2741facc

    SHA512

    b199288289d488f0e6832dbcbda359e82ae2f7928f01e4b48ba457b118d3eca02ea9b07848ec5fc727e5c4b51d31dbac11739403eb0af7090553c1c190c11d7e

  • C:\Windows\userinit.exe

    Filesize

    2.8MB

    MD5

    150d98154489ecdbcb60056eb3630b5b

    SHA1

    e0e6b0455e326eaacc260cc745505355671386a1

    SHA256

    28cfbb2fdb195bb371d07ec62ee7c037f5144cb3cf37c000d457309eec2e0fb2

    SHA512

    f15f7aa760bda2d9fb09b8a15a69472498eb03c5db2f79faff1db555eefb5ad3699f472e6aaae55cc10304ca08d95e6b86d3472668ecccbb39aec143e4e20e14

  • memory/212-59-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/656-18-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/656-8-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/656-0-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/656-1-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/1092-95-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/1092-94-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/1092-99-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/1348-91-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/1800-122-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2408-30-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2408-35-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2656-49-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2656-60-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2656-52-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2700-104-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2984-75-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2984-79-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/3004-128-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/3204-66-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/3244-46-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/3332-73-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/3332-68-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/3968-33-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/3968-13-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/3968-12-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/4192-85-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/4192-81-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/4428-28-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/4556-117-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/4840-41-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/5024-111-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB