Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 20:44
Behavioral task
behavioral1
Sample
3c2aba81c44f382099b969da3a8aac4d.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3c2aba81c44f382099b969da3a8aac4d.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
3c2aba81c44f382099b969da3a8aac4d.exe
-
Size
523KB
-
MD5
3c2aba81c44f382099b969da3a8aac4d
-
SHA1
00bf01305133324e41d0ebe61e4131cc0d16dd6b
-
SHA256
5a1d53517410c7a62586884fdf6b0fe093ad584371afa14cf85f6b46b9dccf3e
-
SHA512
ec047463d1cdf16775070d9f96764f811f649512f52d95c06319af3032872335fa902b0f9f2627aad5a17dd3a4016a61c6b84558029dc7347922b82e429d9e65
-
SSDEEP
12288:dco6Ow7XzQmodZ/09D0WWJfow9c81ZyKv1dcJGdMFL1KJIdIZ:qDtURmD05JgmcgJYmMFi
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1732-0-0x0000000000400000-0x0000000000485000-memory.dmp upx -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\86b1ae2 = "\x1e\x0eç„\rÜS\x04\rŸ\x04OßY*+ûi1|pÕÉÂÙãe#\x1aT\x06°$È«ÃsLÙ…üÏö£à)Ì7{5\x13\x12ÍZè.dÍÀ0ÌH‹iﺚ1%õ˜ú\a2Úr-xKÉßú\x12§ì|N;’f\x10€þú§¹•rôÈ+\x06A€Áý ÞáöI\fÍl¯\x05¶ñ·¶Ñúj*\x102G0\x05êýA\x1ba×N.ÉÞ\nZ\\ŸÚĬ-Kêïi\x12ãsÈ$’ajcøã¬Ò&ÝHÿ8?ãIèˆ|Ài\x02\x04\x05ŸxNXaËý#ÈiSÀXAc\n\x1bÈã \"IMŽã\x15h0O¢D8TQuÉüHOáÚÄiÛ4¶å·a4iÞË$¢’\x1c!ñUüIÿ`\tÉÍÉrÈ”¬Z\a•ˆÖ‡ñÿ" 3c2aba81c44f382099b969da3a8aac4d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 1732 3c2aba81c44f382099b969da3a8aac4d.exe