Analysis
-
max time kernel
51s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 15:44
Static task
static1
Behavioral task
behavioral1
Sample
79e37b464938e19ec450f2408bf5dd07.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
79e37b464938e19ec450f2408bf5dd07.exe
Resource
win10v2004-20231215-en
General
-
Target
79e37b464938e19ec450f2408bf5dd07.exe
-
Size
1.0MB
-
MD5
79e37b464938e19ec450f2408bf5dd07
-
SHA1
11caa525e5a5061a4e6b5b86006601c784b6a95f
-
SHA256
a27e62c716fd3e19d53fe27c25a3238d805fecc13375b46c67409eabc0c7275e
-
SHA512
fc00ca78ee6d6aeb7f259f0a854008057d50c1682adddb624ef56a6a770fc5657576b6d801260db7a3e4fc2247de64202baea4ab9a8c509bc696c32f55c55a30
-
SSDEEP
24576:wT+XEHz48vLwhrAdKu0Gr1yDJXvKoxuecF3C58ospiEwV5wXC:wTn8kdK7amZKwuPF3wFHwy
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\sdra64.exe," 79e37b464938e19ec450f2408bf5dd07.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 79e37b464938e19ec450f2408bf5dd07.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 79e37b464938e19ec450f2408bf5dd07.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 79e37b464938e19ec450f2408bf5dd07.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 79e37b464938e19ec450f2408bf5dd07.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sdra64.exe 79e37b464938e19ec450f2408bf5dd07.exe File created C:\Windows\SysWOW64\sdra64.exe 79e37b464938e19ec450f2408bf5dd07.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2856 set thread context of 4712 2856 79e37b464938e19ec450f2408bf5dd07.exe 89 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4712 79e37b464938e19ec450f2408bf5dd07.exe 4712 79e37b464938e19ec450f2408bf5dd07.exe 4712 79e37b464938e19ec450f2408bf5dd07.exe 4712 79e37b464938e19ec450f2408bf5dd07.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 2856 79e37b464938e19ec450f2408bf5dd07.exe Token: SeDebugPrivilege 4712 79e37b464938e19ec450f2408bf5dd07.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2856 79e37b464938e19ec450f2408bf5dd07.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2856 wrote to memory of 4712 2856 79e37b464938e19ec450f2408bf5dd07.exe 89 PID 2856 wrote to memory of 4712 2856 79e37b464938e19ec450f2408bf5dd07.exe 89 PID 2856 wrote to memory of 4712 2856 79e37b464938e19ec450f2408bf5dd07.exe 89 PID 2856 wrote to memory of 4712 2856 79e37b464938e19ec450f2408bf5dd07.exe 89 PID 2856 wrote to memory of 4712 2856 79e37b464938e19ec450f2408bf5dd07.exe 89 PID 2856 wrote to memory of 4712 2856 79e37b464938e19ec450f2408bf5dd07.exe 89 PID 2856 wrote to memory of 4712 2856 79e37b464938e19ec450f2408bf5dd07.exe 89 PID 2856 wrote to memory of 4712 2856 79e37b464938e19ec450f2408bf5dd07.exe 89 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 PID 4712 wrote to memory of 616 4712 79e37b464938e19ec450f2408bf5dd07.exe 5 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 79e37b464938e19ec450f2408bf5dd07.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\79e37b464938e19ec450f2408bf5dd07.exe"C:\Users\Admin\AppData\Local\Temp\79e37b464938e19ec450f2408bf5dd07.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\79e37b464938e19ec450f2408bf5dd07.exeC:\Users\Admin\AppData\Local\Temp\79e37b464938e19ec450f2408bf5dd07.exe2⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1