Analysis

  • max time kernel
    120s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2023, 20:42

General

  • Target

    f6c40d26fa7109ee44e50fdf91ea83a7.exe

  • Size

    72KB

  • MD5

    f6c40d26fa7109ee44e50fdf91ea83a7

  • SHA1

    db7387e4451e8ec785053467ddf6fd2c82217136

  • SHA256

    7861a560e6dab703d8ec5d6e17bcc39741a5d7a0b09cd0942feb7d309a026d57

  • SHA512

    3929b537484f7115540f16645e18bdc7c01ecbedc4d48784fdd481b2947a6ca893cab39aedcf5557c678b894646607f7be133b412d4a422f2e1d7ca24858e3b7

  • SSDEEP

    1536:LSWJ77t48O9kf5KO2UftQKwS6Wc0P88t7uHwcJyaD3sbNhxjCM5m:LRqtkfMj6uKwAtPluHpLsPxj

Score
6/10

Malware Config

Signatures

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6c40d26fa7109ee44e50fdf91ea83a7.exe
    "C:\Users\Admin\AppData\Local\Temp\f6c40d26fa7109ee44e50fdf91ea83a7.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Windows\bfsvc.exe
      C:\Windows\bfsvc.exe
      2⤵
        PID:4560
      • C:\Windows\bfsvc.exe
        C:\Windows\bfsvc.exe
        2⤵
          PID:780

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4484-0-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/4484-1-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/4484-2-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/4484-3-0x000000006B800000-0x000000006B8F0000-memory.dmp

        Filesize

        960KB

      • memory/4484-19-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB