Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 22:15
Static task
static1
Behavioral task
behavioral1
Sample
0562516e5528db0852623a1a3296f316.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0562516e5528db0852623a1a3296f316.exe
Resource
win10v2004-20231215-en
General
-
Target
0562516e5528db0852623a1a3296f316.exe
-
Size
25KB
-
MD5
0562516e5528db0852623a1a3296f316
-
SHA1
d659e13667cdd4013228b68c71258e5021552e02
-
SHA256
50b6f3686620662318fe74b20759eb5762fe89535fb079b193cc25bae687cb92
-
SHA512
ae7e2e5c27c7e3627a1a83ad975181af9189510e10aa4a5f446c679daecab9156a6ac068da7eea88b322fa999f78d3715f34349064a14154fe98190e62bc5ac7
-
SSDEEP
768:ZPUdWMig0innbY7I1b/uup4iEZgMAmtTyRO6Y9:VUdWMiT6hua4RQmtDz9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\NEWTRO\\IEXPLORE.COM" 0562516e5528db0852623a1a3296f316.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 0562516e5528db0852623a1a3296f316.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2216 0562516e5528db0852623a1a3296f316.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD57452cc606b683337e116f56f90f60cf0
SHA11818d8ccc282df78cf9771e6f388d25b19374d85
SHA256e157adff0bfa10b3883c21ace0eaa66f036299815bb78ab3d822a13b73ff713b
SHA512c818ffd4e55478b0001ff802de7d7f8db95871b19620db1abe4dc28588e9a5e6cff1a962f4bc4ee3d00ad840aa742e2cdb478c9196c4fadc55c36f0a6bd7f059