Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2023 22:18

General

  • Target

    056d10946ae4d48d6088e7043267dfda.exe

  • Size

    49KB

  • MD5

    056d10946ae4d48d6088e7043267dfda

  • SHA1

    ec863e9fc4b8f0f5e0dad43a239ca8c345ebc9e5

  • SHA256

    b68db8b09fc64980340e04eccc05b23d9b5fee867a82d14428363ff3b2fe3f22

  • SHA512

    c0b7d4dcfc2f6028cb21c9f87a8824e9ef9678f25bd4aeb764790a89fced4ba53758f5aa121992530e62f0666c8ee40eaf473d9b7f1e378c0c3057dd97fdfd68

  • SSDEEP

    768:FARo7Alq+FSGiteq5JqRCeWYqsc0mY105f0f1B6Tu+WYK6gf+VOB3UC2cXasfM:TAl6+PRCvYxc0x108b6fnG+23EcX2

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\056d10946ae4d48d6088e7043267dfda.exe
    "C:\Users\Admin\AppData\Local\Temp\056d10946ae4d48d6088e7043267dfda.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2548-1-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2548-0-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2548-6-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB