Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 22:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
062e337cde1f1138e739fdb92b7e6e42.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
062e337cde1f1138e739fdb92b7e6e42.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
062e337cde1f1138e739fdb92b7e6e42.exe
-
Size
48KB
-
MD5
062e337cde1f1138e739fdb92b7e6e42
-
SHA1
03baf659729c89d33c29252925cd35691a7b5efe
-
SHA256
6155e358ce7b6138316ad803d10113518aee78e24d75efc7a608d59903dede37
-
SHA512
aa968bd8a74806d50c4651bdc888efeb70008226ca3df7a13e95b20ff46861a8f94bde7eaa4c9072570ddd6918192fa3cf608b728b158352d3d66878695ed97f
-
SSDEEP
1536:h0t2Gv0M6ab3cMGOB3w6yWBWcndBnrD0Ol26pWY:u2Gv0M6abME1rWcdZ/ll26pz
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\ntos.exe," 062e337cde1f1138e739fdb92b7e6e42.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntos.exe 062e337cde1f1138e739fdb92b7e6e42.exe File created C:\Windows\SysWOW64\ntos.exe 062e337cde1f1138e739fdb92b7e6e42.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2020 062e337cde1f1138e739fdb92b7e6e42.exe 2020 062e337cde1f1138e739fdb92b7e6e42.exe 2020 062e337cde1f1138e739fdb92b7e6e42.exe 2020 062e337cde1f1138e739fdb92b7e6e42.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2020 062e337cde1f1138e739fdb92b7e6e42.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87 PID 2020 wrote to memory of 612 2020 062e337cde1f1138e739fdb92b7e6e42.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\062e337cde1f1138e739fdb92b7e6e42.exe"C:\Users\Admin\AppData\Local\Temp\062e337cde1f1138e739fdb92b7e6e42.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612