Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 18:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
001531dccf5d0762b2de9cfc79b7672c.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
001531dccf5d0762b2de9cfc79b7672c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
001531dccf5d0762b2de9cfc79b7672c.exe
-
Size
54KB
-
MD5
001531dccf5d0762b2de9cfc79b7672c
-
SHA1
7e2c760695dcc59a0a57d55a25089154bd55a811
-
SHA256
52e90cd3377d1c20f529cce5a94a03c83a8d8196df6dd1ca062a76a16196b21f
-
SHA512
57a7be11309a7d3e682b38f93f6a9779cd1db5877a6e46573877a00a9f48a9f7505c9b9ec529bd9a28b644261fb677bc8bf64000702a2ec04a6a98c8d550792b
-
SSDEEP
1536:ZXlqeEo6JeaFRSfXBYO7ifRkB+HFECKGRv:ZXlqto6gy2XBYO5BkFESR
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\001531dccf5d0762b2de9cfc79b7672c.exe" 001531dccf5d0762b2de9cfc79b7672c.exe -
resource yara_rule behavioral1/memory/2872-3-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2872-4-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\S1557679 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\001531dccf5d0762b2de9cfc79b7672c.exe" 001531dccf5d0762b2de9cfc79b7672c.exe -
Kills process with taskkill 1 IoCs
pid Process 3060 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3060 taskkill.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3060 2872 001531dccf5d0762b2de9cfc79b7672c.exe 28 PID 2872 wrote to memory of 3060 2872 001531dccf5d0762b2de9cfc79b7672c.exe 28 PID 2872 wrote to memory of 3060 2872 001531dccf5d0762b2de9cfc79b7672c.exe 28 PID 2872 wrote to memory of 3060 2872 001531dccf5d0762b2de9cfc79b7672c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\001531dccf5d0762b2de9cfc79b7672c.exe"C:\Users\Admin\AppData\Local\Temp\001531dccf5d0762b2de9cfc79b7672c.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM explorer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3060
-