Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 18:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
001531dccf5d0762b2de9cfc79b7672c.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
001531dccf5d0762b2de9cfc79b7672c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
001531dccf5d0762b2de9cfc79b7672c.exe
-
Size
54KB
-
MD5
001531dccf5d0762b2de9cfc79b7672c
-
SHA1
7e2c760695dcc59a0a57d55a25089154bd55a811
-
SHA256
52e90cd3377d1c20f529cce5a94a03c83a8d8196df6dd1ca062a76a16196b21f
-
SHA512
57a7be11309a7d3e682b38f93f6a9779cd1db5877a6e46573877a00a9f48a9f7505c9b9ec529bd9a28b644261fb677bc8bf64000702a2ec04a6a98c8d550792b
-
SSDEEP
1536:ZXlqeEo6JeaFRSfXBYO7ifRkB+HFECKGRv:ZXlqto6gy2XBYO5BkFESR
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\001531dccf5d0762b2de9cfc79b7672c.exe" 001531dccf5d0762b2de9cfc79b7672c.exe -
resource yara_rule behavioral2/memory/3256-3-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3256-4-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\S5017176 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\001531dccf5d0762b2de9cfc79b7672c.exe" 001531dccf5d0762b2de9cfc79b7672c.exe -
Kills process with taskkill 1 IoCs
pid Process 4376 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4376 taskkill.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3256 wrote to memory of 4376 3256 001531dccf5d0762b2de9cfc79b7672c.exe 92 PID 3256 wrote to memory of 4376 3256 001531dccf5d0762b2de9cfc79b7672c.exe 92 PID 3256 wrote to memory of 4376 3256 001531dccf5d0762b2de9cfc79b7672c.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\001531dccf5d0762b2de9cfc79b7672c.exe"C:\Users\Admin\AppData\Local\Temp\001531dccf5d0762b2de9cfc79b7672c.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM explorer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4376
-