Analysis
-
max time kernel
168s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 10:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
16024b312b16e577d4ac87e79ccb79e1.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
16024b312b16e577d4ac87e79ccb79e1.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
16024b312b16e577d4ac87e79ccb79e1.exe
-
Size
87KB
-
MD5
16024b312b16e577d4ac87e79ccb79e1
-
SHA1
4e92cdfd6c00b76e85632bf5a5f4cd644c3ff0d4
-
SHA256
9b3f388243b794921858cc4407791cefbc5f963e67bb09d9a0ccdba0d91fa7e8
-
SHA512
efa3f0f31757c89607bcc95cf7fc5d7963670803d743294a53eac622c0f092eaf5f4802066cdd9a4211732d15ea7377f6f2746dd4521ea7267c6db9a1c43fae3
-
SSDEEP
1536:nIOZAW+AfPoKR2m7QXwa0ihfkL9+HMCLSJ3NvXIvNapmsfRHzzOQGfi6z7j2nkUY:Iy+s77kf5Mfvw1a4sZPVGfnz/2T8XF6O
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\sdra64.exe," 16024b312b16e577d4ac87e79ccb79e1.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sdra64.exe 16024b312b16e577d4ac87e79ccb79e1.exe File created C:\Windows\SysWOW64\sdra64.exe 16024b312b16e577d4ac87e79ccb79e1.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3712 16024b312b16e577d4ac87e79ccb79e1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3712 16024b312b16e577d4ac87e79ccb79e1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3 PID 3712 wrote to memory of 620 3712 16024b312b16e577d4ac87e79ccb79e1.exe 3
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\16024b312b16e577d4ac87e79ccb79e1.exe"C:\Users\Admin\AppData\Local\Temp\16024b312b16e577d4ac87e79ccb79e1.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3712