Analysis
-
max time kernel
7s -
max time network
11s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1880e0629b4eff623386dd9cc52c3e3e.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1880e0629b4eff623386dd9cc52c3e3e.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
1880e0629b4eff623386dd9cc52c3e3e.exe
-
Size
92KB
-
MD5
1880e0629b4eff623386dd9cc52c3e3e
-
SHA1
da2971f13de251625b878fc89c341c7df3583ead
-
SHA256
c0b9e0164104c437915d6f430374889a4534a93cd7e9d554dfe9ce1b45f5d432
-
SHA512
fcf2f24f6f783dc015a60e6fc29d2ae9a86cca25bffe7d89c8bdd19b86fa1f5b5c26f8cc99b1cb2beaff60e3e1e7c11de5148c121f8887ee5ec94e0edd1f8fab
-
SSDEEP
1536:5N9eh1B5vouwEM6hsF9kQgJ6QUDorcmRrbIYzZyrCuhUk1sTLzMo:5Nch17vEEMPnGAQMAcsblUtSKsPzMo
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\lccfwgm.dll 1880e0629b4eff623386dd9cc52c3e3e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2964 1880e0629b4eff623386dd9cc52c3e3e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1880e0629b4eff623386dd9cc52c3e3e.exe"C:\Users\Admin\AppData\Local\Temp\1880e0629b4eff623386dd9cc52c3e3e.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2180
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2720