Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 16:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
029522376ad49125944d7c661f286977.exe
Resource
win7-20231215-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
029522376ad49125944d7c661f286977.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
029522376ad49125944d7c661f286977.exe
-
Size
248KB
-
MD5
029522376ad49125944d7c661f286977
-
SHA1
93005b0609113661d5f972a9de3d4ddec43777dd
-
SHA256
38a8d8a0d6f5af6d5df7bfd94a36e91dac25197c2ff55d033f10f29bec07eb8d
-
SHA512
17afc276897c450521fe9acb0f6018d89aaae10d0ef8eb4fe52db5231a02fb8517a09f9c4cc438f0c47f4fcfe4a592271d67cad5d661cbb9aa102f3a1cbcfbae
-
SSDEEP
6144:HiAvvtHLqg6yJWkV1KtpSnivGkAkanP6f3ZDW:CAvVHLqg6mV1r4hAJPCW
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\9b7b7593\\X" Explorer.EXE -
Deletes itself 1 IoCs
pid Process 2232 explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 1996 X 336 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 2264 029522376ad49125944d7c661f286977.exe 2264 029522376ad49125944d7c661f286977.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2264 set thread context of 2232 2264 029522376ad49125944d7c661f286977.exe 18 -
Modifies registry class 3 IoCs
description ioc Process Key created \registry\machine\Software\Classes\Interface\{1a74ef5b-e0c8-3427-8f23-6f47e43457d2} explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1a74ef5b-e0c8-3427-8f23-6f47e43457d2}\u = "71" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1a74ef5b-e0c8-3427-8f23-6f47e43457d2}\cid = "3688728170719409707" explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1996 X 2232 explorer.exe 2232 explorer.exe 2232 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2232 explorer.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 336 csrss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2232 2264 029522376ad49125944d7c661f286977.exe 18 PID 2264 wrote to memory of 2232 2264 029522376ad49125944d7c661f286977.exe 18 PID 2264 wrote to memory of 2232 2264 029522376ad49125944d7c661f286977.exe 18 PID 2264 wrote to memory of 2232 2264 029522376ad49125944d7c661f286977.exe 18 PID 2264 wrote to memory of 2232 2264 029522376ad49125944d7c661f286977.exe 18 PID 2264 wrote to memory of 1996 2264 029522376ad49125944d7c661f286977.exe 19 PID 2264 wrote to memory of 1996 2264 029522376ad49125944d7c661f286977.exe 19 PID 2264 wrote to memory of 1996 2264 029522376ad49125944d7c661f286977.exe 19 PID 2264 wrote to memory of 1996 2264 029522376ad49125944d7c661f286977.exe 19 PID 1996 wrote to memory of 1196 1996 X 10 PID 2232 wrote to memory of 336 2232 explorer.exe 28 PID 336 wrote to memory of 2500 336 csrss.exe 30 PID 336 wrote to memory of 2500 336 csrss.exe 30 PID 336 wrote to memory of 2252 336 csrss.exe 31 PID 336 wrote to memory of 2252 336 csrss.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies WinLogon for persistence
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\029522376ad49125944d7c661f286977.exe"C:\Users\Admin\AppData\Local\Temp\029522376ad49125944d7c661f286977.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\explorer.exe000000D0*3⤵
- Deletes itself
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232
-
-
C:\Users\Admin\AppData\Local\9b7b7593\X193.105.154.210:803⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996
-
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:336
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:2500
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:2252