Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 05:42

General

  • Target

    2a72f9ccc12e8210a6b41497735ce4f8.exe

  • Size

    49KB

  • MD5

    2a72f9ccc12e8210a6b41497735ce4f8

  • SHA1

    106898abcefb08117f8d5dc145288d433a044346

  • SHA256

    e2a96f34a6cbbd9d901a52065912af7c62c233d10720468b17091bf5671aa437

  • SHA512

    d967ce4cc17e797617cd95b27675d4c07acca2a4ac5ca7d7558fbf8867beaac3361df48d16f9b329035f57aaa167cdaee9a962334ec38dcd0272915525426291

  • SSDEEP

    768:f3HvDOOb1b8FRktVfXiWy4PjVNxcvcZz4P4ZzF7HDyDaYvEIfsF8VpUsUfz:/iYbVfiWykAv+ZzJe0IkFG

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a72f9ccc12e8210a6b41497735ce4f8.exe
    "C:\Users\Admin\AppData\Local\Temp\2a72f9ccc12e8210a6b41497735ce4f8.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2076

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2076-1-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/2076-0-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/2076-6-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB