Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3a349349dca927f2a00399386df7c255.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3a349349dca927f2a00399386df7c255.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
3a349349dca927f2a00399386df7c255.exe
-
Size
46KB
-
MD5
3a349349dca927f2a00399386df7c255
-
SHA1
be6667c7bda954bc5bd309a78c5adf17c65ef8c4
-
SHA256
d99dd7ef86e410fe43c5d292ced64524e46ba4c1316b5043069b1b4bc7d18077
-
SHA512
4e92fcbc3c5ccd54cf769c0151818be3bf85130c126a780cbb572aa1c25dc730d9146d9a46e4460a98250026956362845f86d89f2cc1e4acb7fc4d0cb1e94d94
-
SSDEEP
768:PJ4uaYLNkn+6A6Xuzil7QV6lvCDoLElVVbynScSxQGSq9W2Un04e5DtAdM0o:FRxkn+6Ru+7QVDDoLEXhynmr9W2Un0t3
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "userinit.exe,C:\\Windows\\system32\\ntos.exe," 3a349349dca927f2a00399386df7c255.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntos.exe 3a349349dca927f2a00399386df7c255.exe File created C:\Windows\SysWOW64\ntos.exe 3a349349dca927f2a00399386df7c255.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3032 3a349349dca927f2a00399386df7c255.exe 3032 3a349349dca927f2a00399386df7c255.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3032 3a349349dca927f2a00399386df7c255.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a349349dca927f2a00399386df7c255.exe"C:\Users\Admin\AppData\Local\Temp\3a349349dca927f2a00399386df7c255.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032