Analysis
-
max time kernel
156s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 01:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3b96bded817a8f03ee802a3b0d81a574.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3b96bded817a8f03ee802a3b0d81a574.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
3b96bded817a8f03ee802a3b0d81a574.exe
-
Size
272KB
-
MD5
3b96bded817a8f03ee802a3b0d81a574
-
SHA1
b95ecd745217cdf4301118aaf514ccb80b5ee8ef
-
SHA256
a729379cf127cfbd9d2e7390f26d0a35dda0025e61c0e83a6715471d160ce888
-
SHA512
e3dbf6e5cfb65254155027f7b3119b34bbfcfe02a8c3567dea6b5858c74fedefa34bb08d86597ea4f5a2d7521260e9521a696fb0f8baec34d1d86ee0e7cc7a22
-
SSDEEP
6144:dAA0qfdcpUwtyla3MZ9Ic/aw0kkv15WlEbZteHr8zTIw:drbFcpUIylV9IkDkv14CneHgAw
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\3B96BD~1.EXE," 3b96bded817a8f03ee802a3b0d81a574.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3B96BD~1.EXE" 3b96bded817a8f03ee802a3b0d81a574.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\1470e664 = "JŸ´HzÖ3\"\x11À¥L\x12ÿ…Ùý«DLìÔ½eW¶ð…µ\x11í¸¸—Ú\x12\u0090ƒ‚%Ä!h<ö²™\u008f\x1b\x10ì<óø\x17\x04Z\x02x\x01\u0090\x1a‘}b\x1c—à\x1b<Åpu½#Õ\x15C¹Xe°É“\v\x05»\u009d\r\u0081Ùýà53pAáùØÑ[±ËØe\u0081©ù\x13Uå°ƒÍ\x18¸Ý}›;‰u\t]ã‘ë]Y3\x1d³“S\u00a0Ø#IuyÃhI9ù…\x11\x13+u3MpùC;\x05ø\u008d##éÛ\x13[Øí]S55\x13…ã\x19\rù\txƒ#è[}K‘±\v[¥`¨AÛ•\b±ó!=s\u008døK\x13Ñ\u009d\x15ãè©Í\x1dƒ\x13x#Ësëø@Íã“»©i°\u00ad“xC\v{;uÐ!½}áÛ…Í\x1bA{È#= }i…›\x1bÈ#" 3b96bded817a8f03ee802a3b0d81a574.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3B96BD~1.EXE" 3b96bded817a8f03ee802a3b0d81a574.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe 2404 3b96bded817a8f03ee802a3b0d81a574.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2404 3b96bded817a8f03ee802a3b0d81a574.exe Token: SeSecurityPrivilege 2404 3b96bded817a8f03ee802a3b0d81a574.exe Token: SeSecurityPrivilege 2404 3b96bded817a8f03ee802a3b0d81a574.exe Token: SeSecurityPrivilege 2404 3b96bded817a8f03ee802a3b0d81a574.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b96bded817a8f03ee802a3b0d81a574.exe"C:\Users\Admin\AppData\Local\Temp\3b96bded817a8f03ee802a3b0d81a574.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404