Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
3b83826f9404ba991f665e610e919394.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b83826f9404ba991f665e610e919394.exe
Resource
win10v2004-20231215-en
General
-
Target
3b83826f9404ba991f665e610e919394.exe
-
Size
361KB
-
MD5
3b83826f9404ba991f665e610e919394
-
SHA1
e42d97afa86021875f87cee1d5bafd475c5b7474
-
SHA256
5ea2e610d4cab87581ceec2ea2724bd03a8a2f0de3a4f687d4087fc37dd795e0
-
SHA512
234db26d6a285251c4abd59822bec57412c8445848ea978846bfb7e49433690a1d0d372befabd4a38f4b5cc084c84b3c4f9152db11f4e27b815087597160b085
-
SSDEEP
6144:wGVPyyMHVilE0LiywLf+llnmPf6BSqHm+Ihx4iwiwjgI7DKyVSHK8q:JM1ilhQb+l0P2mNhqiwUKm8SH4
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4528 3b83826f9404ba991f665e610e919394.exe 4528 3b83826f9404ba991f665e610e919394.exe -
Modifies WinLogon 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32\Asynchronous = "1" 3b83826f9404ba991f665e610e919394.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32\Impersonate = "0" 3b83826f9404ba991f665e610e919394.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32 3b83826f9404ba991f665e610e919394.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify 3b83826f9404ba991f665e610e919394.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32\DllName = "mdhcp32.dll" 3b83826f9404ba991f665e610e919394.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32\Startup = "WinStart2EX" 3b83826f9404ba991f665e610e919394.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32\Logoff = "WinOff2EX" 3b83826f9404ba991f665e610e919394.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mdhcp32\Shutdown = "WinOff2EX" 3b83826f9404ba991f665e610e919394.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shimg.dll 3b83826f9404ba991f665e610e919394.exe File created C:\Windows\SysWOW64\dll.dll 3b83826f9404ba991f665e610e919394.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4528 3b83826f9404ba991f665e610e919394.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD52fab24ad2cf943f37cddbf618cbdf83b
SHA1ab9d7e6848ac2c8b4861f5126cee71727e505875
SHA2562ee409c628b6dfd1be8daa865b30b511280da666666d793456b54ca843ce6db7
SHA512b885714e4624d48b418f2b4c33d1ca96e1e87cc7bddbb4450a59e62a499abd18be0e949bc62f5e37cf2459c3b1de61d863745124147100e9e2f69588e13c4e7e