Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
3f09c031d055f3067046fdccba261ce3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3f09c031d055f3067046fdccba261ce3.exe
Resource
win10v2004-20231215-en
General
-
Target
3f09c031d055f3067046fdccba261ce3.exe
-
Size
135KB
-
MD5
3f09c031d055f3067046fdccba261ce3
-
SHA1
85c1a0f2666356d90ee731a5c0fdc6f76b94b876
-
SHA256
77ebfc4558e6ee3a545fa8e81b5abd8eb5c8bda9fc9decb914fb73062a7ef847
-
SHA512
3200dc2abe01ca7f097aceb433c26277e68989ed376136f1778700508116426b51fe66db4e5e8947266c5e7e3fb6ae7d2964c14309bbc98aca8df6a7edb5b524
-
SSDEEP
3072:zVJiH7zlDO+7Et0OXjO6mo0IKbouSazYhG6TBf48LlnrT:z/cw+IeOiB0uSazYhG6TBQ8L1T
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\EXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX" 3f09c031d055f3067046fdccba261ce3.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\LXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX 3f09c031d055f3067046fdccba261ce3.exe File created C:\Windows\SysWOW64\LXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX 3f09c031d055f3067046fdccba261ce3.exe File created C:\Windows\SysWOW64\Deleteme.bat 3f09c031d055f3067046fdccba261ce3.exe File created C:\Windows\SysWOW64\EXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX 3f09c031d055f3067046fdccba261ce3.exe File opened for modification C:\Windows\SysWOW64\EXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX 3f09c031d055f3067046fdccba261ce3.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe 3196 3f09c031d055f3067046fdccba261ce3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3196 wrote to memory of 3504 3196 3f09c031d055f3067046fdccba261ce3.exe 19 PID 3196 wrote to memory of 3504 3196 3f09c031d055f3067046fdccba261ce3.exe 19 PID 3196 wrote to memory of 3504 3196 3f09c031d055f3067046fdccba261ce3.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f09c031d055f3067046fdccba261ce3.exe"C:\Users\Admin\AppData\Local\Temp\3f09c031d055f3067046fdccba261ce3.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵PID:3504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD59ff786762f1f91b712099195c4b42952
SHA19e2b284a08a4a0e06bbff1aaab4072099dbeed39
SHA256e52c84eb342f3f1f161c63199d738295939d62fb6747adeb44a2253e77f3fe03
SHA5125ab6e53bd048a7a839075375a8bfb4e663b555bc6d9a993fb04fe02d9f3e648a19f4b0c29c816900fe1abb334dbcdf2b5ebea4910cbb127f87e888395b268fcb