Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 00:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4789fbb1fed43018a41ec55db5eb570c.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
4789fbb1fed43018a41ec55db5eb570c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
4789fbb1fed43018a41ec55db5eb570c.exe
-
Size
55KB
-
MD5
4789fbb1fed43018a41ec55db5eb570c
-
SHA1
0b652bca4f3f054ead04b56609df897c0137fb03
-
SHA256
ec771427b49936dedbd2f9537d674403b1dc1f412a975aa28a7a7ca2c58bf60a
-
SHA512
876a52b1981262481fe4704be8e8b17d610d8d88b14adc1be330d5b10eb76d91b07109575b2750c0f620f95d608fe628b6ab1c3e0a49cb23ff2f2869b3e2a2f0
-
SSDEEP
1536:tYZANK7y1nMmvgPNB+MeLhJlk+fVWGkzVUYE:qwKmVxoPNB+3LXq+fVWGkLE
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "userinit.exe,C:\\Windows\\system32\\ntos.exe," 4789fbb1fed43018a41ec55db5eb570c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntos.exe 4789fbb1fed43018a41ec55db5eb570c.exe File created C:\Windows\SysWOW64\ntos.exe 4789fbb1fed43018a41ec55db5eb570c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 816 set thread context of 1244 816 4789fbb1fed43018a41ec55db5eb570c.exe 16 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1244 4789fbb1fed43018a41ec55db5eb570c.exe 1244 4789fbb1fed43018a41ec55db5eb570c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1244 4789fbb1fed43018a41ec55db5eb570c.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 816 wrote to memory of 1244 816 4789fbb1fed43018a41ec55db5eb570c.exe 16 PID 816 wrote to memory of 1244 816 4789fbb1fed43018a41ec55db5eb570c.exe 16 PID 816 wrote to memory of 1244 816 4789fbb1fed43018a41ec55db5eb570c.exe 16 PID 816 wrote to memory of 1244 816 4789fbb1fed43018a41ec55db5eb570c.exe 16 PID 816 wrote to memory of 1244 816 4789fbb1fed43018a41ec55db5eb570c.exe 16 PID 816 wrote to memory of 1244 816 4789fbb1fed43018a41ec55db5eb570c.exe 16 PID 816 wrote to memory of 1244 816 4789fbb1fed43018a41ec55db5eb570c.exe 16 PID 816 wrote to memory of 1244 816 4789fbb1fed43018a41ec55db5eb570c.exe 16 PID 816 wrote to memory of 1244 816 4789fbb1fed43018a41ec55db5eb570c.exe 16 PID 816 wrote to memory of 1244 816 4789fbb1fed43018a41ec55db5eb570c.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\4789fbb1fed43018a41ec55db5eb570c.exe"C:\Users\Admin\AppData\Local\Temp\4789fbb1fed43018a41ec55db5eb570c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\4789fbb1fed43018a41ec55db5eb570c.exe"C:\Users\Admin\AppData\Local\Temp\4789fbb1fed43018a41ec55db5eb570c.exe"2⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1244
-