Analysis Overview
SHA256
ca83832bf8e83ac9a97a01e589435b4666efa33d5f2f7f54b89dd58363e4a264
Threat Level: Known bad
The file a79c347cc0f264cc37d2c203a804ac58.exe was found to be: Known bad.
Malicious Activity Summary
Modifies WinLogon for persistence
Drops file in System32 directory
Unsigned PE
Program crash
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-01-07 19:35
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-01-07 19:35
Reported
2024-01-07 19:39
Platform
win7-20231215-en
Max time kernel
162s
Max time network
143s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2884 wrote to memory of 2896 | N/A | C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 2884 wrote to memory of 2896 | N/A | C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 2884 wrote to memory of 2896 | N/A | C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 2884 wrote to memory of 2896 | N/A | C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe | C:\Windows\SysWOW64\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe
"C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 128
Network
Files
memory/2884-0-0x00000000001C0000-0x00000000001C2000-memory.dmp
memory/2884-1-0x0000000000400000-0x000000000041D000-memory.dmp
memory/2884-3-0x00000000001D0000-0x00000000001E0000-memory.dmp
memory/2884-4-0x0000000000400000-0x000000000041D000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-01-07 19:35
Reported
2024-01-07 19:38
Platform
win10v2004-20231215-en
Max time kernel
150s
Max time network
138s
Command Line
Signatures
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\sdra64.exe," | C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\sdra64.exe | C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe | N/A |
| File created | C:\Windows\SysWOW64\sdra64.exe | C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\winlogon.exe
winlogon.exe
C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe
"C:\Users\Admin\AppData\Local\Temp\a79c347cc0f264cc37d2c203a804ac58.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 158.240.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.1.37.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.110.54.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.71.91.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 174.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 32.179.17.96.in-addr.arpa | udp |
| GB | 96.17.179.174:80 | tcp | |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
Files
memory/3812-0-0x00000000005A0000-0x00000000005A2000-memory.dmp
memory/3812-1-0x0000000000400000-0x000000000041D000-memory.dmp
memory/3812-4-0x0000000000400000-0x000000000041D000-memory.dmp
memory/620-13-0x0000000000400000-0x0000000000417000-memory.dmp
memory/620-23-0x00000000053F0000-0x0000000005407000-memory.dmp
memory/620-28-0x0000000005410000-0x0000000005427000-memory.dmp
memory/620-33-0x0000000005430000-0x0000000005447000-memory.dmp
memory/620-43-0x0000000005470000-0x0000000005487000-memory.dmp
memory/620-48-0x0000000005490000-0x00000000054A7000-memory.dmp
memory/620-58-0x00000000054D0000-0x00000000054E7000-memory.dmp
memory/620-63-0x00000000054F0000-0x0000000005507000-memory.dmp
memory/620-68-0x0000000005510000-0x0000000005527000-memory.dmp
memory/620-78-0x0000000005550000-0x0000000005567000-memory.dmp
memory/620-88-0x0000000005590000-0x00000000055A7000-memory.dmp
memory/620-93-0x00000000055B0000-0x00000000055C7000-memory.dmp
memory/620-103-0x00000000055F0000-0x0000000005607000-memory.dmp
memory/620-108-0x0000000005610000-0x0000000005627000-memory.dmp
memory/620-118-0x0000000005650000-0x0000000005667000-memory.dmp
memory/620-123-0x0000000005670000-0x0000000005687000-memory.dmp
memory/620-133-0x00000000056B0000-0x00000000056C7000-memory.dmp
memory/620-138-0x00000000056D0000-0x00000000056E7000-memory.dmp
memory/620-148-0x0000000005710000-0x0000000005727000-memory.dmp
memory/620-153-0x0000000005730000-0x0000000005747000-memory.dmp
memory/620-143-0x00000000056F0000-0x0000000005707000-memory.dmp
memory/620-128-0x0000000005690000-0x00000000056A7000-memory.dmp
memory/620-158-0x0000000005750000-0x0000000005767000-memory.dmp
memory/620-168-0x0000000005790000-0x00000000057A7000-memory.dmp
memory/620-173-0x00000000057B0000-0x00000000057C7000-memory.dmp
memory/620-178-0x00000000057D0000-0x00000000057E7000-memory.dmp
memory/620-183-0x00000000057F0000-0x0000000005807000-memory.dmp
memory/620-193-0x0000000005830000-0x0000000005847000-memory.dmp
memory/620-198-0x0000000005850000-0x0000000005867000-memory.dmp
memory/620-208-0x0000000005890000-0x00000000058A7000-memory.dmp
memory/620-213-0x00000000058B0000-0x00000000058C7000-memory.dmp
memory/620-223-0x00000000058F0000-0x0000000005907000-memory.dmp
memory/620-228-0x0000000005910000-0x0000000005927000-memory.dmp
memory/620-233-0x0000000005930000-0x0000000005947000-memory.dmp
memory/620-243-0x0000000005970000-0x0000000005987000-memory.dmp
memory/620-248-0x0000000005990000-0x00000000059A7000-memory.dmp
memory/620-258-0x00000000059D0000-0x00000000059E7000-memory.dmp
memory/620-263-0x00000000059F0000-0x0000000005A07000-memory.dmp
memory/620-268-0x0000000005A10000-0x0000000005A27000-memory.dmp
memory/620-278-0x0000000005A50000-0x0000000005A67000-memory.dmp
memory/620-283-0x0000000005A70000-0x0000000005A87000-memory.dmp
memory/620-293-0x0000000005AB0000-0x0000000005AC7000-memory.dmp
memory/620-298-0x0000000005AD0000-0x0000000005AE7000-memory.dmp
memory/620-308-0x0000000005B10000-0x0000000005B27000-memory.dmp
memory/620-313-0x0000000005B30000-0x0000000005B47000-memory.dmp
memory/620-318-0x0000000005B50000-0x0000000005B67000-memory.dmp
memory/620-303-0x0000000005AF0000-0x0000000005B07000-memory.dmp
memory/620-288-0x0000000005A90000-0x0000000005AA7000-memory.dmp
memory/620-273-0x0000000005A30000-0x0000000005A47000-memory.dmp
memory/620-253-0x00000000059B0000-0x00000000059C7000-memory.dmp
memory/620-238-0x0000000005950000-0x0000000005967000-memory.dmp
memory/620-218-0x00000000058D0000-0x00000000058E7000-memory.dmp
memory/620-203-0x0000000005870000-0x0000000005887000-memory.dmp
memory/620-188-0x0000000005810000-0x0000000005827000-memory.dmp
memory/620-163-0x0000000005770000-0x0000000005787000-memory.dmp
memory/620-113-0x0000000005630000-0x0000000005647000-memory.dmp
memory/620-98-0x00000000055D0000-0x00000000055E7000-memory.dmp
memory/620-83-0x0000000005570000-0x0000000005587000-memory.dmp
memory/620-73-0x0000000005530000-0x0000000005547000-memory.dmp
memory/620-53-0x00000000054B0000-0x00000000054C7000-memory.dmp
memory/620-38-0x0000000005450000-0x0000000005467000-memory.dmp
memory/620-18-0x00000000053D0000-0x00000000053E7000-memory.dmp
memory/3812-3-0x0000000002170000-0x0000000002180000-memory.dmp
memory/3812-2-0x0000000000400000-0x000000000041D000-memory.dmp
memory/3812-3717-0x0000000000400000-0x000000000041D000-memory.dmp