Analysis
-
max time kernel
7s -
max time network
10s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 12:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4b80522d5be129d9ae20bfb1c1b61842.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
4b80522d5be129d9ae20bfb1c1b61842.exe
Resource
win10v2004-20231222-en
0 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
4b80522d5be129d9ae20bfb1c1b61842.exe
-
Size
124KB
-
MD5
4b80522d5be129d9ae20bfb1c1b61842
-
SHA1
359b1b74c7ce4110ecf90aad6d78cb028ec75196
-
SHA256
d6c0c78f3bde4eec2977c6b2145176c6bf848130aa863669b3589871a4fafd63
-
SHA512
04126de296b4a9c21bc7ce150d84720520babf9d3c1c6274b0fcfd556c113514744f11db132a4056e7103a76d32b3cc66a82ece8ec6509515e86b88b6163d360
-
SSDEEP
3072:yrrp4BjU2YP1FMJIcYWjnSMdlYock2Ha7o8WAE5zYUoh:mO493JOdlp6tzT
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\chxrgoc.dll 4b80522d5be129d9ae20bfb1c1b61842.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1220 4b80522d5be129d9ae20bfb1c1b61842.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b80522d5be129d9ae20bfb1c1b61842.exe"C:\Users\Admin\AppData\Local\Temp\4b80522d5be129d9ae20bfb1c1b61842.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2072
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2728