Analysis
-
max time kernel
6s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 04:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4d576e327c901d357019b52ab274fbdc.exe
Resource
win7-20231129-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
4d576e327c901d357019b52ab274fbdc.exe
Resource
win10v2004-20231215-en
8 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
4d576e327c901d357019b52ab274fbdc.exe
-
Size
42KB
-
MD5
4d576e327c901d357019b52ab274fbdc
-
SHA1
258aa64d7074186701d00c5f8aa519dc2a8466aa
-
SHA256
791bb04f7e7abee241b843a8259a7857d5a528b536add3d69b33c2c864e26f60
-
SHA512
37fd7c24995eab1c7925ba58421543c6cd1ca1f0432f4d4eeddc7e98c3940fd509acafe3d61a8bdc7da6aca156b998ecd05c292e52b1491a5dc8d1d777fb2a63
-
SSDEEP
768:WvsnUgQ4S4L6AcyeT3uratMQBeEMoEL39D:WvsUq6AcyeT3MatAFoE79
Score
7/10
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\Command 4d576e327c901d357019b52ab274fbdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\ShellExt32.exe %1 %*" 4d576e327c901d357019b52ab274fbdc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ShellExt32.exe 4d576e327c901d357019b52ab274fbdc.exe File opened for modification C:\Windows\SysWOW64\ShellExt32.exe 4d576e327c901d357019b52ab274fbdc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2336 1680 WerFault.exe 1 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\Command 4d576e327c901d357019b52ab274fbdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\ShellExt32.exe %1 %*" 4d576e327c901d357019b52ab274fbdc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1680 4d576e327c901d357019b52ab274fbdc.exe 1680 4d576e327c901d357019b52ab274fbdc.exe 1680 4d576e327c901d357019b52ab274fbdc.exe 1680 4d576e327c901d357019b52ab274fbdc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1680 4d576e327c901d357019b52ab274fbdc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 4d576e327c901d357019b52ab274fbdc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2336 1680 4d576e327c901d357019b52ab274fbdc.exe 28 PID 1680 wrote to memory of 2336 1680 4d576e327c901d357019b52ab274fbdc.exe 28 PID 1680 wrote to memory of 2336 1680 4d576e327c901d357019b52ab274fbdc.exe 28 PID 1680 wrote to memory of 2336 1680 4d576e327c901d357019b52ab274fbdc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d576e327c901d357019b52ab274fbdc.exe"C:\Users\Admin\AppData\Local\Temp\4d576e327c901d357019b52ab274fbdc.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 2202⤵
- Program crash
PID:2336
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2748
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2760