Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 03:43
Static task
static1
Behavioral task
behavioral1
Sample
4d3fbbb4b6fd6a192aa27b6d51361c45.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d3fbbb4b6fd6a192aa27b6d51361c45.exe
Resource
win10v2004-20231215-en
General
-
Target
4d3fbbb4b6fd6a192aa27b6d51361c45.exe
-
Size
255KB
-
MD5
4d3fbbb4b6fd6a192aa27b6d51361c45
-
SHA1
ff7932d0e5f9cc95d0e6acde04bfc6d9222299cb
-
SHA256
7bec8993651816a0d594ddfe3f6d875106e18f180d17e759b803ad4a1e4a2902
-
SHA512
9ffd119fd0cc135858bdfed7f3016f7d8a4bd49ce141f6a56f47e00d27fd4403bb3336e9776e20b7cf76f6e97c2b5331577b4af3d2ef5cd3cbf4465a620de18f
-
SSDEEP
3072:DiG47vmfhnT1unjf9tLEciSWEqF1R/plSaRCKj8Hn7z89NbgjZrTtM8M8Z1yuxZq:Di0J4H+rRZRxjc74DbgjNTiwr+
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\4D3FBB~1.EXE," 4d3fbbb4b6fd6a192aa27b6d51361c45.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\cb6015e8 = "\u0090éK˜\fZ¶h`v·¦‚ÊS\x1a‹k\v´ÏÆ0_Ȭҟ\x19ßÚ>sC_¯&\x15!\a¾K9†]ïÅÂ\x12ê©š¥¹³©½\u0081\x1d½DIÚÀ\tv©8Ëf¯È\x04{C¿‹;\x13c£\x1bÛãk‹\x14;\x14\r\x1bøãç£l0ƒÍ»«ÛåッÃ\x15³\x04#Óë\a›“óã¤3ë»\x1b¨3óÍK§ESŸûOU‹MLk=Ûô" 4d3fbbb4b6fd6a192aa27b6d51361c45.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 4d3fbbb4b6fd6a192aa27b6d51361c45.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 4d3fbbb4b6fd6a192aa27b6d51361c45.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 4d3fbbb4b6fd6a192aa27b6d51361c45.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 4d3fbbb4b6fd6a192aa27b6d51361c45.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe Token: SeSecurityPrivilege 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe Token: SeSecurityPrivilege 1700 4d3fbbb4b6fd6a192aa27b6d51361c45.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d3fbbb4b6fd6a192aa27b6d51361c45.exe"C:\Users\Admin\AppData\Local\Temp\4d3fbbb4b6fd6a192aa27b6d51361c45.exe"1⤵
- Modifies WinLogon for persistence
- Modifies WinLogon
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da913e022706e95be61fa3e98d18e2e5
SHA18401810574eefc094b7e6249222e415056ac165d
SHA25648f793397e53423db492e8ffcc5c5d95bd4073e63d6d27499604b58e011fe531
SHA5122f185cae8124e73c18e58b5642220ab0b0c3a1fd64dba9c993b9f5ca94f2cf6a9a5f351cf4bb62d3d0a9a6a7cefdb0e266ff97ef946036dc5878854572395736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538c1f341004b73fa9c83cae278cf22a3
SHA1202993047b3d50c8e12aa024980eeee80130ca70
SHA256d7673bc4cb42ccf8d259c2faba991d77109072f1874507b98828a2a5701ddce8
SHA5121c93a377f33e347a2101f463bd8ede15c3c0bc6bea570303e4c83fb40e831d630152e300dc48cd773e0aee26e43bd39e12eb7210babf99d25e5c469419bdea79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6c2d810425d14031528e0a3b54a999e
SHA1fa1355cfff3b6cd0d3b42d725de622cc7e3dac1c
SHA256aa0d8db7fef88722c92bf4c3e4c22c49f96cc4a872d64a81e5fd1aca6708b1f2
SHA51292f9d02fd70fd36561564ef9cd35fe2121f03c2c642dddd8f025f173e42bbc7352ba78b61a3f49468fdcc370d5b823e81b639139dbe721756178790ac4edf74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501d88369629d61c50b4b299bc8694596
SHA12bd4b907d5bd02a35c539944d82f3f57374a6ea5
SHA256aedd40e421037bb482be77c084a7191bd682cf39acbf902eb0a61ae648e3f5b1
SHA512a18560ae3fd049231b0fd08c5ee1ab320520f499913375935c318342a954ab64bf6ca43ca2c54593c0b8d34d80b00ce3cb7f4ba68e3455d84199ced7c4fb5be5
-
Filesize
2KB
MD5fa48aeb22198afe1cca4c67d731d5bf3
SHA1672d41c47d832707d552d8ae732b9a569a6d23b8
SHA2566005485ec5979b724f44f0d1da26cb81ea1e52c9643bc497ab5aa049412c4817
SHA5128ddbcff1b5d38d68cfbce34c21790243834d55a1f4974644ed30e866a4717a8d5b9abd1493522069710d02f4d2101e8ea0c47568ef90e6cb307e34477857a73f
-
Filesize
1KB
MD5e0332046faeb3e4b31d5bb234dae7508
SHA1bfa287c7eca2fd666cff21bf390ceadde0711129
SHA25623acad6e111075630c9ab84f36fee2ff8f74a4468dc8441e5a67842ce009497b
SHA51210d384688634c42d9b5bffa97aee3f83d089015ceaff1787e09a60d78fa35a67a3ff1c44d2dc7548f3a4c4b7d8b92e930087e93a6e6fbb9b11c3c9abbaefcfef
-
Filesize
4KB
MD50cca1aa22f8845045d1c70ca469f5dcd
SHA12ee5a684ea89fbf2aa7c5ed30e46e6e12bc7cae2
SHA25656952f8bce51acfe4a7323a26864f20a4cda54281f4accc17938ea7d121c2bc1
SHA512a9b02fa5bf54424fc6ba1d91d056d88e75623cdd351a8eca521c82bcf1c3a648554757395342828f20458348595ea9fe24e10eda890470cd1029ae6a4527007d
-
Filesize
1KB
MD5fa7bc99ca1b78d10374c21a64a943152
SHA139b517c7ddabb736d5d4a50f15224ceef2ebf424
SHA256b5fbdc96401fb0af0e9ae6a4fbb76d375aa40581f558d691819abafa24ebeace
SHA51254101d00ea3b71b17970498dc02c3299815f5167c07d9888bde30442771975177c02ddb2618662727b49269759e12fcc997efedcf359103274367fdeb3335486
-
Filesize
1KB
MD5185f6e8576119957b0629d53ecff3608
SHA14a4eab08f0caa27ff71f4247f0ae16703dd892a5
SHA2564c4e73777415b53c862b54ab3ca918aa285a1eb1b14126c1d09d5c0ce7d7929f
SHA51273804ab86a3acf777d0b909fefcb981b5db1747625f8738f77810290e20f0c02fef357ea9d49991d685aaa99d9c9447f4c711d095c35e86a63defcf8a0d1d1cd
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
2KB
MD52d9147fe2074ed034235954bb4a14e70
SHA1c8e8ef03dd0a9d3a2e337d5d87719f3b0b29850d
SHA2564c72dc98efd939b462f9517f41a75b0192c2f98caf2442d09d7693eb7070aa34
SHA512ab844864781ac7d0c4993ee6fddc4ebe42f92fcb08f8a1c01deb1a7a2559e1aee7b906484c7f74c7d5fc170388a54bd94e28fed0c6c6bc5d504c9909f896e60c
-
Filesize
23KB
MD5d3df4240ec2d9d121d8949febf8718f7
SHA1221bcd4c7c307b431064c6d21f7f2fd1a49dbf46
SHA256464dbef0c16b334613c525a3ab5aa42349191739db872678578da5ad248e2724
SHA512a0e9dbbf584dd98e51ec3d830afb9f6647029d814eb9842a9ccaef1b494e8a28bfc4079fa98831281384421eb39f7f8503c9435b0af33128f4eaba858560fdb1
-
Filesize
1KB
MD5eef14e8c08c90bd54ac368c4efb574a6
SHA1647400eed731ae2fab730a070822b1d0c6b4b155
SHA256303f3ade202520a6043e6a5ae810384d26fbbe2517efd9fea1c955631b705e87
SHA5120407ed4cb34e0e1a366df30961cf2d673c84d14c4c2deaff62fcbd929fbdcdf7f3647086f7d825d69ca195198862af3fffb84a1c0a168cd107b13bc14bd77b75
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06