Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 10:42
Behavioral task
behavioral1
Sample
534cb8fe48e0d8dfa43621751867c937.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
534cb8fe48e0d8dfa43621751867c937.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
534cb8fe48e0d8dfa43621751867c937.exe
-
Size
282KB
-
MD5
534cb8fe48e0d8dfa43621751867c937
-
SHA1
3414a8efb4fc47bba95b6ea83d0097c4f1c316a2
-
SHA256
1eee37ecbafb26c134b0081f486337310e891824f2e30effe07841190f1e9608
-
SHA512
7ab637bdf7e3c34f8dde3b549989edc8dd09aeaa37aed7fb2dbe937dfce1b722de7fc751b78722fe92e3c9104bfd44190e7d754a70bfc1e7e11eaa6bb7a4cf8e
-
SSDEEP
6144:PZw2TxWX/f48zO7gtwua+Japo5iCb8lseuxw/6YF1M:RFTxWYMh5qoLb8LCy9E
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\534CB8~1.EXE," 534cb8fe48e0d8dfa43621751867c937.exe -
resource yara_rule behavioral2/memory/4200-0-0x0000000000400000-0x000000000062D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\534CB8~1.EXE" 534cb8fe48e0d8dfa43621751867c937.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\32d254a3 = "B\x19°Ë]^iô-µýk*=g@Ô¼—¸uHÅšÃ=à¥\u009d…Ì\x14Qjtb’\x10Q³)É2\t–>\vñÃÚ\aí½E3\x06,éÚ†úܵ€ì†8$/l\x0f“Ü£Y¯ANI»\t<ùöÙ‰¹\x17\x16“\x04™ÇOìó–ü{†‰\t‹\x13¯ù\x04±Œ×‰?\u0081/t©±\x19cÙÓc™9†1á™æƒ\x01oŽ¡ÙWN«‘¡;‰;¡/)ÓˆŽ»\x19ã©£ÑÌ—Á\x13£œ¾dQQ;é#V\x06©Ó\x7f´\x03Ë\x0f©Ü´ÓLc™£´ÇÔéá\x04©\x11Ó™Ñ1\x17^oÇa‹93\x11)öÓ\x16éÎg#”sî©$©)Û\x16Ô‰¡‘ÁqA\x13Q«‹+s‘ô)a?\u0081£\x1bž‡ù\u008f‹ó‹\a\\_aüÄ\x16„" 534cb8fe48e0d8dfa43621751867c937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\534CB8~1.EXE" 534cb8fe48e0d8dfa43621751867c937.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe 4200 534cb8fe48e0d8dfa43621751867c937.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 4200 534cb8fe48e0d8dfa43621751867c937.exe Token: SeSecurityPrivilege 4200 534cb8fe48e0d8dfa43621751867c937.exe Token: SeSecurityPrivilege 4200 534cb8fe48e0d8dfa43621751867c937.exe Token: SeSecurityPrivilege 4200 534cb8fe48e0d8dfa43621751867c937.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\534cb8fe48e0d8dfa43621751867c937.exe"C:\Users\Admin\AppData\Local\Temp\534cb8fe48e0d8dfa43621751867c937.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4200