Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 22:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
662cc9247464ebf9fd0bb2d8b3e3e339.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
662cc9247464ebf9fd0bb2d8b3e3e339.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
662cc9247464ebf9fd0bb2d8b3e3e339.exe
-
Size
1.3MB
-
MD5
662cc9247464ebf9fd0bb2d8b3e3e339
-
SHA1
587c1c05b877fa247b58ee6758b81b34f188f1ed
-
SHA256
dd5e0bdf00d42f08ee523ea63931599197e6fe95bb5ddbcaff6991c0eb8fb744
-
SHA512
cabc89dc2a020757d07b2e19e7d7c775e13412d99569e3263dc98219c1bfa025c3e81aededbba7a6c7fd451668172e0ce07a66055e9376fd80bf96f937c958a1
-
SSDEEP
24576:FuiLFSlMCcG88M3bI468vgmnnCQqOkovZPQEp1lvtmE4v:FNLFVCpxM3lb6WzQk14v
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\Windows\\host32.exe," 662cc9247464ebf9fd0bb2d8b3e3e339.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1308 set thread context of 2400 1308 662cc9247464ebf9fd0bb2d8b3e3e339.exe 28 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\host32.exe 662cc9247464ebf9fd0bb2d8b3e3e339.exe File created C:\Windows\host32.exe 662cc9247464ebf9fd0bb2d8b3e3e339.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2400 662cc9247464ebf9fd0bb2d8b3e3e339.exe 2400 662cc9247464ebf9fd0bb2d8b3e3e339.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2400 662cc9247464ebf9fd0bb2d8b3e3e339.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2400 1308 662cc9247464ebf9fd0bb2d8b3e3e339.exe 28 PID 1308 wrote to memory of 2400 1308 662cc9247464ebf9fd0bb2d8b3e3e339.exe 28 PID 1308 wrote to memory of 2400 1308 662cc9247464ebf9fd0bb2d8b3e3e339.exe 28 PID 1308 wrote to memory of 2400 1308 662cc9247464ebf9fd0bb2d8b3e3e339.exe 28 PID 1308 wrote to memory of 2400 1308 662cc9247464ebf9fd0bb2d8b3e3e339.exe 28 PID 1308 wrote to memory of 2400 1308 662cc9247464ebf9fd0bb2d8b3e3e339.exe 28 PID 1308 wrote to memory of 2400 1308 662cc9247464ebf9fd0bb2d8b3e3e339.exe 28 PID 1308 wrote to memory of 2400 1308 662cc9247464ebf9fd0bb2d8b3e3e339.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\662cc9247464ebf9fd0bb2d8b3e3e339.exe"C:\Users\Admin\AppData\Local\Temp\662cc9247464ebf9fd0bb2d8b3e3e339.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\662cc9247464ebf9fd0bb2d8b3e3e339.exe"C:\Users\Admin\AppData\Local\Temp\662cc9247464ebf9fd0bb2d8b3e3e339.exe"2⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-