Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 01:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
711486a19e8b011528dee34a5d25776e.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
711486a19e8b011528dee34a5d25776e.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
711486a19e8b011528dee34a5d25776e.exe
-
Size
140KB
-
MD5
711486a19e8b011528dee34a5d25776e
-
SHA1
7e131940fce4d157d0a338b8285e8e2298e8677d
-
SHA256
880823dd9df0ca6047cd829a1031e8a167ccec0629fdeac40a097dd555debf7c
-
SHA512
9213dc1b1ab70e6672e6bef43a50125e7752de303ddbdbfc5b395f3b228363dd57c036befb21c83945207954575b90021af0d4e1f6872253c20475f3dbc4e894
-
SSDEEP
1536:rcQx/fZwezQjUho9JdZ582xHcocSVwVcl:IA/RwecEo9JdZ5rxvdVqY
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
711486a19e8b011528dee34a5d25776e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "empty" 711486a19e8b011528dee34a5d25776e.exe -
Disables Task Manager via registry modification
-
Drops desktop.ini file(s) 1 IoCs
Processes:
711486a19e8b011528dee34a5d25776e.exedescription ioc process File created C:\Users\Admin\Downloads\desktop.ini 711486a19e8b011528dee34a5d25776e.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
711486a19e8b011528dee34a5d25776e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper 711486a19e8b011528dee34a5d25776e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
711486a19e8b011528dee34a5d25776e.exepid process 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe 2468 711486a19e8b011528dee34a5d25776e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
711486a19e8b011528dee34a5d25776e.exedescription pid process Token: SeDebugPrivilege 2468 711486a19e8b011528dee34a5d25776e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\711486a19e8b011528dee34a5d25776e.exe"C:\Users\Admin\AppData\Local\Temp\711486a19e8b011528dee34a5d25776e.exe"1⤵
- Modifies WinLogon for persistence
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468