Analysis
-
max time kernel
151s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 11:36
Behavioral task
behavioral1
Sample
7499919c85a927b5a7c58b1d275b378f.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
7499919c85a927b5a7c58b1d275b378f.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
7499919c85a927b5a7c58b1d275b378f.exe
-
Size
240KB
-
MD5
7499919c85a927b5a7c58b1d275b378f
-
SHA1
22094bbbaed26592d026b9a81247e6521cf9c97a
-
SHA256
3cac4aa35fe05a228e6419f6610e30d622bae05245c2c8fae2217462f0ed4a25
-
SHA512
53391977d69a47c10c7f520c67d0f1082a909058febacf90e751f9c50fc53c2d72f6463567f3f6c0a36d355ca4f64338c4fcc9d62776cd705d6dd100164618f9
-
SSDEEP
6144:75GZEJ/HJApjF2ZTLTZbMf51ra8Xh8oOpVA0Bvp2k:FiEJRIF2Z/tMfC8RfOQ0Bs
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3024-0-0x0000000000400000-0x0000000000485000-memory.dmp upx -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b2d91346 = "M\x19IüQ\x10‡R6ÀâL\vÓÚßN\x031\x18–K6ñÑ9´\rÿ\tïGË%Ùž¸§à´ëþJÜ›ÓPú¤È›\x05:S«\x18üÉ°-8P\u0081\x1eÖ]“[ÍcÙÞ\x05’ªò¢‚9ujâ…\n1#RYz2:Áö\x16Ñ~uJ\x16\x03‚\"RN£Š~®mZ“ɉcR\x1d\x03ÂÍ«žyÊ[yݵ¡eÚ>9eھ«Vu:arq–ñ²eŽkÚŠÎÝÊV\x06Vksƒ\x1eÅ\x12ýaB‰IM\x16¾‚\u008dêíZ\x13b\x1b+\x0eqVSº*±]Íâ#zõëéê®Ak™6*ó£;Mî\nÙÊ:\x0e]BÕqr\x1e\x16bÊk\u00adjÒ2“::BÓNY\rŠ\n\r\x05ú\x01%©¢ÚAQ‚\x0e6¾}£¢aš‚J]C" 7499919c85a927b5a7c58b1d275b378f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 3024 7499919c85a927b5a7c58b1d275b378f.exe