Analysis
-
max time kernel
110s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:30
Behavioral task
behavioral1
Sample
7518f584e1731ba3df2a3c743d5e1bae.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
7518f584e1731ba3df2a3c743d5e1bae.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
7518f584e1731ba3df2a3c743d5e1bae.exe
-
Size
8KB
-
MD5
7518f584e1731ba3df2a3c743d5e1bae
-
SHA1
aa519cc1e0daa9559797f9e0d7e1c5a4b6313d3e
-
SHA256
46b5c6cb45a40435525accc5a1c769207a7586860741bd434d5cba8bc1639aa1
-
SHA512
54c3e1b1ae9768fb6ba5d534ffb45ceb1071a6a0eddf10b5c0d38fa0101c15f8627b57a126ff9c7d7f4f00c84efbb62db5016b84694e8532b7c3fa41f2ea10dc
-
SSDEEP
96:eTMO+PNrOhw8etUiVduw6uQ7zxxpP6FMl/xCZFRrhebvgxE9fETmnJjMxuvI1vg5:s+1rOG8I/6fXdPJl/onzkHlJGuAq4du
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
conime.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = " C:\\Program Files\\Internet Explorer\\SIGNUP\\conime.ex" conime.exe -
Processes:
resource yara_rule behavioral2/memory/3056-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/212-3-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3056-6-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/212-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/212-19-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
conime.exedescription ioc process File opened for modification C:\Windows\SysWOW64\urlmon.dll conime.exe File opened for modification C:\Windows\SysWOW64\down.dll conime.exe -
Drops file in Windows directory 1 IoCs
Processes:
conime.exedescription ioc process File created C:\Windows\inf\ver.inf conime.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
7518f584e1731ba3df2a3c743d5e1bae.exepid process 3056 7518f584e1731ba3df2a3c743d5e1bae.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7518f584e1731ba3df2a3c743d5e1bae.execonime.exepid process 3056 7518f584e1731ba3df2a3c743d5e1bae.exe 212 conime.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
7518f584e1731ba3df2a3c743d5e1bae.exedescription pid process target process PID 3056 wrote to memory of 212 3056 7518f584e1731ba3df2a3c743d5e1bae.exe conime.exe PID 3056 wrote to memory of 212 3056 7518f584e1731ba3df2a3c743d5e1bae.exe conime.exe PID 3056 wrote to memory of 212 3056 7518f584e1731ba3df2a3c743d5e1bae.exe conime.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7518f584e1731ba3df2a3c743d5e1bae.exe"C:\Users\Admin\AppData\Local\Temp\7518f584e1731ba3df2a3c743d5e1bae.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files\Internet Explorer\SIGNUP\conime.exe"C:\Program Files\Internet Explorer\SIGNUP\conime.exe"2⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:212