Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 16:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7ab49522641d18540a3d53e399ca707c.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
7ab49522641d18540a3d53e399ca707c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
7ab49522641d18540a3d53e399ca707c.exe
-
Size
43KB
-
MD5
7ab49522641d18540a3d53e399ca707c
-
SHA1
708783f71f85d0e8b17004fd9f847f8d37fa6764
-
SHA256
551635faabad2413c7a6971d45d3d8c40f00118d19ec82c747312ee21cff730f
-
SHA512
6abfbedf8bd148688ecb0a6c3ebd631f553055a3319a6b438db51edaab0dcd369bb3ea16088c0e4592c9885ac920359de1407c83f9635273ff00e3bccb110a9f
-
SSDEEP
768:ooaWpdp2wK/rhBNn1kLSvhxrShFStVrhJifXNko/BHpJ8oMkNYzMHhCZTon:oep2z/tBN1karShFStVrQWspiopNYoHy
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "userinit.exe,C:\\Windows\\system32\\ntos.exe," 7ab49522641d18540a3d53e399ca707c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntos.exe 7ab49522641d18540a3d53e399ca707c.exe File created C:\Windows\SysWOW64\ntos.exe 7ab49522641d18540a3d53e399ca707c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1948 7ab49522641d18540a3d53e399ca707c.exe 1948 7ab49522641d18540a3d53e399ca707c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1948 7ab49522641d18540a3d53e399ca707c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ab49522641d18540a3d53e399ca707c.exe"C:\Users\Admin\AppData\Local\Temp\7ab49522641d18540a3d53e399ca707c.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948