Analysis
-
max time kernel
91s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
989609cd4ed516ea389fa3b9954e6d9f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
989609cd4ed516ea389fa3b9954e6d9f.exe
Resource
win10v2004-20231215-en
General
-
Target
989609cd4ed516ea389fa3b9954e6d9f.exe
-
Size
20KB
-
MD5
989609cd4ed516ea389fa3b9954e6d9f
-
SHA1
8882048fa9b0ff0ff8f683b29debb14ca5e51fc8
-
SHA256
0e1b1cef75526a139b12ec18f2bb9f77bdab2d78e3aadb3ddc4e1e582fd5f786
-
SHA512
be827b04b5b9dca309f6683a98ad62b3012ac508819fe79818a678a3a4b50d1eec4d2e8e44101ce7c07364a7de7f5cbd71d63dc389e97a0ec245117f54126769
-
SSDEEP
384:4a23g2GJ/PwW1AqEVvqIAT/emE74y12hyuZSb09xtZKGpUXiGj6qdZMQET:ygLJ/VeqHE74y1+SA9JKGtYd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4244 usrinit.exe -
Loads dropped DLL 1 IoCs
pid Process 4244 usrinit.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\usrinit.exe 989609cd4ed516ea389fa3b9954e6d9f.exe File created C:\Windows\SysWOW64\winsvc.dll 989609cd4ed516ea389fa3b9954e6d9f.exe File created C:\Windows\SysWOW64\usrinit.exe 989609cd4ed516ea389fa3b9954e6d9f.exe File opened for modification C:\Windows\SysWOW64\winsvc.dll 989609cd4ed516ea389fa3b9954e6d9f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 989609cd4ed516ea389fa3b9954e6d9f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3632 989609cd4ed516ea389fa3b9954e6d9f.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3632 989609cd4ed516ea389fa3b9954e6d9f.exe 3632 989609cd4ed516ea389fa3b9954e6d9f.exe 4244 usrinit.exe 4244 usrinit.exe 4244 usrinit.exe 4244 usrinit.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4244 3632 989609cd4ed516ea389fa3b9954e6d9f.exe 17 PID 3632 wrote to memory of 4244 3632 989609cd4ed516ea389fa3b9954e6d9f.exe 17 PID 3632 wrote to memory of 4244 3632 989609cd4ed516ea389fa3b9954e6d9f.exe 17 PID 3632 wrote to memory of 1140 3632 989609cd4ed516ea389fa3b9954e6d9f.exe 16 PID 3632 wrote to memory of 1140 3632 989609cd4ed516ea389fa3b9954e6d9f.exe 16 PID 3632 wrote to memory of 1140 3632 989609cd4ed516ea389fa3b9954e6d9f.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\989609cd4ed516ea389fa3b9954e6d9f.exe"C:\Users\Admin\AppData\Local\Temp\989609cd4ed516ea389fa3b9954e6d9f.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\989609~1.EXE > nul2⤵PID:1140
-
-
C:\Windows\SysWOW64\usrinit.exe"C:\Windows\system32\usrinit.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4244
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5a4764222b83132703a0a16c48bc9d95b
SHA15ee283f2ce209b25d3ca30fe3c4d75987ac4cc71
SHA2567127dd64a3147b9737c151b65cda40b9ec119e2e11d0064c261e003e9a884d34
SHA51289ea5d0d6f212dc48426e94754ec81a51d7ebf97cdc8f0817967808c3774e3ec3a63d18803997bdf57e9a027b217cf8c1c614b6b3e2db2f5005d3a522151a401
-
Filesize
12KB
MD5577ab6dc3f0e32f8fa9caa790ec132ea
SHA1cca7dbc23293cccd5b82d82d1d8df7b9cb926678
SHA2567962b92d0e0e2675708865d60ba5a923c9fda06e162589a1e85bc9939eb83e02
SHA5122e7ceea2e09c3ec3e41c21f1cd86faa920e11c961be483c61b4ae3fefa83b181ef9a51d305853078db49846488e5d1e3d11e765944b030cfbaaca40afb2a103d