Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 07:37
Behavioral task
behavioral1
Sample
a33a5184ac34a6a519f0320484c549b5.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
a33a5184ac34a6a519f0320484c549b5.exe
Resource
win10v2004-20240221-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
a33a5184ac34a6a519f0320484c549b5.exe
-
Size
270KB
-
MD5
a33a5184ac34a6a519f0320484c549b5
-
SHA1
237f1bc4400e221faf4e4947b2e1ce51481a1c2e
-
SHA256
a94ed2eb9bfc8524a165d86201349d0d2115291c7115551367c14a468ffc1f87
-
SHA512
035090ee85e18e1649d785f8790c0d1b7cedea6267a4022367a08fe70dd10172a8ff619deb30d185c6f3dd114217eb2a71dbee1f0de022f720ea9d220c626289
-
SSDEEP
6144:es+IN9RS6LTa9Ar37L2We1zwYVlEkdqY/nMmS6H5el8BJN:fHMwm9AHebVKkdrH5eyr
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\A33A51~1.EXE," a33a5184ac34a6a519f0320484c549b5.exe -
resource yara_rule behavioral2/memory/2144-0-0x0000000000400000-0x0000000000589000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3316742141-2240921845-2885234760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\A33A51~1.EXE" a33a5184ac34a6a519f0320484c549b5.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c6f56073 = "MNqz€–¥’ÚÕ?VBÝCÐ.DH*wry\u008d6w;QyG\x16œžh,\x0e`Ò\x16ÐÂàvúÞQ\x15ËflõZ½\a÷\x164\x18\x7f6÷*û\x13¤®ø<Qo\x04\a\x14\u0081ó§Â~d\\ô!|Ë´Æd4?\x17\x1c½³\x1b~ú\x1d™\x13ìÿœ<Ì…ò'Y\x1c–›TZCÔ\n\x13ǹ\x0e1Ì\x02l·UÑ…1Š\x1c‘B…£>µ]´\u0081>d~\f&<šÉò¡\v\rÙßON~Ò†ãÖB\x13ü\x1b,Rìõ1ìjÌ9{ì6b¬‘Í¢s\x7f\x15fÂ\\zÏ#|–\ftôtuã\u008f\x1b”)$\x15¢OäT\n\x1b1d|dÞ¦U”1õ\x06Läý\f„\t\u0081ÕÔ’'äƒô—R›j”ìAê\fìºùIäÂ\\\x02\nþkL¼\x1b'" a33a5184ac34a6a519f0320484c549b5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\A33A51~1.EXE" a33a5184ac34a6a519f0320484c549b5.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe 2144 a33a5184ac34a6a519f0320484c549b5.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2144 a33a5184ac34a6a519f0320484c549b5.exe Token: SeSecurityPrivilege 2144 a33a5184ac34a6a519f0320484c549b5.exe Token: SeSecurityPrivilege 2144 a33a5184ac34a6a519f0320484c549b5.exe Token: SeSecurityPrivilege 2144 a33a5184ac34a6a519f0320484c549b5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a33a5184ac34a6a519f0320484c549b5.exe"C:\Users\Admin\AppData\Local\Temp\a33a5184ac34a6a519f0320484c549b5.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144