Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 09:40

General

  • Target

    b461cfe35c0d7d52d0b665f77c8fd30d.exe

  • Size

    88KB

  • MD5

    b461cfe35c0d7d52d0b665f77c8fd30d

  • SHA1

    07e6264a84776837395a81214e2d5aa2f98014d5

  • SHA256

    e90c497b4a04a3ab55a79daa2f23e461c52bf39b2277acc72059d1ec7771c25a

  • SHA512

    5c17bce83fe6acb516a8c79c6f02290e869e534bec2944bb30d47ccb0f8059209d1ea43361f93798dc307017b58f7d90658ff74a6ba551fa3e46fed69606e853

  • SSDEEP

    1536:6mAKq7vdQ4oA23PLCIR9gQ+pcOH5yBkCOwAcGbgLDsL0s2QnkO/Qp+8LEZ8Xj:AN5QLnffR9IpcIyxOwagLDDs2QQYZwj

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b461cfe35c0d7d52d0b665f77c8fd30d.exe
    "C:\Users\Admin\AppData\Local\Temp\b461cfe35c0d7d52d0b665f77c8fd30d.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4192

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4192-0-0x0000000000400000-0x0000000000419000-memory.dmp

          Filesize

          100KB

        • memory/4192-1-0x0000000000400000-0x0000000000419000-memory.dmp

          Filesize

          100KB

        • memory/4192-2-0x0000000001F90000-0x0000000001FC8000-memory.dmp

          Filesize

          224KB

        • memory/4192-3-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/4192-4-0x0000000001FD0000-0x0000000001FE3000-memory.dmp

          Filesize

          76KB

        • memory/4192-5-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/4192-10-0x0000000000400000-0x0000000000419000-memory.dmp

          Filesize

          100KB