Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 16:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c91fd8ccc0b31e173e68bbc2b967a622.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
c91fd8ccc0b31e173e68bbc2b967a622.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
c91fd8ccc0b31e173e68bbc2b967a622.exe
-
Size
401KB
-
MD5
c91fd8ccc0b31e173e68bbc2b967a622
-
SHA1
34ba0950ee85047ddab39e75dec86b2e5c7f0022
-
SHA256
e4dc58352a3727c6fc42ecad3320695f9fe83a11848f29d8916a8537c7dce67d
-
SHA512
ae558446f0a749516fe3038dfbcbe4d15d118759a57e4bf2590295d73e144629d23cef945d2af57587726d8a992d5c5bb88eb87e84e139f3897af827dd44da12
-
SSDEEP
6144:voNgcWRYcHdAFi8Qk0DjecPYoNGatwoapnIvvUkUT/8857YmtHwzGO+YO+j:dciEiBNDtPrpvU/885MZQwj
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\Kvmon.exe" c91fd8ccc0b31e173e68bbc2b967a622.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Kvmon.exe c91fd8ccc0b31e173e68bbc2b967a622.exe File created C:\Windows\Kvmon.dll c91fd8ccc0b31e173e68bbc2b967a622.exe File created C:\Windows\Kvmon.exe c91fd8ccc0b31e173e68bbc2b967a622.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1460 c91fd8ccc0b31e173e68bbc2b967a622.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1460 wrote to memory of 764 1460 c91fd8ccc0b31e173e68bbc2b967a622.exe 28 PID 1460 wrote to memory of 764 1460 c91fd8ccc0b31e173e68bbc2b967a622.exe 28 PID 1460 wrote to memory of 764 1460 c91fd8ccc0b31e173e68bbc2b967a622.exe 28 PID 1460 wrote to memory of 764 1460 c91fd8ccc0b31e173e68bbc2b967a622.exe 28 PID 1460 wrote to memory of 764 1460 c91fd8ccc0b31e173e68bbc2b967a622.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c91fd8ccc0b31e173e68bbc2b967a622.exe"C:\Users\Admin\AppData\Local\Temp\c91fd8ccc0b31e173e68bbc2b967a622.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files\Internet Explorer\IEXPLORE.EXEabout:blank2⤵PID:764
-