Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
d60e7bf28edccc47e2ea1b1ae1b972b1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d60e7bf28edccc47e2ea1b1ae1b972b1.exe
Resource
win10v2004-20240226-en
General
-
Target
d60e7bf28edccc47e2ea1b1ae1b972b1.exe
-
Size
40KB
-
MD5
d60e7bf28edccc47e2ea1b1ae1b972b1
-
SHA1
53914d2aeb4c891ce5e4f4016d4c1f17117b399e
-
SHA256
5f7e4bfebbf29ec1f2f6d96bdaa460ea007360d9528f44d77cdaf0ac15a29155
-
SHA512
75bbfa5526e8e04523d4ec6e2ea886c0b6c4f0f028846a2deaa5e410269ed591884ca1aa4237caad347bd1c452a8968378edcf389643672ce33ed79e5042e6af
-
SSDEEP
768:/jgJaQaACaQUU2szuMIl+GKR7U++f5dTu4fZSsAui1ZKbY6Nl:LgJRaJUU2ssO7Uzfr6geuiebY+l
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\explorer.exe," d60e7bf28edccc47e2ea1b1ae1b972b1.exe -
Loads dropped DLL 2 IoCs
pid Process 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\explorer.exe d60e7bf28edccc47e2ea1b1ae1b972b1.exe File created C:\Windows\SysWOW64\dab1.dll d60e7bf28edccc47e2ea1b1ae1b972b1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe 5056 d60e7bf28edccc47e2ea1b1ae1b972b1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d60e7bf28edccc47e2ea1b1ae1b972b1.exe"C:\Users\Admin\AppData\Local\Temp\d60e7bf28edccc47e2ea1b1ae1b972b1.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD561c20bef66abc83546c22a3a07474b11
SHA1e8fd393dca17b7c353d0bdeba7d3d6d9f00035b4
SHA256f78aa5d3c131f2ee5e22be9efc51a157f6c5317f0db2065c0bc92f777b78163f
SHA512b8d7acf009412c17c8b38a1545a01334460e6de600dcb2560c62fb01cb19a32bf2404f63f4171e3e62c8da295aba3d2abca2e714edc9aec01a5fb60b14054b75