Analysis
-
max time kernel
118s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 12:05
Static task
static1
Behavioral task
behavioral1
Sample
d611845e11725d3834166a8c9af23db9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d611845e11725d3834166a8c9af23db9.exe
Resource
win10v2004-20240226-en
General
-
Target
d611845e11725d3834166a8c9af23db9.exe
-
Size
27KB
-
MD5
d611845e11725d3834166a8c9af23db9
-
SHA1
7060df46d7663a7d80f0e059fc2f383f166ce13c
-
SHA256
feb667fe7d7121c8288d8073a8cc1cefd703a23912da094d45b16b76947bbee6
-
SHA512
274f17896d69c8c04af05d0d969329f3f8256bdbaa0fc3236631bf416a8d11586c9cd0e4a509f5220f1761a806ff7d4bed81bd93c9be6ec3cf99013ee0ea7009
-
SSDEEP
768:uqSGFIxkjyRlzg7u+L0mNvjaRziDG/jDQjjmWTe+Hc9TstBD:uhGXGnEu+L0mNvjaRziDG/jDQjjmW9HV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2212 winlogon.exe.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\app\\winlogon.exe.exe" d611845e11725d3834166a8c9af23db9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\app\\winlogon.exe.exe" winlogon.exe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2224 d611845e11725d3834166a8c9af23db9.exe Token: SeDebugPrivilege 2212 winlogon.exe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2212 2224 d611845e11725d3834166a8c9af23db9.exe 28 PID 2224 wrote to memory of 2212 2224 d611845e11725d3834166a8c9af23db9.exe 28 PID 2224 wrote to memory of 2212 2224 d611845e11725d3834166a8c9af23db9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d611845e11725d3834166a8c9af23db9.exe"C:\Users\Admin\AppData\Local\Temp\d611845e11725d3834166a8c9af23db9.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Roaming\app\winlogon.exe.exe"C:\Users\Admin\AppData\Roaming\app\winlogon.exe.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5d611845e11725d3834166a8c9af23db9
SHA17060df46d7663a7d80f0e059fc2f383f166ce13c
SHA256feb667fe7d7121c8288d8073a8cc1cefd703a23912da094d45b16b76947bbee6
SHA512274f17896d69c8c04af05d0d969329f3f8256bdbaa0fc3236631bf416a8d11586c9cd0e4a509f5220f1761a806ff7d4bed81bd93c9be6ec3cf99013ee0ea7009