Analysis

  • max time kernel
    23s
  • max time network
    27s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    29-04-2024 15:54

Errors

Reason
Machine shutdown

General

  • Target

    secret.exe

  • Size

    82KB

  • MD5

    1296ad860a6c3ce4576469dcc6e26faa

  • SHA1

    d959583c57cd7545b25b441cf88b1255d996ae32

  • SHA256

    f04eca4f06acf18beb8ecae2aee691264ed2110ae85bf5ecb2b850490aeaa2aa

  • SHA512

    eef1612788fdc02b43f6afa9a11c47abb6e4c02fa1d865272645b821e5a9b7599e4fd88b9301e9af1c9333f11c70ca7c06c4e12b6e2da59b67600eeea270640f

  • SSDEEP

    1536:EpLo+LDb8iWP2Xm6XUW2W3UyQaas4OrvPgyrvW9Sg0QhsW5cde4HruP:+j8fP226kYL6s4OrvPbrhg7MegruP

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\secret.exe
    "C:\Users\Admin\AppData\Local\Temp\secret.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c echo off && tree c: /f | findstr xyzab
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Windows\SysWOW64\tree.com
        tree c: /f
        3⤵
          PID:1268
        • C:\Windows\SysWOW64\findstr.exe
          findstr xyzab
          3⤵
            PID:2968
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        1⤵
          PID:2656
        • C:\Windows\system32\csrss.exe
          %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
          1⤵
          • Enumerates system info in registry
          • Suspicious use of WriteProcessMemory
          PID:2472
        • C:\Windows\system32\winlogon.exe
          winlogon.exe
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2536
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x0
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2632
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x1
          1⤵
            PID:1592

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2632-1-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

            Filesize

            4KB

          • memory/2656-0-0x0000000002E10000-0x0000000002E11000-memory.dmp

            Filesize

            4KB