Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2024, 21:10

General

  • Target

    wininit.exe

  • Size

    53KB

  • MD5

    1afa5d79303cd6a555bc8104dc2b8f8a

  • SHA1

    9219b262abbd01ff144badd7b7e403a48d4e3763

  • SHA256

    eda92439a40101e33a542ac1545c722ba43f77407bf117181c7f207fd9ec55bf

  • SHA512

    5c8fbe2b5dd7b00d9570bead3dfe90e7b257562b2173fac7065d5a6168d55c4dd947c083a89d8ad0dc7d1373292499ef12fc88d0060c5db3e392aec8a50b5531

  • SSDEEP

    1536:Lbne4IqDlL4VnnauImeVsrhQQJ3oMPDS3b19Q:L64IQlL4VxRhdJVrS3b4

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\wininit.exe
    "C:\Users\Admin\AppData\Local\Temp\wininit.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /rl highest /tn "wininit" /tr "C:\ProgramData\wininit.exe"
      2⤵
      • Creates scheduled task(s)
      PID:2604
  • C:\ProgramData\wininit.exe
    C:\ProgramData\wininit.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2956
  • C:\ProgramData\wininit.exe
    C:\ProgramData\wininit.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1916
  • C:\ProgramData\wininit.exe
    C:\ProgramData\wininit.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\wininit.exe

    Filesize

    53KB

    MD5

    1afa5d79303cd6a555bc8104dc2b8f8a

    SHA1

    9219b262abbd01ff144badd7b7e403a48d4e3763

    SHA256

    eda92439a40101e33a542ac1545c722ba43f77407bf117181c7f207fd9ec55bf

    SHA512

    5c8fbe2b5dd7b00d9570bead3dfe90e7b257562b2173fac7065d5a6168d55c4dd947c083a89d8ad0dc7d1373292499ef12fc88d0060c5db3e392aec8a50b5531

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\wininit.exe.log

    Filesize

    660B

    MD5

    1c5e1d0ff3381486370760b0f2eb656b

    SHA1

    f9df6be8804ef611063f1ff277e323b1215372de

    SHA256

    f424c891fbc7385e9826beed2dd8755aeac5495744b5de0a1e370891a7beaf7a

    SHA512

    78f5fc40a185d04c9e4a02a3d1b10b4bd684c579a45a0d1e8f49f8dee9018ed7bc8875cbf21f98632f93ead667214a41904226ce54817b85caeeb4b0de54a743

  • memory/2328-0-0x00007FFA2B193000-0x00007FFA2B195000-memory.dmp

    Filesize

    8KB

  • memory/2328-1-0x0000000000E00000-0x0000000000E14000-memory.dmp

    Filesize

    80KB

  • memory/2328-3-0x000000001C530000-0x000000001C542000-memory.dmp

    Filesize

    72KB

  • memory/2328-4-0x00007FFA2B190000-0x00007FFA2BC51000-memory.dmp

    Filesize

    10.8MB

  • memory/2328-5-0x00007FFA2B193000-0x00007FFA2B195000-memory.dmp

    Filesize

    8KB

  • memory/2328-10-0x00007FFA2B190000-0x00007FFA2BC51000-memory.dmp

    Filesize

    10.8MB

  • memory/2956-9-0x00007FFA2B190000-0x00007FFA2BC51000-memory.dmp

    Filesize

    10.8MB

  • memory/2956-11-0x00007FFA2B190000-0x00007FFA2BC51000-memory.dmp

    Filesize

    10.8MB