Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2024 14:10

General

  • Target

    827d491604ddc96f9e6f7e5b79e10f9765bf680c11e38f57339e28822c40de68.exe

  • Size

    46KB

  • MD5

    1b82eb8b48597cb146a11fb5435a5981

  • SHA1

    ec8c2e0efd66122d1018dc9e154b8cbbabac7a50

  • SHA256

    827d491604ddc96f9e6f7e5b79e10f9765bf680c11e38f57339e28822c40de68

  • SHA512

    77f8e89d90ac25c514e52ce4771295567d0304d72ca141b441f49aca8137d834b8897f988bdffecf3110b82bc614b2351d2225c2d4c2cb172ac245915b32e118

  • SSDEEP

    768:pazJB5Som+D7lVgZKoyyeIcSBNy5Tg+CjSexGBIR18kxa2234hWEB:paFBjm47XgZKoy5IcEMg+atxGyHe+

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\827d491604ddc96f9e6f7e5b79e10f9765bf680c11e38f57339e28822c40de68.exe
    "C:\Users\Admin\AppData\Local\Temp\827d491604ddc96f9e6f7e5b79e10f9765bf680c11e38f57339e28822c40de68.exe"
    1⤵
      PID:2204
    • C:\Windows\system32\csrss.exe
      %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
      1⤵
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      PID:2852
    • C:\Windows\system32\winlogon.exe
      winlogon.exe
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:2560
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2508

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2204-0-0x0000000001000000-0x000000000100F000-memory.dmp

      Filesize

      60KB

    • memory/2204-1-0x0000000001000000-0x000000000100F000-memory.dmp

      Filesize

      60KB

    • memory/2508-2-0x0000000002730000-0x0000000002731000-memory.dmp

      Filesize

      4KB

    • memory/2508-3-0x0000000002730000-0x0000000002731000-memory.dmp

      Filesize

      4KB