Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2024 04:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4a785f7033de58f25783f00f75f48450N.exe
Resource
win7-20240705-en
windows7-x64
5 signatures
120 seconds
Behavioral task
behavioral2
Sample
4a785f7033de58f25783f00f75f48450N.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
6 signatures
120 seconds
General
-
Target
4a785f7033de58f25783f00f75f48450N.exe
-
Size
343KB
-
MD5
4a785f7033de58f25783f00f75f48450
-
SHA1
dc4214e83aebb0d615b22e6a8a668691f8ecf33a
-
SHA256
278c492231c1d147abfcbb70afbc6b6e6349f62e1317e9df40fe15344305e81f
-
SHA512
4436dbbaa1a6b32b7099b1dccdd1606f61a0cac6917c7e59e0afe82b701ea961707932eb061ffd3b79602f356eeee4c39d5a2325569af8e12ad5ccf5f036e16e
-
SSDEEP
6144:lBPQKv8VjrSu8TfjBOF5ibBhsYBfySxhAHGh0FdZU3wvV0/:lbv8VjBiAFG/XBIzU3wta
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\ntos.exe," 4a785f7033de58f25783f00f75f48450N.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\pathx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4a785f7033de58f25783f00f75f48450N.exe" 4a785f7033de58f25783f00f75f48450N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntos.exe 4a785f7033de58f25783f00f75f48450N.exe File created C:\Windows\SysWOW64\ntos.exe 4a785f7033de58f25783f00f75f48450N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe 4748 4a785f7033de58f25783f00f75f48450N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4748 4a785f7033de58f25783f00f75f48450N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5 PID 4748 wrote to memory of 632 4748 4a785f7033de58f25783f00f75f48450N.exe 5
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\4a785f7033de58f25783f00f75f48450N.exe"C:\Users\Admin\AppData\Local\Temp\4a785f7033de58f25783f00f75f48450N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4748