Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2024, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
500687c3b307ac2c321f5fdb3a6d93a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
500687c3b307ac2c321f5fdb3a6d93a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
500687c3b307ac2c321f5fdb3a6d93a0N.exe
-
Size
731KB
-
MD5
500687c3b307ac2c321f5fdb3a6d93a0
-
SHA1
821a69f02fa4822e61afc2526ac08c425da7c3dc
-
SHA256
767639a7b519cfd72d16554e2a6993779e7450a9bf4a71563f1000eec960210b
-
SHA512
9807e3ec70f9e03f1cc8bfad2ea47fb6ac81e1aad403a0e0465d63c1381a646825739ca8c62b763f3c3f1eaabfa3bd2a814a6df8db981d78c999433119f34684
-
SSDEEP
12288:l5E7kPhRNySWDNtU3u7P+e+b34RTDsexOXw/p/DixEdFPf/+QdG6QFhe:limNngU3mP+e+b4xAc1WGnPf/+/the
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\ntos.exe," 500687c3b307ac2c321f5fdb3a6d93a0N.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\pathx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\500687c3b307ac2c321f5fdb3a6d93a0N.exe" 500687c3b307ac2c321f5fdb3a6d93a0N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntos.exe 500687c3b307ac2c321f5fdb3a6d93a0N.exe File created C:\Windows\SysWOW64\ntos.exe 500687c3b307ac2c321f5fdb3a6d93a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 500687c3b307ac2c321f5fdb3a6d93a0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5 PID 212 wrote to memory of 616 212 500687c3b307ac2c321f5fdb3a6d93a0N.exe 5
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\500687c3b307ac2c321f5fdb3a6d93a0N.exe"C:\Users\Admin\AppData\Local\Temp\500687c3b307ac2c321f5fdb3a6d93a0N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212