Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
e990cf31fa3193032d119c44229b9d2bc31754cf6cc6e5e1b5d9d95220322dee.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e990cf31fa3193032d119c44229b9d2bc31754cf6cc6e5e1b5d9d95220322dee.exe
Resource
win10v2004-20241007-en
General
-
Target
e990cf31fa3193032d119c44229b9d2bc31754cf6cc6e5e1b5d9d95220322dee.exe
-
Size
86KB
-
MD5
b745c2c373390b8c54e0147d8aa85ce8
-
SHA1
50c66991be0a5b1d5ff3c489cdaaab0de6f26834
-
SHA256
e990cf31fa3193032d119c44229b9d2bc31754cf6cc6e5e1b5d9d95220322dee
-
SHA512
a9c5020bc1b8fb0c9c888f8c2f55d2cc257c9680e054b366ba829293f994dc376a0a49652b422e03e51650df9455c2f4bbb5c28d3d74f5bdf326b1fd231f642d
-
SSDEEP
1536:OROM9kCiFHcx3a4Cnu8RbVShone4PIj8Csnj:ORWCi+Cn1VShoVPIgRn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2612 Winkbyq.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Winkbyq.exe Winkbyq.exe File created C:\Windows\SysWOW64\Winkbyq.exe Winkbyq.exe File opened for modification C:\Windows\SysWOW64\Winkbyq.exe e990cf31fa3193032d119c44229b9d2bc31754cf6cc6e5e1b5d9d95220322dee.exe File created C:\Windows\SysWOW64\Winkbyq.exe e990cf31fa3193032d119c44229b9d2bc31754cf6cc6e5e1b5d9d95220322dee.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2412 e990cf31fa3193032d119c44229b9d2bc31754cf6cc6e5e1b5d9d95220322dee.exe Token: SeTcbPrivilege 2612 Winkbyq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e990cf31fa3193032d119c44229b9d2bc31754cf6cc6e5e1b5d9d95220322dee.exe"C:\Users\Admin\AppData\Local\Temp\e990cf31fa3193032d119c44229b9d2bc31754cf6cc6e5e1b5d9d95220322dee.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
C:\Windows\SysWOW64\Winkbyq.exeC:\Windows\SysWOW64\Winkbyq.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2612
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5046f2749a5f547c470cba54fd1be1d6c
SHA1c0d23ef594f8b22ffc2496a607cd24e83467f6b3
SHA256728e71d3c07fc281682bc217a91818a034ad607aa26b711646d450555da74e28
SHA5125533329de7b2d71791cda58dde6002b6c02ebca5c879c4cee9fc5e514161fd7c7318b01327a7dd0497f9ceee6272cf66afa4d49286d1cda78508516c5d691467