Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 13:32

General

  • Target

    9aaeb479b6bb61b97d6843d8681229ec1873acd0b488d575d71956c8d1ad1b02.exe

  • Size

    500KB

  • MD5

    c8c3a98c2916e96f5b8f07aeeb740066

  • SHA1

    c4920da5ce4f8912186dca18404ce7a9327c8dab

  • SHA256

    9aaeb479b6bb61b97d6843d8681229ec1873acd0b488d575d71956c8d1ad1b02

  • SHA512

    17bbde312e5fdbcc2766c5f0d5895dab72439844b8b2f89e4e3207a1c9396c8254ad0f2ce47ddb4c8081e9aabb9a61aa982babe47adfa0ba3e456c38d338e1e2

  • SSDEEP

    12288:+uRvXH+lNAFAvcE4vIKvQDsORs0hqK4vF:+gfelySvcE4vIKvUTRsRK8F

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Drops desktop.ini file(s) 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9aaeb479b6bb61b97d6843d8681229ec1873acd0b488d575d71956c8d1ad1b02.exe
    "C:\Users\Admin\AppData\Local\Temp\9aaeb479b6bb61b97d6843d8681229ec1873acd0b488d575d71956c8d1ad1b02.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2868-0-0x000007FEF5E33000-0x000007FEF5E34000-memory.dmp

    Filesize

    4KB

  • memory/2868-1-0x0000000000E10000-0x0000000000E92000-memory.dmp

    Filesize

    520KB

  • memory/2868-2-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2868-4-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2868-3-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2868-40-0x000007FEF5E33000-0x000007FEF5E34000-memory.dmp

    Filesize

    4KB

  • memory/2868-41-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2868-42-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB