Analysis
-
max time kernel
4s -
max time network
47s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
19/07/2021, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
44b42e92ffe33907c539d1135bb05239.exe
Resource
win7v20210408
0 signatures
0 seconds
General
-
Target
44b42e92ffe33907c539d1135bb05239.exe
-
Size
554KB
-
MD5
44b42e92ffe33907c539d1135bb05239
-
SHA1
954f37a3ee58b57f408d09da74f13a5660562d07
-
SHA256
2f06361e4a81ff059d074de638106e1b9aeba6885819b15391ef25997f537bf1
-
SHA512
95243c5be2733af4de3385fb6e04b3f017c1cc34260a45ca2e0675d584339fcce5bc0fd9a5c75b7fb3516807cc936ffd9e90b4d5744301e2787fd2975d6dfc54
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 44b42e92ffe33907c539d1135bb05239.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 44b42e92ffe33907c539d1135bb05239.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 44b42e92ffe33907c539d1135bb05239.exe -
resource yara_rule behavioral1/memory/1948-62-0x00000000029B0000-0x0000000003A3E000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 44b42e92ffe33907c539d1135bb05239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 44b42e92ffe33907c539d1135bb05239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 44b42e92ffe33907c539d1135bb05239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 44b42e92ffe33907c539d1135bb05239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 44b42e92ffe33907c539d1135bb05239.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 44b42e92ffe33907c539d1135bb05239.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 44b42e92ffe33907c539d1135bb05239.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44b42e92ffe33907c539d1135bb05239.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 44b42e92ffe33907c539d1135bb05239.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1948 44b42e92ffe33907c539d1135bb05239.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe Token: SeDebugPrivilege 1948 44b42e92ffe33907c539d1135bb05239.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1948 44b42e92ffe33907c539d1135bb05239.exe 1948 44b42e92ffe33907c539d1135bb05239.exe 1948 44b42e92ffe33907c539d1135bb05239.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1120 1948 44b42e92ffe33907c539d1135bb05239.exe 15 PID 1948 wrote to memory of 1180 1948 44b42e92ffe33907c539d1135bb05239.exe 14 PID 1948 wrote to memory of 1224 1948 44b42e92ffe33907c539d1135bb05239.exe 13 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 44b42e92ffe33907c539d1135bb05239.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\44b42e92ffe33907c539d1135bb05239.exe"C:\Users\Admin\AppData\Local\Temp\44b42e92ffe33907c539d1135bb05239.exe"2⤵
- Modifies firewall policy service
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1948
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120