Analysis

  • max time kernel
    10s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    20-08-2021 15:54

General

  • Target

    sample.exe

  • Size

    158KB

  • MD5

    56f67d720e83f2cff38f2ea1d9c8f9ff

  • SHA1

    9c9cd7cd4fef7452eed6c4aba14ead4c389a8d78

  • SHA256

    5b9fee8a999bd50608b7204a499770f8070bec7af20b3607af29ff3ed768639c

  • SHA512

    527623d086597f54691e624a6c91fbe86958a78738c507b9c0097337262bb72a728a75f828dd173d2b9ea7861c5968232dc7e5d36a83d4ee3d7b5bbf42a79e3f

Malware Config

Signatures

  • UAC bypass 3 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\system32\cmd.exe
      cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Windows\system32\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f
        3⤵
        • Modifies registry key
        PID:1444
    • C:\Windows\system32\cmd.exe
      cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Windows\system32\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f
        3⤵
        • Modifies registry key
        PID:1600
    • C:\Windows\system32\cmd.exe
      cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Windows\system32\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • Modifies registry key
        PID:1644
  • C:\Users\Admin\Desktop\Admin.exe
    "C:\Users\Admin\Desktop\Admin.exe"
    1⤵
      PID:828
      • C:\Windows\system32\cmd.exe
        cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f
        2⤵
          PID:1372
        • C:\Windows\system32\cmd.exe
          cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f
          2⤵
            PID:1860
          • C:\Windows\system32\cmd.exe
            cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f
            2⤵
              PID:1712
          • C:\Users\Admin\Desktop\Admin.exe
            "C:\Users\Admin\Desktop\Admin.exe"
            1⤵
              PID:884
              • C:\Windows\system32\cmd.exe
                cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f
                2⤵
                  PID:1576
                • C:\Windows\system32\cmd.exe
                  cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f
                  2⤵
                    PID:672
                  • C:\Windows\system32\cmd.exe
                    cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f
                    2⤵
                      PID:528
                  • C:\Users\Admin\Desktop\Admin.exe
                    "C:\Users\Admin\Desktop\Admin.exe"
                    1⤵
                      PID:1712
                      • C:\Windows\system32\cmd.exe
                        cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f
                        2⤵
                          PID:2024
                        • C:\Windows\system32\cmd.exe
                          cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f
                          2⤵
                            PID:1824
                          • C:\Windows\system32\cmd.exe
                            cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f
                            2⤵
                              PID:1228

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Persistence

                          Registry Run Keys / Startup Folder

                          1
                          T1060

                          Privilege Escalation

                          Bypass User Account Control

                          1
                          T1088

                          Defense Evasion

                          Bypass User Account Control

                          1
                          T1088

                          Disabling Security Tools

                          1
                          T1089

                          Modify Registry

                          3
                          T1112

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\Desktop\Admin.exe
                            MD5

                            56f67d720e83f2cff38f2ea1d9c8f9ff

                            SHA1

                            9c9cd7cd4fef7452eed6c4aba14ead4c389a8d78

                            SHA256

                            5b9fee8a999bd50608b7204a499770f8070bec7af20b3607af29ff3ed768639c

                            SHA512

                            527623d086597f54691e624a6c91fbe86958a78738c507b9c0097337262bb72a728a75f828dd173d2b9ea7861c5968232dc7e5d36a83d4ee3d7b5bbf42a79e3f

                          • C:\Users\Admin\Desktop\Admin.exe
                            MD5

                            56f67d720e83f2cff38f2ea1d9c8f9ff

                            SHA1

                            9c9cd7cd4fef7452eed6c4aba14ead4c389a8d78

                            SHA256

                            5b9fee8a999bd50608b7204a499770f8070bec7af20b3607af29ff3ed768639c

                            SHA512

                            527623d086597f54691e624a6c91fbe86958a78738c507b9c0097337262bb72a728a75f828dd173d2b9ea7861c5968232dc7e5d36a83d4ee3d7b5bbf42a79e3f

                          • C:\Users\Admin\Desktop\Admin.exe
                            MD5

                            56f67d720e83f2cff38f2ea1d9c8f9ff

                            SHA1

                            9c9cd7cd4fef7452eed6c4aba14ead4c389a8d78

                            SHA256

                            5b9fee8a999bd50608b7204a499770f8070bec7af20b3607af29ff3ed768639c

                            SHA512

                            527623d086597f54691e624a6c91fbe86958a78738c507b9c0097337262bb72a728a75f828dd173d2b9ea7861c5968232dc7e5d36a83d4ee3d7b5bbf42a79e3f

                          • C:\Users\Admin\Desktop\Admin.exe
                            MD5

                            56f67d720e83f2cff38f2ea1d9c8f9ff

                            SHA1

                            9c9cd7cd4fef7452eed6c4aba14ead4c389a8d78

                            SHA256

                            5b9fee8a999bd50608b7204a499770f8070bec7af20b3607af29ff3ed768639c

                            SHA512

                            527623d086597f54691e624a6c91fbe86958a78738c507b9c0097337262bb72a728a75f828dd173d2b9ea7861c5968232dc7e5d36a83d4ee3d7b5bbf42a79e3f

                          • memory/528-82-0x0000000000000000-mapping.dmp
                          • memory/672-83-0x0000000000000000-mapping.dmp
                          • memory/828-77-0x000000001B040000-0x000000001B042000-memory.dmp
                            Filesize

                            8KB

                          • memory/828-72-0x00000000011A0000-0x00000000011A1000-memory.dmp
                            Filesize

                            4KB

                          • memory/828-78-0x000000001B046000-0x000000001B065000-memory.dmp
                            Filesize

                            124KB

                          • memory/884-86-0x000000001B206000-0x000000001B225000-memory.dmp
                            Filesize

                            124KB

                          • memory/884-85-0x000000001B200000-0x000000001B202000-memory.dmp
                            Filesize

                            8KB

                          • memory/1048-66-0x000000001B216000-0x000000001B235000-memory.dmp
                            Filesize

                            124KB

                          • memory/1048-60-0x0000000001300000-0x0000000001301000-memory.dmp
                            Filesize

                            4KB

                          • memory/1048-62-0x000000001B210000-0x000000001B212000-memory.dmp
                            Filesize

                            8KB

                          • memory/1228-92-0x0000000000000000-mapping.dmp
                          • memory/1284-64-0x0000000000000000-mapping.dmp
                          • memory/1372-74-0x0000000000000000-mapping.dmp
                          • memory/1444-67-0x0000000000000000-mapping.dmp
                          • memory/1576-84-0x0000000000000000-mapping.dmp
                          • memory/1600-69-0x0000000000000000-mapping.dmp
                          • memory/1644-68-0x0000000000000000-mapping.dmp
                          • memory/1712-76-0x0000000000000000-mapping.dmp
                          • memory/1712-91-0x000000001B2C6000-0x000000001B2E5000-memory.dmp
                            Filesize

                            124KB

                          • memory/1712-90-0x000000001B2C0000-0x000000001B2C2000-memory.dmp
                            Filesize

                            8KB

                          • memory/1728-65-0x0000000000000000-mapping.dmp
                          • memory/1824-93-0x0000000000000000-mapping.dmp
                          • memory/1860-75-0x0000000000000000-mapping.dmp
                          • memory/1964-63-0x0000000000000000-mapping.dmp
                          • memory/2024-94-0x0000000000000000-mapping.dmp