Analysis
-
max time kernel
10s -
max time network
122s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
20-08-2021 15:54
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v20210408
General
-
Target
sample.exe
-
Size
158KB
-
MD5
56f67d720e83f2cff38f2ea1d9c8f9ff
-
SHA1
9c9cd7cd4fef7452eed6c4aba14ead4c389a8d78
-
SHA256
5b9fee8a999bd50608b7204a499770f8070bec7af20b3607af29ff3ed768639c
-
SHA512
527623d086597f54691e624a6c91fbe86958a78738c507b9c0097337262bb72a728a75f828dd173d2b9ea7861c5968232dc7e5d36a83d4ee3d7b5bbf42a79e3f
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
sample.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Admin.exe" sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Shockwave Flash = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sample.exe" sample.exe -
Modifies registry key 1 TTPs 3 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
sample.exepid process 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe 1048 sample.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
sample.exedescription pid process Token: SeDebugPrivilege 1048 sample.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
sample.execmd.execmd.execmd.exedescription pid process target process PID 1048 wrote to memory of 1964 1048 sample.exe cmd.exe PID 1048 wrote to memory of 1964 1048 sample.exe cmd.exe PID 1048 wrote to memory of 1964 1048 sample.exe cmd.exe PID 1048 wrote to memory of 1284 1048 sample.exe cmd.exe PID 1048 wrote to memory of 1284 1048 sample.exe cmd.exe PID 1048 wrote to memory of 1284 1048 sample.exe cmd.exe PID 1048 wrote to memory of 1728 1048 sample.exe cmd.exe PID 1048 wrote to memory of 1728 1048 sample.exe cmd.exe PID 1048 wrote to memory of 1728 1048 sample.exe cmd.exe PID 1964 wrote to memory of 1444 1964 cmd.exe reg.exe PID 1964 wrote to memory of 1444 1964 cmd.exe reg.exe PID 1964 wrote to memory of 1444 1964 cmd.exe reg.exe PID 1728 wrote to memory of 1644 1728 cmd.exe reg.exe PID 1728 wrote to memory of 1644 1728 cmd.exe reg.exe PID 1728 wrote to memory of 1644 1728 cmd.exe reg.exe PID 1284 wrote to memory of 1600 1284 cmd.exe reg.exe PID 1284 wrote to memory of 1600 1284 cmd.exe reg.exe PID 1284 wrote to memory of 1600 1284 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f3⤵
- Modifies registry key
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f3⤵
- Modifies registry key
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Modifies registry key
-
C:\Users\Admin\Desktop\Admin.exe"C:\Users\Admin\Desktop\Admin.exe"1⤵
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f2⤵
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f2⤵
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f2⤵
-
C:\Users\Admin\Desktop\Admin.exe"C:\Users\Admin\Desktop\Admin.exe"1⤵
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f2⤵
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f2⤵
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f2⤵
-
C:\Users\Admin\Desktop\Admin.exe"C:\Users\Admin\Desktop\Admin.exe"1⤵
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f2⤵
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f2⤵
-
C:\Windows\system32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\Admin.exeMD5
56f67d720e83f2cff38f2ea1d9c8f9ff
SHA19c9cd7cd4fef7452eed6c4aba14ead4c389a8d78
SHA2565b9fee8a999bd50608b7204a499770f8070bec7af20b3607af29ff3ed768639c
SHA512527623d086597f54691e624a6c91fbe86958a78738c507b9c0097337262bb72a728a75f828dd173d2b9ea7861c5968232dc7e5d36a83d4ee3d7b5bbf42a79e3f
-
C:\Users\Admin\Desktop\Admin.exeMD5
56f67d720e83f2cff38f2ea1d9c8f9ff
SHA19c9cd7cd4fef7452eed6c4aba14ead4c389a8d78
SHA2565b9fee8a999bd50608b7204a499770f8070bec7af20b3607af29ff3ed768639c
SHA512527623d086597f54691e624a6c91fbe86958a78738c507b9c0097337262bb72a728a75f828dd173d2b9ea7861c5968232dc7e5d36a83d4ee3d7b5bbf42a79e3f
-
C:\Users\Admin\Desktop\Admin.exeMD5
56f67d720e83f2cff38f2ea1d9c8f9ff
SHA19c9cd7cd4fef7452eed6c4aba14ead4c389a8d78
SHA2565b9fee8a999bd50608b7204a499770f8070bec7af20b3607af29ff3ed768639c
SHA512527623d086597f54691e624a6c91fbe86958a78738c507b9c0097337262bb72a728a75f828dd173d2b9ea7861c5968232dc7e5d36a83d4ee3d7b5bbf42a79e3f
-
C:\Users\Admin\Desktop\Admin.exeMD5
56f67d720e83f2cff38f2ea1d9c8f9ff
SHA19c9cd7cd4fef7452eed6c4aba14ead4c389a8d78
SHA2565b9fee8a999bd50608b7204a499770f8070bec7af20b3607af29ff3ed768639c
SHA512527623d086597f54691e624a6c91fbe86958a78738c507b9c0097337262bb72a728a75f828dd173d2b9ea7861c5968232dc7e5d36a83d4ee3d7b5bbf42a79e3f
-
memory/528-82-0x0000000000000000-mapping.dmp
-
memory/672-83-0x0000000000000000-mapping.dmp
-
memory/828-77-0x000000001B040000-0x000000001B042000-memory.dmpFilesize
8KB
-
memory/828-72-0x00000000011A0000-0x00000000011A1000-memory.dmpFilesize
4KB
-
memory/828-78-0x000000001B046000-0x000000001B065000-memory.dmpFilesize
124KB
-
memory/884-86-0x000000001B206000-0x000000001B225000-memory.dmpFilesize
124KB
-
memory/884-85-0x000000001B200000-0x000000001B202000-memory.dmpFilesize
8KB
-
memory/1048-66-0x000000001B216000-0x000000001B235000-memory.dmpFilesize
124KB
-
memory/1048-60-0x0000000001300000-0x0000000001301000-memory.dmpFilesize
4KB
-
memory/1048-62-0x000000001B210000-0x000000001B212000-memory.dmpFilesize
8KB
-
memory/1228-92-0x0000000000000000-mapping.dmp
-
memory/1284-64-0x0000000000000000-mapping.dmp
-
memory/1372-74-0x0000000000000000-mapping.dmp
-
memory/1444-67-0x0000000000000000-mapping.dmp
-
memory/1576-84-0x0000000000000000-mapping.dmp
-
memory/1600-69-0x0000000000000000-mapping.dmp
-
memory/1644-68-0x0000000000000000-mapping.dmp
-
memory/1712-76-0x0000000000000000-mapping.dmp
-
memory/1712-91-0x000000001B2C6000-0x000000001B2E5000-memory.dmpFilesize
124KB
-
memory/1712-90-0x000000001B2C0000-0x000000001B2C2000-memory.dmpFilesize
8KB
-
memory/1728-65-0x0000000000000000-mapping.dmp
-
memory/1824-93-0x0000000000000000-mapping.dmp
-
memory/1860-75-0x0000000000000000-mapping.dmp
-
memory/1964-63-0x0000000000000000-mapping.dmp
-
memory/2024-94-0x0000000000000000-mapping.dmp