Analysis

  • max time kernel
    25s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    20/08/2021, 15:54

General

  • Target

    sample.exe

  • Size

    158KB

  • MD5

    56f67d720e83f2cff38f2ea1d9c8f9ff

  • SHA1

    9c9cd7cd4fef7452eed6c4aba14ead4c389a8d78

  • SHA256

    5b9fee8a999bd50608b7204a499770f8070bec7af20b3607af29ff3ed768639c

  • SHA512

    527623d086597f54691e624a6c91fbe86958a78738c507b9c0097337262bb72a728a75f828dd173d2b9ea7861c5968232dc7e5d36a83d4ee3d7b5bbf42a79e3f

Malware Config

Signatures

  • UAC bypass 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3104
      • C:\Windows\system32\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f
        3⤵
        • Modifies registry key
        PID:1804
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4088
      • C:\Windows\system32\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f
        3⤵
        • Modifies registry key
        PID:3836
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Windows\system32\reg.exe
        reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • Modifies registry key
        PID:2856
  • C:\Users\Admin\Desktop\Admin.exe
    "C:\Users\Admin\Desktop\Admin.exe"
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f
      2⤵
        PID:1484
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f
        2⤵
          PID:1736
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f
          2⤵
            PID:2808
        • C:\Users\Admin\Desktop\Admin.exe
          "C:\Users\Admin\Desktop\Admin.exe"
          1⤵
            PID:3956
            • C:\Windows\SYSTEM32\cmd.exe
              cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f
              2⤵
                PID:3108
              • C:\Windows\SYSTEM32\cmd.exe
                cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f
                2⤵
                  PID:3556
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f
                  2⤵
                    PID:3936

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/628-124-0x0000026FFA654000-0x0000026FFA656000-memory.dmp

                  Filesize

                  8KB

                • memory/628-116-0x0000026FFA650000-0x0000026FFA652000-memory.dmp

                  Filesize

                  8KB

                • memory/628-114-0x0000026FFA250000-0x0000026FFA251000-memory.dmp

                  Filesize

                  4KB

                • memory/628-123-0x0000026FFA652000-0x0000026FFA654000-memory.dmp

                  Filesize

                  8KB

                • memory/2104-133-0x000001C9238A2000-0x000001C9238A4000-memory.dmp

                  Filesize

                  8KB

                • memory/2104-134-0x000001C9238A4000-0x000001C9238A6000-memory.dmp

                  Filesize

                  8KB

                • memory/2104-132-0x000001C9238A0000-0x000001C9238A2000-memory.dmp

                  Filesize

                  8KB

                • memory/3956-142-0x0000019D448E2000-0x0000019D448E4000-memory.dmp

                  Filesize

                  8KB

                • memory/3956-141-0x0000019D448E0000-0x0000019D448E2000-memory.dmp

                  Filesize

                  8KB

                • memory/3956-143-0x0000019D448E4000-0x0000019D448E6000-memory.dmp

                  Filesize

                  8KB