Analysis
-
max time kernel
25s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20/08/2021, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
sample.exe
-
Size
158KB
-
MD5
56f67d720e83f2cff38f2ea1d9c8f9ff
-
SHA1
9c9cd7cd4fef7452eed6c4aba14ead4c389a8d78
-
SHA256
5b9fee8a999bd50608b7204a499770f8070bec7af20b3607af29ff3ed768639c
-
SHA512
527623d086597f54691e624a6c91fbe86958a78738c507b9c0097337262bb72a728a75f828dd173d2b9ea7861c5968232dc7e5d36a83d4ee3d7b5bbf42a79e3f
Score
10/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2104 Admin.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Admin.exe" sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Shockwave Flash = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sample.exe" sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Admin.exe" Admin.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Shockwave Flash = "C:\\Users\\Admin\\Desktop\\Admin.exe" Admin.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 1804 reg.exe 2856 reg.exe 3836 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe 628 sample.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 628 sample.exe Token: SeDebugPrivilege 2104 Admin.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 628 wrote to memory of 3104 628 sample.exe 75 PID 628 wrote to memory of 3104 628 sample.exe 75 PID 628 wrote to memory of 4088 628 sample.exe 76 PID 628 wrote to memory of 4088 628 sample.exe 76 PID 628 wrote to memory of 1764 628 sample.exe 78 PID 628 wrote to memory of 1764 628 sample.exe 78 PID 4088 wrote to memory of 3836 4088 cmd.exe 83 PID 4088 wrote to memory of 3836 4088 cmd.exe 83 PID 1764 wrote to memory of 2856 1764 cmd.exe 82 PID 1764 wrote to memory of 2856 1764 cmd.exe 82 PID 3104 wrote to memory of 1804 3104 cmd.exe 81 PID 3104 wrote to memory of 1804 3104 cmd.exe 81 PID 2104 wrote to memory of 1484 2104 Admin.exe 86 PID 2104 wrote to memory of 1484 2104 Admin.exe 86 PID 2104 wrote to memory of 1736 2104 Admin.exe 88 PID 2104 wrote to memory of 1736 2104 Admin.exe 88 PID 2104 wrote to memory of 2808 2104 Admin.exe 90 PID 2104 wrote to memory of 2808 2104 Admin.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f3⤵
- Modifies registry key
PID:1804
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f3⤵
- Modifies registry key
PID:3836
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Modifies registry key
PID:2856
-
-
-
C:\Users\Admin\Desktop\Admin.exe"C:\Users\Admin\Desktop\Admin.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f2⤵PID:1484
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f2⤵PID:1736
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f2⤵PID:2808
-
-
C:\Users\Admin\Desktop\Admin.exe"C:\Users\Admin\Desktop\Admin.exe"1⤵PID:3956
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f2⤵PID:3108
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm / v ConsentPromptBehaviorUser /t REG_DWORD /d 0 /f2⤵PID:3556
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Systemm /v EnableLUA /t REG_DWORD /d 0 /f2⤵PID:3936
-