Analysis
-
max time kernel
155s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
09-03-2022 17:39
Static task
static1
Behavioral task
behavioral1
Sample
8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe
Resource
win7-en-20211208
0 signatures
0 seconds
General
-
Target
8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe
-
Size
5.0MB
-
MD5
06f4968bbe4bc2595432073659abdb12
-
SHA1
89e4f5a320643818011c0c22017a866f6fe0198f
-
SHA256
8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec
-
SHA512
f15f337793f58ead1817c68d3cecf6189d6027773707a96733ab6c93591f9e286eac28274cba3ee8d86a2b6309ce5b479233fd4372b1c0ff8fb64307c3a8d9b9
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 3448 Windows.exe 3864 Windows.exe 1796 Windows.exe 3244 Windows.exe 2192 Windowsx32.exe 3792 Windowsx32.exe 2436 Windowsx32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files\RMS\settings.ini 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe File created C:\Program Files\RMS\Windowsx32.exe 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe File created C:\Program Files\RMS\vp8decoder.dll 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe File opened for modification C:\Program Files\RMS 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe File opened for modification C:\Program Files\RMS\settings.ini 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe File opened for modification C:\Program Files\RMS\Windows.exe 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe File opened for modification C:\Program Files\RMS\Windowsx32.exe 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe File opened for modification C:\Program Files\RMS\regedit.reg 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe File opened for modification C:\Program Files\RMS\vp8encoder.dll 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe File created C:\Program Files\RMS\Windows.exe 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe File created C:\Program Files\RMS\regedit.reg 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe File created C:\Program Files\RMS\vp8encoder.dll 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe File opened for modification C:\Program Files\RMS\vp8decoder.dll 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe -
Runs .reg file with regedit 2 IoCs
pid Process 4088 regedit.exe 1944 regedit.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3448 Windows.exe 3448 Windows.exe 3448 Windows.exe 3448 Windows.exe 3448 Windows.exe 3448 Windows.exe 3864 Windows.exe 3864 Windows.exe 1796 Windows.exe 1796 Windows.exe 3244 Windows.exe 3244 Windows.exe 3244 Windows.exe 3244 Windows.exe 3244 Windows.exe 3244 Windows.exe 2192 Windowsx32.exe 2192 Windowsx32.exe 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
pid Process 2192 Windowsx32.exe 2436 Windowsx32.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: 33 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe Token: SeIncBasePriorityPrivilege 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe Token: SeDebugPrivilege 3448 Windows.exe Token: SeDebugPrivilege 1796 Windows.exe Token: SeTakeOwnershipPrivilege 3244 Windows.exe Token: SeTcbPrivilege 3244 Windows.exe Token: SeTcbPrivilege 3244 Windows.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3448 Windows.exe 3864 Windows.exe 1796 Windows.exe 3244 Windows.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2784 wrote to memory of 1944 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 55 PID 2784 wrote to memory of 1944 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 55 PID 2784 wrote to memory of 1944 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 55 PID 2784 wrote to memory of 3448 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 59 PID 2784 wrote to memory of 3448 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 59 PID 2784 wrote to memory of 3448 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 59 PID 2784 wrote to memory of 3864 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 61 PID 2784 wrote to memory of 3864 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 61 PID 2784 wrote to memory of 3864 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 61 PID 2784 wrote to memory of 4088 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 63 PID 2784 wrote to memory of 4088 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 63 PID 2784 wrote to memory of 4088 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 63 PID 2784 wrote to memory of 1796 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 64 PID 2784 wrote to memory of 1796 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 64 PID 2784 wrote to memory of 1796 2784 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe 64 PID 3244 wrote to memory of 2192 3244 Windows.exe 66 PID 3244 wrote to memory of 2192 3244 Windows.exe 66 PID 3244 wrote to memory of 2192 3244 Windows.exe 66 PID 3244 wrote to memory of 3792 3244 Windows.exe 67 PID 3244 wrote to memory of 3792 3244 Windows.exe 67 PID 3244 wrote to memory of 3792 3244 Windows.exe 67 PID 2192 wrote to memory of 2436 2192 Windowsx32.exe 70 PID 2192 wrote to memory of 2436 2192 Windowsx32.exe 70 PID 2192 wrote to memory of 2436 2192 Windowsx32.exe 70 -
System policy modification 1 TTPs 11 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "3" 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableUIADesktopToggle = "0" 8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe"C:\Users\Admin\AppData\Local\Temp\8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec.exe"1⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2784 -
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\Program Files\RMS\regedit.reg"2⤵
- Runs .reg file with regedit
PID:1944
-
-
C:\Program Files\RMS\Windows.exe"C:\Program Files\RMS\Windows.exe" /silentinstall2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3448
-
-
C:\Program Files\RMS\Windows.exe"C:\Program Files\RMS\Windows.exe" /firewall2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3864
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\Program Files\RMS\regedit.reg"2⤵
- Runs .reg file with regedit
PID:4088
-
-
C:\Program Files\RMS\Windows.exe"C:\Program Files\RMS\Windows.exe" /start2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
C:\Program Files\RMS\Windows.exe"C:\Program Files\RMS\Windows.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Program Files\RMS\Windowsx32.exe"C:\Program Files\RMS\Windowsx32.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: SetClipboardViewer
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files\RMS\Windowsx32.exe"C:\Program Files\RMS\Windowsx32.exe" /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:2436
-
-
-
C:\Program Files\RMS\Windowsx32.exe"C:\Program Files\RMS\Windowsx32.exe" /tray2⤵
- Executes dropped EXE
PID:3792
-