Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
29-03-2022 18:36
Static task
static1
Behavioral task
behavioral1
Sample
6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe
Resource
win10v2004-en-20220113
General
-
Target
6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe
-
Size
484KB
-
MD5
8e00098b2140e8b6a58a18350e45112c
-
SHA1
c91661bc6067bd0a7b0d9ab7765f7728069deb62
-
SHA256
6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80
-
SHA512
1136b1a7004f64c4862d4eb77422dbf8d388f02a490633a1a894b1350b56c474b95cb7addc42beb4a2d74abf9c868145a925bf40e713f592a2f4ee2120080e4b
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\G4W7O6B4-J0T6-Q1C5-F2G6-U6T444B0J2S1 = "C:\\Users\\Admin\\AppData\\Roaming\\G4W7O6B4-J0T6-Q1C5-F2G6-U6T444B0J2S1\\G4W7O6B4-J0T6-Q1C5-F2G6-U6T444B0J2S1.exe" iexplore.exe -
Processes:
6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\G4W7O6B4-J0T6-Q1C5-F2G6-U6T444B0J2S1 = "C:\\Users\\Admin\\AppData\\Roaming\\G4W7O6B4-J0T6-Q1C5-F2G6-U6T444B0J2S1\\G4W7O6B4-J0T6-Q1C5-F2G6-U6T444B0J2S1.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\G4W7O6B4-J0T6-Q1C5-F2G6-U6T444B0J2S1 = "C:\\Users\\Admin\\AppData\\Roaming\\G4W7O6B4-J0T6-Q1C5-F2G6-U6T444B0J2S1\\G4W7O6B4-J0T6-Q1C5-F2G6-U6T444B0J2S1.exe" iexplore.exe -
Processes:
6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exedescription pid process target process PID 3628 set thread context of 2884 3628 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe PID 2884 set thread context of 3476 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exepid process 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
iexplore.exedescription pid process Token: SeDebugPrivilege 3476 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exeiexplore.exepid process 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe 3476 iexplore.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exeiexplore.exedescription pid process target process PID 3628 wrote to memory of 2884 3628 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe PID 3628 wrote to memory of 2884 3628 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe PID 3628 wrote to memory of 2884 3628 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe PID 3628 wrote to memory of 2884 3628 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe PID 3628 wrote to memory of 2884 3628 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe PID 3628 wrote to memory of 2884 3628 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe PID 3628 wrote to memory of 2884 3628 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe PID 2884 wrote to memory of 3476 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe iexplore.exe PID 2884 wrote to memory of 3476 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe iexplore.exe PID 2884 wrote to memory of 3476 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe iexplore.exe PID 2884 wrote to memory of 3476 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe iexplore.exe PID 2884 wrote to memory of 3476 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe iexplore.exe PID 2884 wrote to memory of 3476 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe iexplore.exe PID 2884 wrote to memory of 3476 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe iexplore.exe PID 2884 wrote to memory of 3476 2884 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe iexplore.exe PID 3476 wrote to memory of 368 3476 iexplore.exe notepad.exe PID 3476 wrote to memory of 368 3476 iexplore.exe notepad.exe PID 3476 wrote to memory of 368 3476 iexplore.exe notepad.exe PID 3476 wrote to memory of 368 3476 iexplore.exe notepad.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe"C:\Users\Admin\AppData\Local\Temp\6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe"{path}"2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2884 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\6aa342f22e938855a4158aaf5e5290227cfc8ec244f12a4087d6235bcd4e0c80.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\notepad.exenotepad.exe4⤵PID:368