Analysis
-
max time kernel
167s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-04-2022 15:52
Static task
static1
Behavioral task
behavioral1
Sample
986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe
Resource
win10v2004-20220414-en
General
-
Target
986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe
-
Size
1014KB
-
MD5
66b911f4bd33b3c563164c85b59f2e18
-
SHA1
0ce658b5bdf3ccfa3140df8b9d2beb1562331ed1
-
SHA256
986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8
-
SHA512
050f19ec427b97850692e5ddd7f4076724e9e74c8b157e41257d00e867b1cebbf6faf5db7a2b7998a9c0bf89d13e891912d92c961c20024368debbbe07a0e0bc
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\L448T7G5-O1Y7-C7N1-I6V6-R0O3C5A6G2W8 = "C:\\Users\\Admin\\AppData\\Roaming\\L448T7G5-O1Y7-C7N1-I6V6-R0O3C5A6G2W8\\L448T7G5-O1Y7-C7N1-I6V6-R0O3C5A6G2W8.exe" iexplore.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 1564 notepad.exe -
Processes:
986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\L448T7G5-O1Y7-C7N1-I6V6-R0O3C5A6G2W8 = "C:\\Users\\Admin\\AppData\\Roaming\\L448T7G5-O1Y7-C7N1-I6V6-R0O3C5A6G2W8\\L448T7G5-O1Y7-C7N1-I6V6-R0O3C5A6G2W8.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\L448T7G5-O1Y7-C7N1-I6V6-R0O3C5A6G2W8 = "C:\\Users\\Admin\\AppData\\Roaming\\L448T7G5-O1Y7-C7N1-I6V6-R0O3C5A6G2W8\\L448T7G5-O1Y7-C7N1-I6V6-R0O3C5A6G2W8.exe" iexplore.exe -
Processes:
986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exedescription pid process target process PID 764 set thread context of 1008 764 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe PID 1008 set thread context of 1472 1008 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exepid process 1008 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe 1008 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exeiexplore.exedescription pid process Token: SeDebugPrivilege 764 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe Token: SeDebugPrivilege 1472 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exeiexplore.exepid process 1008 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe 1472 iexplore.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exeiexplore.exedescription pid process target process PID 764 wrote to memory of 1008 764 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe PID 764 wrote to memory of 1008 764 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe PID 764 wrote to memory of 1008 764 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe PID 764 wrote to memory of 1008 764 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe PID 764 wrote to memory of 1008 764 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe PID 764 wrote to memory of 1008 764 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe PID 764 wrote to memory of 1008 764 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe PID 764 wrote to memory of 1008 764 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe PID 1008 wrote to memory of 1472 1008 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe iexplore.exe PID 1008 wrote to memory of 1472 1008 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe iexplore.exe PID 1008 wrote to memory of 1472 1008 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe iexplore.exe PID 1008 wrote to memory of 1472 1008 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe iexplore.exe PID 1008 wrote to memory of 1472 1008 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe iexplore.exe PID 1008 wrote to memory of 1472 1008 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe iexplore.exe PID 1008 wrote to memory of 1472 1008 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe iexplore.exe PID 1008 wrote to memory of 1472 1008 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe iexplore.exe PID 1008 wrote to memory of 1472 1008 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe iexplore.exe PID 1472 wrote to memory of 1564 1472 iexplore.exe notepad.exe PID 1472 wrote to memory of 1564 1472 iexplore.exe notepad.exe PID 1472 wrote to memory of 1564 1472 iexplore.exe notepad.exe PID 1472 wrote to memory of 1564 1472 iexplore.exe notepad.exe PID 1472 wrote to memory of 1564 1472 iexplore.exe notepad.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe"C:\Users\Admin\AppData\Local\Temp\986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe"C:\Users\Admin\AppData\Local\Temp\986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe"2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1008 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\986d993fb900f333814a9405bc8be12685aecfc2c5c0da6dc968e06f6bf4b7f8.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\notepad.exenotepad.exe4⤵
- Deletes itself
PID:1564