Analysis

  • max time kernel
    190s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    11-05-2022 02:45

General

  • Target

    683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe

  • Size

    638KB

  • MD5

    043bbfccd9e9deebe4559e291dbebda1

  • SHA1

    0e6da4ccaed482767eb94a61679b5f24375f24d3

  • SHA256

    683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4

  • SHA512

    41e4ea16800ddc0078eca1260f6ef07cd33a1c849802437a2c5868a4bf2fc4ee8b4f480f63e30f88d6e63eab733916fe5f6ec8fd2d3ce91a8bd6bfa4c98a4cc5

Score
10/10

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • UAC bypass 3 TTPs
  • Windows security bypass 2 TTPs
  • Windows security modification 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe
    "C:\Users\Admin\AppData\Local\Temp\683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe"
    1⤵
    • Windows security modification
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3316
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3120
    • C:\Users\Admin\AppData\Local\Temp\683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe
      "C:\Users\Admin\AppData\Local\Temp\683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe"
      2⤵
      • Windows security modification
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4888
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        C:\Users\Admin\AppData\Local\Temp\683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe
        3⤵
          PID:3452
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 12
            4⤵
            • Program crash
            PID:904
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          C:\Users\Admin\AppData\Local\Temp\683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe
          3⤵
            PID:4396
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 12
              4⤵
              • Program crash
              PID:1836
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3452 -ip 3452
        1⤵
          PID:2188
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4396 -ip 4396
          1⤵
            PID:2980

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Modify Existing Service

          1
          T1031

          Privilege Escalation

          Bypass User Account Control

          1
          T1088

          Defense Evasion

          Modify Registry

          5
          T1112

          Disabling Security Tools

          4
          T1089

          Bypass User Account Control

          1
          T1088

          Discovery

          System Information Discovery

          1
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3120-142-0x0000000006B00000-0x0000000006B1E000-memory.dmp
            Filesize

            120KB

          • memory/3120-149-0x0000000007ED0000-0x0000000007F66000-memory.dmp
            Filesize

            600KB

          • memory/3120-143-0x00000000060C0000-0x00000000060F2000-memory.dmp
            Filesize

            200KB

          • memory/3120-152-0x0000000007E30000-0x0000000007E38000-memory.dmp
            Filesize

            32KB

          • memory/3120-144-0x000000006FFA0000-0x000000006FFEC000-memory.dmp
            Filesize

            304KB

          • memory/3120-150-0x00000000072F0000-0x00000000072FE000-memory.dmp
            Filesize

            56KB

          • memory/3120-136-0x0000000000000000-mapping.dmp
          • memory/3120-137-0x0000000004EC0000-0x0000000004EF6000-memory.dmp
            Filesize

            216KB

          • memory/3120-138-0x0000000005600000-0x0000000005C28000-memory.dmp
            Filesize

            6.2MB

          • memory/3120-139-0x00000000055D0000-0x00000000055F2000-memory.dmp
            Filesize

            136KB

          • memory/3120-140-0x00000000064B0000-0x0000000006516000-memory.dmp
            Filesize

            408KB

          • memory/3120-141-0x00000000065D0000-0x0000000006636000-memory.dmp
            Filesize

            408KB

          • memory/3120-148-0x00000000063A0000-0x00000000063AA000-memory.dmp
            Filesize

            40KB

          • memory/3120-147-0x0000000006350000-0x000000000636A000-memory.dmp
            Filesize

            104KB

          • memory/3120-151-0x0000000007E50000-0x0000000007E6A000-memory.dmp
            Filesize

            104KB

          • memory/3120-145-0x00000000060A0000-0x00000000060BE000-memory.dmp
            Filesize

            120KB

          • memory/3120-146-0x0000000008370000-0x00000000089EA000-memory.dmp
            Filesize

            6.5MB

          • memory/3316-132-0x0000000005A50000-0x0000000005FF4000-memory.dmp
            Filesize

            5.6MB

          • memory/3316-131-0x0000000005400000-0x000000000549C000-memory.dmp
            Filesize

            624KB

          • memory/3316-135-0x0000000005690000-0x00000000056E6000-memory.dmp
            Filesize

            344KB

          • memory/3316-134-0x00000000054E0000-0x00000000054EA000-memory.dmp
            Filesize

            40KB

          • memory/3316-133-0x0000000005540000-0x00000000055D2000-memory.dmp
            Filesize

            584KB

          • memory/3316-130-0x00000000009F0000-0x0000000000A94000-memory.dmp
            Filesize

            656KB

          • memory/4888-159-0x0000000000400000-0x000000000042C000-memory.dmp
            Filesize

            176KB

          • memory/4888-153-0x0000000000000000-mapping.dmp
          • memory/4888-154-0x0000000000400000-0x000000000042C000-memory.dmp
            Filesize

            176KB

          • memory/4888-156-0x0000000000400000-0x000000000042C000-memory.dmp
            Filesize

            176KB