Analysis
-
max time kernel
190s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 02:45
Static task
static1
Behavioral task
behavioral1
Sample
683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe
-
Size
638KB
-
MD5
043bbfccd9e9deebe4559e291dbebda1
-
SHA1
0e6da4ccaed482767eb94a61679b5f24375f24d3
-
SHA256
683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4
-
SHA512
41e4ea16800ddc0078eca1260f6ef07cd33a1c849802437a2c5868a4bf2fc4ee8b4f480f63e30f88d6e63eab733916fe5f6ec8fd2d3ce91a8bd6bfa4c98a4cc5
Malware Config
Signatures
-
Processes:
683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe -
Processes:
683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 904 3452 WerFault.exe iexplore.exe 1836 4396 WerFault.exe iexplore.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exedescription pid process target process PID 3316 set thread context of 4888 3316 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe PID 4888 set thread context of 3452 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 set thread context of 4396 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exe683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exepid process 3120 powershell.exe 3120 powershell.exe 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3120 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exepid process 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exedescription pid process target process PID 3316 wrote to memory of 3120 3316 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe powershell.exe PID 3316 wrote to memory of 3120 3316 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe powershell.exe PID 3316 wrote to memory of 3120 3316 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe powershell.exe PID 3316 wrote to memory of 4888 3316 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe PID 3316 wrote to memory of 4888 3316 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe PID 3316 wrote to memory of 4888 3316 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe PID 3316 wrote to memory of 4888 3316 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe PID 3316 wrote to memory of 4888 3316 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe PID 3316 wrote to memory of 4888 3316 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe PID 3316 wrote to memory of 4888 3316 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe PID 4888 wrote to memory of 3452 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 3452 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 3452 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 3452 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 3452 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 3452 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 3452 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 3452 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 4396 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 4396 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 4396 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 4396 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 4396 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 4396 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 4396 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe PID 4888 wrote to memory of 4396 4888 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe iexplore.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe"C:\Users\Admin\AppData\Local\Temp\683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe"1⤵
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe"C:\Users\Admin\AppData\Local\Temp\683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe"2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4888 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe3⤵PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 124⤵
- Program crash
PID:904
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\683a36a87b827244db7f998e92ab4702563dd3075bb4fea97ee7ec239f81fed4.exe3⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 124⤵
- Program crash
PID:1836
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3452 -ip 34521⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4396 -ip 43961⤵PID:2980