Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-06-2022 21:29
Static task
static1
Behavioral task
behavioral1
Sample
24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe
Resource
win10v2004-20220414-en
General
-
Target
24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe
-
Size
584KB
-
MD5
171569a4ca58064919c3d9e9cffcd1d0
-
SHA1
754db0cdffc636d95ee6a12d19a045bc95d9444c
-
SHA256
24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30
-
SHA512
fb08c20a852663129aeb5e50d4e1c9e63d0a084a27cc81d60a79525f996bbcc25f04859b7c381f01f3c266e14a12e03b1c5b1efbd3affeb5b348c1d32075b151
Malware Config
Signatures
-
Processes:
24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe -
Processes:
24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\O6F008P6-Y2C0-M8X2-S888-B1Y5L7K7Q331 = "C:\\Users\\Admin\\AppData\\Roaming\\O6F008P6-Y2C0-M8X2-S888-B1Y5L7K7Q331\\O6F008P6-Y2C0-M8X2-S888-B1Y5L7K7Q331.exe" iexplore.exe -
Processes:
24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\O6F008P6-Y2C0-M8X2-S888-B1Y5L7K7Q331 = "C:\\Users\\Admin\\AppData\\Roaming\\O6F008P6-Y2C0-M8X2-S888-B1Y5L7K7Q331\\O6F008P6-Y2C0-M8X2-S888-B1Y5L7K7Q331.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\O6F008P6-Y2C0-M8X2-S888-B1Y5L7K7Q331 = "C:\\Users\\Admin\\AppData\\Roaming\\O6F008P6-Y2C0-M8X2-S888-B1Y5L7K7Q331\\O6F008P6-Y2C0-M8X2-S888-B1Y5L7K7Q331.exe" iexplore.exe -
Processes:
24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2656 1428 WerFault.exe iexplore.exe 4708 2168 WerFault.exe iexplore.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exedescription pid process target process PID 3780 set thread context of 2196 3780 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe PID 2196 set thread context of 1428 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 set thread context of 2168 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 set thread context of 4716 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exepid process 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
iexplore.exedescription pid process Token: SeDebugPrivilege 4716 iexplore.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exeiexplore.exepid process 3780 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe 4716 iexplore.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exeiexplore.exedescription pid process target process PID 3780 wrote to memory of 2196 3780 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe PID 3780 wrote to memory of 2196 3780 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe PID 3780 wrote to memory of 2196 3780 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe PID 2196 wrote to memory of 1428 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 1428 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 1428 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 1428 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 1428 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 1428 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 1428 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 1428 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 2168 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 2168 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 2168 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 2168 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 2168 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 2168 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 2168 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 2168 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 4716 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 4716 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 4716 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 4716 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 4716 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 4716 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 4716 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 2196 wrote to memory of 4716 2196 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe iexplore.exe PID 4716 wrote to memory of 2652 4716 iexplore.exe notepad.exe PID 4716 wrote to memory of 2652 4716 iexplore.exe notepad.exe PID 4716 wrote to memory of 2652 4716 iexplore.exe notepad.exe PID 4716 wrote to memory of 2652 4716 iexplore.exe notepad.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe"C:\Users\Admin\AppData\Local\Temp\24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exeC:\Users\Admin\AppData\Local\Temp\24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe"2⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 1924⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 844⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\24b0f646c3bb9d35e9761b5d851b09c866eb8466d7438cedb561e8e79fe2af30.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad.exe4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1428 -ip 14281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2168 -ip 21681⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2196-133-0x0000000000000000-mapping.dmp
-
memory/2196-138-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2196-137-0x0000000000400000-0x0000000000495000-memory.dmpFilesize
596KB
-
memory/2196-141-0x00007FFBF29F0000-0x00007FFBF2BE5000-memory.dmpFilesize
2.0MB
-
memory/2196-142-0x0000000077C90000-0x0000000077E33000-memory.dmpFilesize
1.6MB
-
memory/2196-146-0x00000000004E0000-0x00000000004E7000-memory.dmpFilesize
28KB
-
memory/2196-147-0x0000000077C90000-0x0000000077E33000-memory.dmpFilesize
1.6MB
-
memory/2652-145-0x0000000000000000-mapping.dmp
-
memory/3780-132-0x0000000000680000-0x0000000000687000-memory.dmpFilesize
28KB
-
memory/3780-134-0x0000000000680000-0x0000000000687000-memory.dmpFilesize
28KB
-
memory/3780-135-0x00007FFBF29F0000-0x00007FFBF2BE5000-memory.dmpFilesize
2.0MB
-
memory/3780-136-0x0000000077C90000-0x0000000077E33000-memory.dmpFilesize
1.6MB