Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 04:27
Static task
static1
Behavioral task
behavioral1
Sample
3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe
Resource
win7-20220718-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe
Resource
win10v2004-20220721-en
13 signatures
150 seconds
General
-
Target
3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe
-
Size
1.2MB
-
MD5
f8a802ca74aa6b14b8134b7f8695d65f
-
SHA1
6d156982a55de12d58457d9ea2c604b11f98f479
-
SHA256
3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c
-
SHA512
0992ebb0a8ad13e1fc0762dc529d7887a9ec0b504e9c0de2b74234ca081bff1b27f43c81fb3e72956a46d61e07500bcf6e776eea0405a789202cc2633556a1d4
Score
10/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\L8Q3J007-J4H2-S2W0-X0H8-U2R3L6X771M5 = "C:\\Users\\Admin\\AppData\\Roaming\\L8Q3J007-J4H2-S2W0-X0H8-U2R3L6X771M5\\L8Q3J007-J4H2-S2W0-X0H8-U2R3L6X771M5.exe" iexplore.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\L8Q3J007-J4H2-S2W0-X0H8-U2R3L6X771M5 = "C:\\Users\\Admin\\AppData\\Roaming\\L8Q3J007-J4H2-S2W0-X0H8-U2R3L6X771M5\\L8Q3J007-J4H2-S2W0-X0H8-U2R3L6X771M5.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\L8Q3J007-J4H2-S2W0-X0H8-U2R3L6X771M5 = "C:\\Users\\Admin\\AppData\\Roaming\\L8Q3J007-J4H2-S2W0-X0H8-U2R3L6X771M5\\L8Q3J007-J4H2-S2W0-X0H8-U2R3L6X771M5.exe" iexplore.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4752 set thread context of 204 4752 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 85 PID 204 set thread context of 4340 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4752 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 4752 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4752 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe Token: SeDebugPrivilege 4340 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 4340 iexplore.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4752 wrote to memory of 204 4752 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 85 PID 4752 wrote to memory of 204 4752 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 85 PID 4752 wrote to memory of 204 4752 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 85 PID 4752 wrote to memory of 204 4752 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 85 PID 4752 wrote to memory of 204 4752 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 85 PID 4752 wrote to memory of 204 4752 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 85 PID 4752 wrote to memory of 204 4752 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 85 PID 204 wrote to memory of 4340 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 86 PID 204 wrote to memory of 4340 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 86 PID 204 wrote to memory of 4340 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 86 PID 204 wrote to memory of 4340 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 86 PID 204 wrote to memory of 4340 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 86 PID 204 wrote to memory of 4340 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 86 PID 204 wrote to memory of 4340 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 86 PID 204 wrote to memory of 4340 204 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe 86 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe"C:\Users\Admin\AppData\Local\Temp\3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exeC:\Users\Admin\AppData\Local\Temp\3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe2⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:204 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\3617f700240f1deb93428b6b6adb492bef67bae7683427c9263f98d56694ca5c.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4340
-
-