Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 03:19
Behavioral task
behavioral1
Sample
f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe
Resource
win10v2004-20220812-en
General
-
Target
f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe
-
Size
183KB
-
MD5
288bbd300fd39434ddd6fdc265506add
-
SHA1
6e2adb88bfd2d097f76c41ab123b8e6a6d6fb250
-
SHA256
f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de
-
SHA512
029c4eb5e9128dfc8b7d7f52ede4fde1b173246dd766f45191fd10243757ca5857e8b5eec72ce162f7f8a3e404b45e8be8f0bb210190a6a23e4a5f6c2e206a66
-
SSDEEP
3072:E8uSV75J+zulVBD+3181omJnGXzyjV2KjEyVnxyLEeWzPp/Rb3PhvYd+rNl2ofYz:E8uSVHDlVBDNomJGXexTffe2RISsh4H
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\adfly.exe = "C:\\Users\\Admin\\AppData\\Roaming\\adfly.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\WinLog = "C:\\Users\\Admin\\AppData\\Roaming\\adfly.exe" f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{9F3505EC-F7FD-DCF6-BAEA-3FCD81C2DC36}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\adfly.exe" f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9F3505EC-F7FD-DCF6-BAEA-3FCD81C2DC36} f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9F3505EC-F7FD-DCF6-BAEA-3FCD81C2DC36}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\adfly.exe" f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{9F3505EC-F7FD-DCF6-BAEA-3FCD81C2DC36} f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe -
resource yara_rule behavioral2/memory/4200-132-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/1324-136-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1324-138-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1324-139-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/4200-142-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/1324-143-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1324-153-0x0000000000400000-0x0000000000459000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinLog = "C:\\Users\\Admin\\AppData\\Roaming\\adfly.exe" f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinLog = "C:\\Users\\Admin\\AppData\\Roaming\\adfly.exe" f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4200 set thread context of 1324 4200 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 81 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3832 reg.exe 220 reg.exe 32 reg.exe 228 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeCreateTokenPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeAssignPrimaryTokenPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeLockMemoryPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeIncreaseQuotaPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeMachineAccountPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeTcbPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeSecurityPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeTakeOwnershipPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeLoadDriverPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeSystemProfilePrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeSystemtimePrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeProfSingleProcessPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeIncBasePriorityPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeCreatePagefilePrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeCreatePermanentPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeBackupPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeRestorePrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeShutdownPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeDebugPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeAuditPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeSystemEnvironmentPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeChangeNotifyPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeRemoteShutdownPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeUndockPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeSyncAgentPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeEnableDelegationPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeManageVolumePrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeImpersonatePrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: SeCreateGlobalPrivilege 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: 31 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: 32 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: 33 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: 34 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe Token: 35 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4200 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4200 wrote to memory of 1324 4200 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 81 PID 4200 wrote to memory of 1324 4200 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 81 PID 4200 wrote to memory of 1324 4200 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 81 PID 4200 wrote to memory of 1324 4200 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 81 PID 4200 wrote to memory of 1324 4200 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 81 PID 4200 wrote to memory of 1324 4200 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 81 PID 4200 wrote to memory of 1324 4200 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 81 PID 4200 wrote to memory of 1324 4200 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 81 PID 1324 wrote to memory of 3552 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 82 PID 1324 wrote to memory of 3552 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 82 PID 1324 wrote to memory of 3552 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 82 PID 1324 wrote to memory of 4544 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 83 PID 1324 wrote to memory of 4544 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 83 PID 1324 wrote to memory of 4544 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 83 PID 1324 wrote to memory of 1984 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 84 PID 1324 wrote to memory of 1984 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 84 PID 1324 wrote to memory of 1984 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 84 PID 1324 wrote to memory of 1452 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 87 PID 1324 wrote to memory of 1452 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 87 PID 1324 wrote to memory of 1452 1324 f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe 87 PID 1984 wrote to memory of 32 1984 cmd.exe 92 PID 1984 wrote to memory of 32 1984 cmd.exe 92 PID 1984 wrote to memory of 32 1984 cmd.exe 92 PID 1452 wrote to memory of 220 1452 cmd.exe 91 PID 1452 wrote to memory of 220 1452 cmd.exe 91 PID 1452 wrote to memory of 220 1452 cmd.exe 91 PID 4544 wrote to memory of 228 4544 cmd.exe 93 PID 4544 wrote to memory of 228 4544 cmd.exe 93 PID 4544 wrote to memory of 228 4544 cmd.exe 93 PID 3552 wrote to memory of 3832 3552 cmd.exe 90 PID 3552 wrote to memory of 3832 3552 cmd.exe 90 PID 3552 wrote to memory of 3832 3552 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe"C:\Users\Admin\AppData\Local\Temp\f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe"C:\Users\Admin\AppData\Local\Temp\f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:3832
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\f0231cdd2c015de8b22974adf8c67977713749b9eec1e97dafe8450bb6e8f7de.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:32
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\adfly.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\adfly.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\adfly.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\adfly.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:220
-
-
-