Analysis
-
max time kernel
33s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-09-2022 11:29
Static task
static1
Behavioral task
behavioral1
Sample
ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe
Resource
win7-20220812-en
General
-
Target
ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe
-
Size
36KB
-
MD5
c71e89f8fc213c73ab59fc3e62c258f3
-
SHA1
2dfb26333f75d629b21ccf50e3612b4a9e2c4a0f
-
SHA256
ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550
-
SHA512
83960b66993ffb45b2962b38621ee67cb4a8b333dbb6d52d84cb88c61c7c27af0dac09210dfa8633b7f7455743203333392c9e7a89623478b33ba3c3bfdb5606
-
SSDEEP
192:60RmaRBUda7n9JlU2g1jJMOEyKbIYymt5XTtEyKihoynlwHLHTgH9N2tpgRmd8MS:60oBdq9JGqO+NxhcAdN2tpgwd5ASc
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 324 k4.exe 1780 k4.exe 324 k4.exe 1780 k4.exe -
Loads dropped DLL 4 IoCs
pid Process 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
pid Process 1860 taskkill.exe 1860 taskkill.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1964 wrote to memory of 324 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 30 PID 1964 wrote to memory of 324 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 30 PID 1964 wrote to memory of 324 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 30 PID 1964 wrote to memory of 324 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 30 PID 1964 wrote to memory of 1780 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 31 PID 1964 wrote to memory of 1780 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 31 PID 1964 wrote to memory of 1780 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 31 PID 1964 wrote to memory of 1780 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 31 PID 1964 wrote to memory of 652 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 32 PID 1964 wrote to memory of 652 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 32 PID 1964 wrote to memory of 652 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 32 PID 1964 wrote to memory of 652 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 32 PID 1964 wrote to memory of 324 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 64 PID 1964 wrote to memory of 324 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 64 PID 1964 wrote to memory of 324 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 64 PID 1964 wrote to memory of 324 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 64 PID 1964 wrote to memory of 1780 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 65 PID 1964 wrote to memory of 1780 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 65 PID 1964 wrote to memory of 1780 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 65 PID 1964 wrote to memory of 1780 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 65 PID 1964 wrote to memory of 652 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 66 PID 1964 wrote to memory of 652 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 66 PID 1964 wrote to memory of 652 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 66 PID 1964 wrote to memory of 652 1964 ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe 66 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe"C:\Users\Admin\AppData\Local\Temp\ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1964 -
C:\Users\Public\Documents\k4.exeC:/Users/Public/Documents/k4.exe2⤵
- Executes dropped EXE
PID:324
-
-
C:\Users\Public\Documents\k4.exeC:/Users/Public/Documents/k4.exe /D2⤵
- Executes dropped EXE
PID:1780
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /t /im k4.exe2⤵PID:652
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im k4.exe3⤵
- Kills process with taskkill
PID:1860
-
-
-
C:\Users\Admin\AppData\Local\Temp\ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe"C:\Users\Admin\AppData\Local\Temp\ec827ffc5601ab5618483edb34adbce6ef5d70c5715118135890e2bcca8a6550.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1964 -
C:\Users\Public\Documents\k4.exeC:/Users/Public/Documents/k4.exe2⤵
- Executes dropped EXE
PID:324
-
-
C:\Users\Public\Documents\k4.exeC:/Users/Public/Documents/k4.exe /D2⤵
- Executes dropped EXE
PID:1780
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /t /im k4.exe2⤵PID:652
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im k4.exe3⤵
- Kills process with taskkill
PID:1860
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
24KB
MD5c68a7ddbed2cd20279b87e733c9008db
SHA1eef926d0069c9b54e609302b64267d4721f8ea7a
SHA2567e05127f15bb1967ca4598d9fa8a4c7867b1658b684e50874a9513e4ff23ee53
SHA512db21961744b62f0a772c7bd309592898630deeb1a18e79c3b289e5d187521cfdcc37e4a6a18149a697ddff7c121ec6f73685a8dce8e1181552558947d13e83bf
-
Filesize
24KB
MD5c68a7ddbed2cd20279b87e733c9008db
SHA1eef926d0069c9b54e609302b64267d4721f8ea7a
SHA2567e05127f15bb1967ca4598d9fa8a4c7867b1658b684e50874a9513e4ff23ee53
SHA512db21961744b62f0a772c7bd309592898630deeb1a18e79c3b289e5d187521cfdcc37e4a6a18149a697ddff7c121ec6f73685a8dce8e1181552558947d13e83bf
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93