Analysis
-
max time kernel
178s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 06:39
Behavioral task
behavioral1
Sample
db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe
Resource
win10v2004-20220812-en
General
-
Target
db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe
-
Size
47KB
-
MD5
63f83e10075b4c8c5d77439d0db62cd1
-
SHA1
9142c668c3d48a54af8b5f3cf89e7db5a538c068
-
SHA256
db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067
-
SHA512
aa1a64656ed9e4ab9c0ab572fd9edcf40cce6e6fa3f726778b1cf4dc702aab9a1673b34653f808b3b394edfd364e377012566d0abd4cf7535db334e56370af62
-
SSDEEP
768:p6XSLKmEo9lxZERGo2alk32BwTDAHzA6oGJ69Lj:pWWEov2pIj
Malware Config
Signatures
-
Modifies security service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" ssms.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe -
Modifies system executable filetype association 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\Open\command Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "logoff.exe" Sab0tagE.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\Open\command db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "logoff.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\Open\command ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "logoff.exe" ssms.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\ADVANCED\SHOWSUPERHIDDEN = "0" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Sab0tagE.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntivirusDisableNotify = "1" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntivirusDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntivirusDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntivirusDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntivirusOverride = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntivirusOverride = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntivirusDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Sab0tagE.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Sab0tagE.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ssms.exe -
Executes dropped EXE 2 IoCs
pid Process 1828 ssms.exe 2012 Sab0tagE.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe\Debugger = "cmd.exe /c del /a /f" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "rundll32.exe" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avid.exe\Debugger = "cmd.exe /c del /a /f" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "rundll32.exe" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavgd.exe Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avid.exe ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "rundll32.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avid.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe\Debugger = "cmd.exe /c del /a /f" ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "cmd.exe /c del /a /f" ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "rundll32.exe" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavd.exe\Debugger = "cmd.exe /c del /a /f" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "rundll32.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "rundll32.exe" ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "rundll32.exe" ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavgd.exe\Debugger = "cmd.exe /c del /a /f" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavd.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "rundll32.exe" Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avid.exe\Debugger = "cmd.exe /c del /a /f" ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "cmd.exe /c del /a /f" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "rundll32.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavd.exe\Debugger = "cmd.exe /c del /a /f" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe\Debugger = "rundll32.exe" Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "rundll32.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "rundll32.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe\Debugger = "cmd.exe /c del /a /f" Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "rundll32.exe" Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "rundll32.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "rundll32.exe" ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "rundll32.exe" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavd.exe Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "rundll32.exe" Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavgd.exe\Debugger = "cmd.exe /c del /a /f" ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "rundll32.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "rundll32.exe" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "rundll32.exe" Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "rundll32.exe" Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansavgd.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe -
resource yara_rule behavioral1/memory/1632-56-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1632-62-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1632-65-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x0006000000014142-66.dat upx behavioral1/files/0x0006000000014142-68.dat upx behavioral1/memory/1828-71-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x0006000000014151-76.dat upx behavioral1/files/0x0006000000014151-77.dat upx behavioral1/files/0x0006000000014151-79.dat upx behavioral1/memory/2012-85-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1828-89-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1828-90-0x00000000003D0000-0x00000000003DE000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1828 ssms.exe 1828 ssms.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntivirusDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntivirusDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" Sab0tagE.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\Svc db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\Svc ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntivirusOverride = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntivirusDisableNotify = "1" Sab0tagE.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\Svc Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntivirusDisableNotify = "1" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntivirusDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntivirusOverride = "1" Sab0tagE.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ssms = "C:\\Windows\\ssms.exe" Sab0tagE.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ssms = "C:\\Windows\\ssms.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ssms = "C:\\Windows\\ssms.exe" ssms.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Sab0tagE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Sab0tagE.exe ssms.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ssms.exe db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe File opened for modification C:\Windows\ssms.exe ssms.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2020 Schtasks.exe 1712 Schtasks.exe 1052 Schtasks.exe -
Modifies data under HKEY_USERS 25 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SYSTEM ssms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE ssms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Sab0tagE.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" Sab0tagE.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SYSTEM Sab0tagE.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ssms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\POLICIES ssms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\MICROSOFT ssms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\WINDOWS\SYSTEM ssms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ADVANCED\SHOWSUPERHIDDEN = "0" Sab0tagE.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ssms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows ssms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion ssms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies ssms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\EXPLORER\ADVANCED ssms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ADVANCED\SHOWSUPERHIDDEN = "0" ssms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\WINDOWS\SYSTEM\DisableCMD = "2" ssms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\EXPLORER\ADVANCED Sab0tagE.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System ssms.exe Key created \REGISTRY\USER\.DEFAULT\Software ssms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ssms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" ssms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\WINDOWS ssms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System Sab0tagE.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\WINDOWS\SYSTEM\DisableCMD = "2" Sab0tagE.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\Open\command ssms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "logoff.exe" ssms.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\Open\command Sab0tagE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "logoff.exe" Sab0tagE.exe Key created \REGISTRY\MACHINE\Software\Classes\batfile\shell\Open\command db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "logoff.exe" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 1828 ssms.exe 2012 Sab0tagE.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1632 wrote to memory of 996 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 27 PID 1632 wrote to memory of 996 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 27 PID 1632 wrote to memory of 996 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 27 PID 1632 wrote to memory of 996 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 27 PID 1632 wrote to memory of 1756 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 29 PID 1632 wrote to memory of 1756 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 29 PID 1632 wrote to memory of 1756 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 29 PID 1632 wrote to memory of 1756 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 29 PID 1632 wrote to memory of 1712 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 31 PID 1632 wrote to memory of 1712 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 31 PID 1632 wrote to memory of 1712 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 31 PID 1632 wrote to memory of 1712 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 31 PID 1632 wrote to memory of 1140 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 33 PID 1632 wrote to memory of 1140 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 33 PID 1632 wrote to memory of 1140 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 33 PID 1632 wrote to memory of 1140 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 33 PID 1632 wrote to memory of 1564 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 35 PID 1632 wrote to memory of 1564 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 35 PID 1632 wrote to memory of 1564 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 35 PID 1632 wrote to memory of 1564 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 35 PID 1632 wrote to memory of 1692 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 36 PID 1632 wrote to memory of 1692 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 36 PID 1632 wrote to memory of 1692 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 36 PID 1632 wrote to memory of 1692 1632 db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe 36 PID 1680 wrote to memory of 1828 1680 taskeng.exe 40 PID 1680 wrote to memory of 1828 1680 taskeng.exe 40 PID 1680 wrote to memory of 1828 1680 taskeng.exe 40 PID 1680 wrote to memory of 1828 1680 taskeng.exe 40 PID 1828 wrote to memory of 1052 1828 ssms.exe 41 PID 1828 wrote to memory of 1052 1828 ssms.exe 41 PID 1828 wrote to memory of 1052 1828 ssms.exe 41 PID 1828 wrote to memory of 1052 1828 ssms.exe 41 PID 1828 wrote to memory of 768 1828 ssms.exe 42 PID 1828 wrote to memory of 768 1828 ssms.exe 42 PID 1828 wrote to memory of 768 1828 ssms.exe 42 PID 1828 wrote to memory of 768 1828 ssms.exe 42 PID 1828 wrote to memory of 1468 1828 ssms.exe 45 PID 1828 wrote to memory of 1468 1828 ssms.exe 45 PID 1828 wrote to memory of 1468 1828 ssms.exe 45 PID 1828 wrote to memory of 1468 1828 ssms.exe 45 PID 1828 wrote to memory of 2012 1828 ssms.exe 47 PID 1828 wrote to memory of 2012 1828 ssms.exe 47 PID 1828 wrote to memory of 2012 1828 ssms.exe 47 PID 1828 wrote to memory of 2012 1828 ssms.exe 47 PID 2012 wrote to memory of 2020 2012 Sab0tagE.exe 48 PID 2012 wrote to memory of 2020 2012 Sab0tagE.exe 48 PID 2012 wrote to memory of 2020 2012 Sab0tagE.exe 48 PID 2012 wrote to memory of 2020 2012 Sab0tagE.exe 48 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Sab0tagE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ssms.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ssms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Sab0tagE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe"C:\Users\Admin\AppData\Local\Temp\db8deaaefee1927cc7237e8ca9d28f3721336d105253d9858fd0e247261fc067.exe"1⤵
- Modifies security service
- Modifies system executable filetype association
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1632 -
C:\Windows\SysWOW64\Cacls.exeCacls "C:\Windows" /p everyone:f /e2⤵PID:996
-
-
C:\Windows\SysWOW64\Cacls.exeCacls "C:\Windows" /p everyone:n /e2⤵PID:1756
-
-
C:\Windows\SysWOW64\Schtasks.exeSchtasks /create /sc onstart /tn ssms /tr "C:\Windows\ssms.exe" /ru System2⤵
- Creates scheduled task(s)
PID:1712
-
-
C:\Windows\SysWOW64\Cacls.exeCacls "C:\Windows" /p everyone:f /e2⤵PID:1140
-
-
C:\Windows\SysWOW64\Cacls.exeCacls "C:\Windows" /p everyone:n /e2⤵PID:1564
-
-
C:\Windows\SysWOW64\Schtasks.exeSchtasks /run /tn ssms2⤵PID:1692
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {22AC9021-533F-48A4-AB26-2AB105CDE741} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\ssms.exeC:\Windows\ssms.exe2⤵
- Modifies security service
- Modifies system executable filetype association
- UAC bypass
- Windows security bypass
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1828 -
C:\Windows\SysWOW64\Schtasks.exeSchtasks /create /sc onstart /tn ssms /tr "C:\Windows\ssms.exe" /ru System3⤵
- Creates scheduled task(s)
PID:1052
-
-
C:\Windows\SysWOW64\Cacls.exeCacls "C:\Windows" /p everyone:f /e3⤵PID:768
-
-
C:\Windows\SysWOW64\Cacls.exeCacls "C:\Windows" /p everyone:n /e3⤵PID:1468
-
-
C:\Windows\SysWOW64\Sab0tagE.exeC:\Windows\System32\Sab0tagE.exe3⤵
- Modifies security service
- Modifies system executable filetype association
- UAC bypass
- Windows security bypass
- Drops file in Drivers directory
- Executes dropped EXE
- Sets file execution options in registry
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2012 -
C:\Windows\SysWOW64\Schtasks.exeSchtasks /create /sc onstart /tn ssms /tr "C:\Windows\ssms.exe" /ru System4⤵
- Creates scheduled task(s)
PID:2020
-
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Change Default File Association
1Hidden Files and Directories
1Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD511b033f096fe729364458aa1e30a40df
SHA1b549780efe751c51494614e18fd3df78c0110baf
SHA2565f0b47715081542bc970fa435de80d5a86001deef06b6ca2a9272a5247333bfd
SHA5124b52e5a5a35f028b34348f2dc816131dcea8836708d6d90a12a6381a0e39a4a2554d85a9581f8d064cc7b7cd5f0998f96e40a5e82aa1715f60f5a992ffd2ba1f
-
Filesize
47KB
MD59185b5c631bb8b7bb674395e57237457
SHA158089d5622881bf30ec7a91119ad1a449118b48f
SHA25678b95311e9c269ea1fa4f1577ed59a39727591f97768e5f7c41a6936d1180e94
SHA512ed76a7b61b202b3417855696d5d5d6fce8e897be0319a5d5f1adeba0d5f9cb369c64dd8b32d24aac94ded73790199872f12a4c2e7bac9e7ac9d8191a43d8a579
-
Filesize
47KB
MD59185b5c631bb8b7bb674395e57237457
SHA158089d5622881bf30ec7a91119ad1a449118b48f
SHA25678b95311e9c269ea1fa4f1577ed59a39727591f97768e5f7c41a6936d1180e94
SHA512ed76a7b61b202b3417855696d5d5d6fce8e897be0319a5d5f1adeba0d5f9cb369c64dd8b32d24aac94ded73790199872f12a4c2e7bac9e7ac9d8191a43d8a579
-
Filesize
1KB
MD54f6b3e8a0ca3a608ebf89fccf149d959
SHA17e611949dcb4581a5b01231d5368047d439d9208
SHA256580a43d57f08203a0a5f51c9cc3da4a2d79d3a75bba7a3ceeaa5f6ee25c1e1a3
SHA51257c9f597e2138e05eb899b2caed20a55a47edd4b5c9be944ab6bb5f4481cd2e763a6aae25a1fea2e404a1e5134a8bbcc3a1a6aec4f622c319beb8d11487771ea
-
Filesize
47KB
MD511b033f096fe729364458aa1e30a40df
SHA1b549780efe751c51494614e18fd3df78c0110baf
SHA2565f0b47715081542bc970fa435de80d5a86001deef06b6ca2a9272a5247333bfd
SHA5124b52e5a5a35f028b34348f2dc816131dcea8836708d6d90a12a6381a0e39a4a2554d85a9581f8d064cc7b7cd5f0998f96e40a5e82aa1715f60f5a992ffd2ba1f
-
Filesize
47KB
MD511b033f096fe729364458aa1e30a40df
SHA1b549780efe751c51494614e18fd3df78c0110baf
SHA2565f0b47715081542bc970fa435de80d5a86001deef06b6ca2a9272a5247333bfd
SHA5124b52e5a5a35f028b34348f2dc816131dcea8836708d6d90a12a6381a0e39a4a2554d85a9581f8d064cc7b7cd5f0998f96e40a5e82aa1715f60f5a992ffd2ba1f