Analysis

  • max time kernel
    9s
  • max time network
    18s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 22:33

Errors

Reason
Machine shutdown

General

  • Target

    4a280e67ca75bc6a40955e07ddc640fea21343d773d2819bede257c8b9d88720.exe

  • Size

    720KB

  • MD5

    03431f0754a08d5d258e0ee953d0d760

  • SHA1

    22df5899239d697d64dbdd81ee344ccdb8637da6

  • SHA256

    4a280e67ca75bc6a40955e07ddc640fea21343d773d2819bede257c8b9d88720

  • SHA512

    667e95b49a2c32045ae6d8491413392db98ba6b077ad546507f979ae988b9ac93a9884b3c6fd8f07eec8311e5ad1b4ae45c4d0cd05ee0d8e7a67650f86f99a58

  • SSDEEP

    12288:xhSidauH42shOZrxLmWnI5Oi77u7I02O5lu7I02O5OKXDFc4:xINo49hOZrxLvnIFi7I02b7I02dKXDFp

Score
8/10

Malware Config

Signatures

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Kills process with taskkill 7 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 4 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a280e67ca75bc6a40955e07ddc640fea21343d773d2819bede257c8b9d88720.exe
    "C:\Users\Admin\AppData\Local\Temp\4a280e67ca75bc6a40955e07ddc640fea21343d773d2819bede257c8b9d88720.exe"
    1⤵
    • Disables RegEdit via registry modification
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Windows\SysWOW64\net.exe
      net user Administrator beipandexiachang
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4788
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 user Administrator beipandexiachang
        3⤵
          PID:2848
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im KVXP.kxp
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4596
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im kavsvc.exe
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2412
      • C:\Windows\SysWOW64\net.exe
        net user administrators 123456 /add
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 user administrators 123456 /add
          3⤵
            PID:224
        • C:\Windows\SysWOW64\net.exe
          net user 123456 beipandexiachang /add
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3064
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 user 123456 beipandexiachang /add
            3⤵
              PID:4000
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im Rav.exe
            2⤵
            • Kills process with taskkill
            PID:1308
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im Ravmon.exe
            2⤵
            • Kills process with taskkill
            PID:2428
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im Mcshield.exe
            2⤵
            • Kills process with taskkill
            PID:2928
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im VsTskMgr.exe
            2⤵
            • Kills process with taskkill
            PID:1344
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im 360tray.exe
            2⤵
            • Kills process with taskkill
            PID:952
        • C:\Windows\System32\Upfc.exe
          C:\Windows\System32\Upfc.exe /launchtype periodic /cv 1GorwCxTkUis4q65Fvn6LA.0
          1⤵
            PID:2144
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x4 /state0:0xa39f9855 /state1:0x41c64e6d
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of SetWindowsHookEx
            PID:1176

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads