Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 06:29
Static task
static1
Behavioral task
behavioral1
Sample
e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe
Resource
win7-20220901-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe
-
Size
528KB
-
MD5
2c01bfaae19e3ca6e91382b9a0271c75
-
SHA1
640d1535c6816cfc098964cecd1ab36567b3fe0a
-
SHA256
e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349
-
SHA512
b2d7a533f2ad0372bcc3c1443377721110bff8e23a6d2266d693a9fc4c1e41b805fdafeb32701f1eb261564a750e2ebe15b47a745e394178222a1311f4eeb853
-
SSDEEP
12288:O1T9O/qYv8/iWlq0bZBZsI+oG1KsFXyeIeoU7:Ak0bNs9FtyeI+7
Score
10/10
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\beard.exe = "C:\\Users\\Admin\\AppData\\Roaming\\beard.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\beard.exe" e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EBDD63AA-FDCB-BCF4-5BEE-DFF4C9A39E24} e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EBDD63AA-FDCB-BCF4-5BEE-DFF4C9A39E24}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\beard.exe" e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{EBDD63AA-FDCB-BCF4-5BEE-DFF4C9A39E24} e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{EBDD63AA-FDCB-BCF4-5BEE-DFF4C9A39E24}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\beard.exe" e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\beard.exe" e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\beard.exe" e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 728 set thread context of 4960 728 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 80 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 5076 reg.exe 4556 reg.exe 2324 reg.exe 2060 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeCreateTokenPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeAssignPrimaryTokenPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeLockMemoryPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeIncreaseQuotaPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeMachineAccountPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeTcbPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeSecurityPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeTakeOwnershipPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeLoadDriverPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeSystemProfilePrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeSystemtimePrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeProfSingleProcessPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeIncBasePriorityPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeCreatePagefilePrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeCreatePermanentPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeBackupPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeRestorePrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeShutdownPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeDebugPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeAuditPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeSystemEnvironmentPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeChangeNotifyPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeRemoteShutdownPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeUndockPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeSyncAgentPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeEnableDelegationPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeManageVolumePrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeImpersonatePrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: SeCreateGlobalPrivilege 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: 31 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: 32 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: 33 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: 34 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe Token: 35 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 728 wrote to memory of 4960 728 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 80 PID 728 wrote to memory of 4960 728 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 80 PID 728 wrote to memory of 4960 728 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 80 PID 728 wrote to memory of 4960 728 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 80 PID 728 wrote to memory of 4960 728 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 80 PID 728 wrote to memory of 4960 728 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 80 PID 728 wrote to memory of 4960 728 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 80 PID 728 wrote to memory of 4960 728 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 80 PID 4960 wrote to memory of 4904 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 81 PID 4960 wrote to memory of 4904 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 81 PID 4960 wrote to memory of 4904 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 81 PID 4960 wrote to memory of 3292 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 82 PID 4960 wrote to memory of 3292 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 82 PID 4960 wrote to memory of 3292 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 82 PID 4960 wrote to memory of 4932 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 85 PID 4960 wrote to memory of 4932 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 85 PID 4960 wrote to memory of 4932 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 85 PID 4960 wrote to memory of 4540 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 87 PID 4960 wrote to memory of 4540 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 87 PID 4960 wrote to memory of 4540 4960 e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe 87 PID 4904 wrote to memory of 5076 4904 cmd.exe 89 PID 4904 wrote to memory of 5076 4904 cmd.exe 89 PID 4904 wrote to memory of 5076 4904 cmd.exe 89 PID 3292 wrote to memory of 4556 3292 cmd.exe 90 PID 3292 wrote to memory of 4556 3292 cmd.exe 90 PID 3292 wrote to memory of 4556 3292 cmd.exe 90 PID 4932 wrote to memory of 2060 4932 cmd.exe 92 PID 4932 wrote to memory of 2060 4932 cmd.exe 92 PID 4932 wrote to memory of 2060 4932 cmd.exe 92 PID 4540 wrote to memory of 2324 4540 cmd.exe 91 PID 4540 wrote to memory of 2324 4540 cmd.exe 91 PID 4540 wrote to memory of 2324 4540 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe"C:\Users\Admin\AppData\Local\Temp\e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Users\Admin\AppData\Local\Temp\e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe"C:\Users\Admin\AppData\Local\Temp\e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:5076
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\e36a2257035f6cf81bc898fcc51f71166f681fe584bddf5380fbcd1dca583349.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:4556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\beard.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\beard.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\beard.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\beard.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:2324
-
-
-