Analysis
-
max time kernel
39s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-10-2022 20:35
Behavioral task
behavioral1
Sample
8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe
Resource
win7-20220812-en
General
-
Target
8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe
-
Size
15KB
-
MD5
e1307845110562239b94640d08755fbf
-
SHA1
c6452c0d8a7138f37e1d97bd827c9f0da4a09582
-
SHA256
8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79
-
SHA512
b298a164acc14cd2a98861ae25005541c166955fdf02fa0ba1ddfcbac4592dd2e4be3df000d3ce23df99b50029c227295814ec26c65fcc47bbc640d99a7c52ee
-
SSDEEP
384:YXMRDbYNp5T83uXkao2mq+VANj3O8q3Ltln8ka+0PlRcli:l1bYNT83uXka+VANj+3xlnLP0PMl
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 1020 k4.exe 1556 k4.exe 1020 k4.exe 1556 k4.exe -
resource yara_rule behavioral1/memory/1424-55-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1424-55-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 1556 k4.exe Token: SeLoadDriverPrivilege 1556 k4.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1020 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 28 PID 1424 wrote to memory of 1020 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 28 PID 1424 wrote to memory of 1020 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 28 PID 1424 wrote to memory of 1020 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 28 PID 1424 wrote to memory of 1556 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 29 PID 1424 wrote to memory of 1556 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 29 PID 1424 wrote to memory of 1556 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 29 PID 1424 wrote to memory of 1556 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 29 PID 1424 wrote to memory of 1020 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 58 PID 1424 wrote to memory of 1020 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 58 PID 1424 wrote to memory of 1020 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 58 PID 1424 wrote to memory of 1020 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 58 PID 1424 wrote to memory of 1556 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 59 PID 1424 wrote to memory of 1556 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 59 PID 1424 wrote to memory of 1556 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 59 PID 1424 wrote to memory of 1556 1424 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe 59 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe"C:\Users\Admin\AppData\Local\Temp\8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1424 -
C:\Users\Public\Documents\k4.exeC:/Users/Public/Documents/k4.exe2⤵
- Executes dropped EXE
PID:1020
-
-
C:\Users\Public\Documents\k4.exeC:/Users/Public/Documents/k4.exe /D2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /t /im k4.exe2⤵PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe"C:\Users\Admin\AppData\Local\Temp\8dba90b3c3a6aa0910626ec52d76104895da7591f8b9e04a67392a179f67eb79.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1424 -
C:\Users\Public\Documents\k4.exeC:/Users/Public/Documents/k4.exe2⤵
- Executes dropped EXE
PID:1020
-
-
C:\Users\Public\Documents\k4.exeC:/Users/Public/Documents/k4.exe /D2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /t /im k4.exe2⤵PID:1508
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
1.1MB
MD5d476c88087a2ca24d7e4d4b03dd83992
SHA1e71ea8ca8a34fbc711593b156445717f77b0fb17
SHA256130d3f07cad864d90ca717b22da75f19fd4c712cabdbf1b511c591f1097af0b8
SHA5120ed1a276a4c0f2b9e6017d439e28c608d50cf8971c85954bf9b730815c478e2fec1c0368acc7f6f1f924d297c6242087b74093a23026ad836734ce311cafafca
-
Filesize
1.1MB
MD5d476c88087a2ca24d7e4d4b03dd83992
SHA1e71ea8ca8a34fbc711593b156445717f77b0fb17
SHA256130d3f07cad864d90ca717b22da75f19fd4c712cabdbf1b511c591f1097af0b8
SHA5120ed1a276a4c0f2b9e6017d439e28c608d50cf8971c85954bf9b730815c478e2fec1c0368acc7f6f1f924d297c6242087b74093a23026ad836734ce311cafafca
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93
-
Filesize
892KB
MD533e29221e2825001d32f78632217d250
SHA19122127fc91790a1edb78003e9b58a9b00355ed5
SHA25665d0b20a4dc4911fbb91683eb6488d3d3493fa4584bbdfb4e942f203bef0030d
SHA51201d5c6ded3a83d81371e94fefb1debabb1d003c86ab3cf7145d28fb15fcfd4f8b763f6711f99c5afd9bf90f02a7af993efa5945d4f8bb6a3649b5fd86414ae93