Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe
Resource
win7-20220812-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe
Resource
win10v2004-20220812-en
9 signatures
150 seconds
General
-
Target
2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe
-
Size
528KB
-
MD5
96ee219c30acb41da939f2fa7bfe43d7
-
SHA1
a9dd48a08146545e6a6fd3daf7bf20100244c04a
-
SHA256
2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95
-
SHA512
16da755bdda47f2e8c4e5b86fe2cd5d623652f1c129ed1c5fb688257a9b718f729511350a1a3026c8315e7d6f9a4ab88018c91f150709ce4ab3edd9dc50f8c89
-
SSDEEP
12288:O1T9O/qYv8/iWlq0bZBZsI+oG1KsFXyeIeoUX:Ak0bNs9FtyeI+X
Score
10/10
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\beard.exe = "C:\\Users\\Admin\\AppData\\Roaming\\beard.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\beard.exe" 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBDD63AA-FDCB-BCF4-5BEE-DFF4C9A39E24} 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBDD63AA-FDCB-BCF4-5BEE-DFF4C9A39E24}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\beard.exe" 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{EBDD63AA-FDCB-BCF4-5BEE-DFF4C9A39E24} 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Active Setup\Installed Components\{EBDD63AA-FDCB-BCF4-5BEE-DFF4C9A39E24}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\beard.exe" 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\beard.exe" 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\beard.exe" 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1360 set thread context of 1784 1360 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 28 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 676 reg.exe 436 reg.exe 308 reg.exe 472 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeCreateTokenPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeAssignPrimaryTokenPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeLockMemoryPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeIncreaseQuotaPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeMachineAccountPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeTcbPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeSecurityPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeTakeOwnershipPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeLoadDriverPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeSystemProfilePrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeSystemtimePrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeProfSingleProcessPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeIncBasePriorityPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeCreatePagefilePrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeCreatePermanentPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeBackupPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeRestorePrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeShutdownPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeDebugPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeAuditPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeSystemEnvironmentPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeChangeNotifyPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeRemoteShutdownPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeUndockPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeSyncAgentPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeEnableDelegationPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeManageVolumePrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeImpersonatePrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: SeCreateGlobalPrivilege 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: 31 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: 32 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: 33 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: 34 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe Token: 35 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1360 wrote to memory of 1784 1360 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 28 PID 1360 wrote to memory of 1784 1360 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 28 PID 1360 wrote to memory of 1784 1360 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 28 PID 1360 wrote to memory of 1784 1360 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 28 PID 1360 wrote to memory of 1784 1360 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 28 PID 1360 wrote to memory of 1784 1360 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 28 PID 1360 wrote to memory of 1784 1360 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 28 PID 1360 wrote to memory of 1784 1360 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 28 PID 1784 wrote to memory of 872 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 29 PID 1784 wrote to memory of 872 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 29 PID 1784 wrote to memory of 872 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 29 PID 1784 wrote to memory of 872 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 29 PID 1784 wrote to memory of 1336 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 31 PID 1784 wrote to memory of 1336 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 31 PID 1784 wrote to memory of 1336 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 31 PID 1784 wrote to memory of 1336 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 31 PID 1784 wrote to memory of 1588 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 32 PID 1784 wrote to memory of 1588 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 32 PID 1784 wrote to memory of 1588 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 32 PID 1784 wrote to memory of 1588 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 32 PID 1784 wrote to memory of 1296 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 33 PID 1784 wrote to memory of 1296 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 33 PID 1784 wrote to memory of 1296 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 33 PID 1784 wrote to memory of 1296 1784 2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe 33 PID 1336 wrote to memory of 676 1336 cmd.exe 38 PID 1336 wrote to memory of 676 1336 cmd.exe 38 PID 1336 wrote to memory of 676 1336 cmd.exe 38 PID 1336 wrote to memory of 676 1336 cmd.exe 38 PID 1296 wrote to memory of 472 1296 cmd.exe 37 PID 1296 wrote to memory of 472 1296 cmd.exe 37 PID 1296 wrote to memory of 472 1296 cmd.exe 37 PID 1296 wrote to memory of 472 1296 cmd.exe 37 PID 872 wrote to memory of 436 872 cmd.exe 39 PID 872 wrote to memory of 436 872 cmd.exe 39 PID 872 wrote to memory of 436 872 cmd.exe 39 PID 872 wrote to memory of 436 872 cmd.exe 39 PID 1588 wrote to memory of 308 1588 cmd.exe 40 PID 1588 wrote to memory of 308 1588 cmd.exe 40 PID 1588 wrote to memory of 308 1588 cmd.exe 40 PID 1588 wrote to memory of 308 1588 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe"C:\Users\Admin\AppData\Local\Temp\2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe"C:\Users\Admin\AppData\Local\Temp\2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:436
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\2ffa1af8277595a131b42550440d01a95b1077895f9ecd17ebbe06e46a715a95.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:308
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\beard.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\beard.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\beard.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\beard.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:472
-
-
-