Analysis
-
max time kernel
93s -
max time network
30s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 01:50
Behavioral task
behavioral1
Sample
b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe
Resource
win10v2004-20220812-en
General
-
Target
b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe
-
Size
1.9MB
-
MD5
f5c0c342b795ab8192d6e99c8453dfef
-
SHA1
ebfeac259fcbc1b29104556bb67ca6ed23700476
-
SHA256
b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c
-
SHA512
7541eead9180bf49f4823d31691e1d35ce2fd1c653a93b837d055aff66e88ae113437c0923f1cff748128a2b3b93688e3b8be09918391a3ede316df959fada15
-
SSDEEP
24576:khx6huTVkCjmzNccCyxNG/l6rMb745Qxinukr9ZaNMtpuMmlEGC6OCu5D0DDmNLX:kTnmTzNHNG/30tTtsM+1OCu5DEDmNLeG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE -
resource yara_rule behavioral2/memory/2920-133-0x0000000000400000-0x0000000000759000-memory.dmp upx behavioral2/memory/2920-139-0x0000000000400000-0x0000000000759000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicrosoftUpdate = "C:\\Windows\\System32\\mscvin.exe" b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mscvin.exe b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE File opened for modification C:\Windows\SysWOW64\mscvin.exe b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2920 set thread context of 2040 2920 b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe 25 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 2040 b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2920 b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe 2040 b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE 2040 b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2040 2920 b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe 25 PID 2920 wrote to memory of 2040 2920 b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe 25 PID 2920 wrote to memory of 2040 2920 b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe 25 PID 2920 wrote to memory of 2040 2920 b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe 25 PID 2920 wrote to memory of 2040 2920 b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe 25 PID 2920 wrote to memory of 2040 2920 b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe 25 PID 2920 wrote to memory of 2040 2920 b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe 25 PID 2920 wrote to memory of 2040 2920 b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe 25 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe"C:\Users\Admin\AppData\Local\Temp\b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE"C:\Users\Admin\AppData\Local\Temp\b6010aaa8482525d26b5df031b4061b12ec528197b99f23aae4d5c085e1e5b4c.EXE"2⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2040
-