Analysis
-
max time kernel
157s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 08:50
Static task
static1
Behavioral task
behavioral1
Sample
f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe
Resource
win10v2004-20220812-en
General
-
Target
f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe
-
Size
136KB
-
MD5
fb9e829aa297d5563b52bd4c23cea20f
-
SHA1
507722663b4c12ea7749b50fe59bc53b0fbc74a1
-
SHA256
f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
-
SHA512
cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
SSDEEP
3072:4HXJr2sw7dtCkGdDYjWL1/jfAv6z1GUOH1wSMBGEbBsM27Pf:4HXh2sw7dtCkdwXz1G3HbB7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win32Runtime.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" win32Runtime.exe -
Executes dropped EXE 5 IoCs
pid Process 3724 win32Runtime.exe 3184 rundlll.exe 1520 AvProtector.exe 3156 scvhost.exe 3916 rundlll.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 3588 netsh.exe 1420 netsh.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\*win32Runtime = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32Runtime.exe\"" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\RunServices f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\win32Runtime = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32Runtime.exe\"" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\win32Runtime = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32Runtime.exe\"" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\*win32Runtime = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32Runtime.exe\"" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\win32Runtime = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32Runtime.exe\"" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\win32Runtime = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32Runtime.exe\"" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win32Runtime.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\win.ini f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe File opened for modification C:\Windows\system.ini f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 3724 win32Runtime.exe 3724 win32Runtime.exe 3724 win32Runtime.exe 3724 win32Runtime.exe 3724 win32Runtime.exe 3724 win32Runtime.exe 3184 rundlll.exe 3184 rundlll.exe 3184 rundlll.exe 3184 rundlll.exe 3184 rundlll.exe 3184 rundlll.exe 3184 rundlll.exe 3184 rundlll.exe 1520 AvProtector.exe 1520 AvProtector.exe 1520 AvProtector.exe 1520 AvProtector.exe 1520 AvProtector.exe 1520 AvProtector.exe 1520 AvProtector.exe 1520 AvProtector.exe 3184 rundlll.exe 3184 rundlll.exe 3184 rundlll.exe 3184 rundlll.exe 3156 scvhost.exe 3156 scvhost.exe 3156 scvhost.exe 3156 scvhost.exe 3156 scvhost.exe 3156 scvhost.exe 3156 scvhost.exe 3156 scvhost.exe 1520 AvProtector.exe 1520 AvProtector.exe 1520 AvProtector.exe 1520 AvProtector.exe 3156 scvhost.exe 3156 scvhost.exe 3156 scvhost.exe 3156 scvhost.exe 3184 rundlll.exe 3184 rundlll.exe 3184 rundlll.exe 3184 rundlll.exe 1520 AvProtector.exe 1520 AvProtector.exe 1520 AvProtector.exe 1520 AvProtector.exe 3156 scvhost.exe 3156 scvhost.exe 3156 scvhost.exe 3156 scvhost.exe 3184 rundlll.exe 3184 rundlll.exe 3184 rundlll.exe 3184 rundlll.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4948 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 83 PID 4796 wrote to memory of 4948 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 83 PID 4796 wrote to memory of 4948 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 83 PID 4948 wrote to memory of 1420 4948 cmd.exe 84 PID 4948 wrote to memory of 1420 4948 cmd.exe 84 PID 4948 wrote to memory of 1420 4948 cmd.exe 84 PID 4796 wrote to memory of 3724 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 85 PID 4796 wrote to memory of 3724 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 85 PID 4796 wrote to memory of 3724 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 85 PID 4796 wrote to memory of 3184 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 86 PID 4796 wrote to memory of 3184 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 86 PID 4796 wrote to memory of 3184 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 86 PID 4796 wrote to memory of 1520 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 87 PID 4796 wrote to memory of 1520 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 87 PID 4796 wrote to memory of 1520 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 87 PID 4796 wrote to memory of 3156 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 88 PID 4796 wrote to memory of 3156 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 88 PID 4796 wrote to memory of 3156 4796 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 88 PID 3724 wrote to memory of 3916 3724 win32Runtime.exe 91 PID 3724 wrote to memory of 3916 3724 win32Runtime.exe 91 PID 3724 wrote to memory of 3916 3724 win32Runtime.exe 91 PID 3724 wrote to memory of 3684 3724 win32Runtime.exe 92 PID 3724 wrote to memory of 3684 3724 win32Runtime.exe 92 PID 3724 wrote to memory of 3684 3724 win32Runtime.exe 92 PID 3684 wrote to memory of 3588 3684 cmd.exe 93 PID 3684 wrote to memory of 3588 3684 cmd.exe 93 PID 3684 wrote to memory of 3588 3684 cmd.exe 93 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System win32Runtime.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win32Runtime.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" win32Runtime.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe"C:\Users\Admin\AppData\Local\Temp\f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe"1⤵
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall set opmode mode=disable profile=all2⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable profile=all3⤵
- Modifies Windows Firewall
PID:1420
-
-
-
C:\Users\Admin\AppData\Roaming\win32Runtime.exe"C:\Users\Admin\AppData\Roaming\win32Runtime.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3724 -
C:\Users\Admin\AppData\Roaming\rundlll.exe"C:\Users\Admin\AppData\Roaming\rundlll.exe"3⤵
- Executes dropped EXE
PID:3916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall set opmode mode=disable profile=all3⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable profile=all4⤵
- Modifies Windows Firewall
PID:3588
-
-
-
-
C:\Users\Admin\AppData\Roaming\rundlll.exe"C:\Users\Admin\AppData\Roaming\rundlll.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Users\Admin\AppData\Roaming\AvProtector.exe"C:\Users\Admin\AppData\Roaming\AvProtector.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Users\Admin\AppData\Roaming\scvhost.exe"C:\Users\Admin\AppData\Roaming\scvhost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae