Analysis
-
max time kernel
128s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe
Resource
win7-20220901-en
9 signatures
150 seconds
General
-
Target
e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe
-
Size
40KB
-
MD5
0e011238373522fe3b7f76b5a5cd27d4
-
SHA1
4f0671ec0cc8c5d23aa74d281e4160ba97504ae5
-
SHA256
e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc
-
SHA512
58f4d4bf802fb3bc83b0edb5d6b2f93733266d5eec61a4281179b09daef58718f44240daf0be6756f7c16b08d7fabfd77c946e98d76f070ae6a417f2aad7f62e
-
SSDEEP
768:yUzeOjc8slpz2MsIDp3xLJGRGXgiE9gWPjYD:rRjcJx1G8QtVsD
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2784 netsh.exe -
Stops running service(s) 3 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4992 sc.exe 4912 sc.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2784 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 78 PID 2288 wrote to memory of 2784 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 78 PID 2288 wrote to memory of 2784 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 78 PID 2288 wrote to memory of 4332 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 80 PID 2288 wrote to memory of 4332 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 80 PID 2288 wrote to memory of 4332 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 80 PID 2288 wrote to memory of 932 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 81 PID 2288 wrote to memory of 932 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 81 PID 2288 wrote to memory of 932 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 81 PID 2288 wrote to memory of 4992 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 84 PID 2288 wrote to memory of 4992 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 84 PID 2288 wrote to memory of 4992 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 84 PID 2288 wrote to memory of 4912 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 86 PID 2288 wrote to memory of 4912 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 86 PID 2288 wrote to memory of 4912 2288 e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe 86 PID 932 wrote to memory of 1636 932 net.exe 89 PID 932 wrote to memory of 1636 932 net.exe 89 PID 932 wrote to memory of 1636 932 net.exe 89 PID 4332 wrote to memory of 3532 4332 net.exe 88 PID 4332 wrote to memory of 3532 4332 net.exe 88 PID 4332 wrote to memory of 3532 4332 net.exe 88 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe"C:\Users\Admin\AppData\Local\Temp\e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2288 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable2⤵
- Modifies Windows Firewall
PID:2784
-
-
C:\Windows\SysWOW64\net.exenet stop security center2⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop security center3⤵PID:3532
-
-
-
C:\Windows\SysWOW64\net.exenet stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend3⤵PID:1636
-
-
-
C:\Windows\SysWOW64\sc.exesc stop SharedAccess2⤵
- Launches sc.exe
PID:4992
-
-
C:\Windows\SysWOW64\sc.exesc DELETE SharedAccess2⤵
- Launches sc.exe
PID:4912
-