Analysis

  • max time kernel
    128s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 00:58

General

  • Target

    e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe

  • Size

    40KB

  • MD5

    0e011238373522fe3b7f76b5a5cd27d4

  • SHA1

    4f0671ec0cc8c5d23aa74d281e4160ba97504ae5

  • SHA256

    e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc

  • SHA512

    58f4d4bf802fb3bc83b0edb5d6b2f93733266d5eec61a4281179b09daef58718f44240daf0be6756f7c16b08d7fabfd77c946e98d76f070ae6a417f2aad7f62e

  • SSDEEP

    768:yUzeOjc8slpz2MsIDp3xLJGRGXgiE9gWPjYD:rRjcJx1G8QtVsD

Score
10/10

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe
    "C:\Users\Admin\AppData\Local\Temp\e7d33deff34583feed9eef84804aff0d7a5cc4c51a3f59f11f0edd9bf1190cbc.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2288
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall set opmode disable
      2⤵
      • Modifies Windows Firewall
      PID:2784
    • C:\Windows\SysWOW64\net.exe
      net stop security center
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4332
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop security center
        3⤵
          PID:3532
      • C:\Windows\SysWOW64\net.exe
        net stop WinDefend
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:932
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop WinDefend
          3⤵
            PID:1636
        • C:\Windows\SysWOW64\sc.exe
          sc stop SharedAccess
          2⤵
          • Launches sc.exe
          PID:4992
        • C:\Windows\SysWOW64\sc.exe
          sc DELETE SharedAccess
          2⤵
          • Launches sc.exe
          PID:4912

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads