Analysis
-
max time kernel
167s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 06:53
Behavioral task
behavioral1
Sample
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe
Resource
win10v2004-20221111-en
General
-
Target
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe
-
Size
380KB
-
MD5
91dc7d7c0608c2e76a59704c7ad83b7c
-
SHA1
9fe75c22fef8caa144765406df4a83d279290c4e
-
SHA256
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26
-
SHA512
b9763fabd191e9690fa84883ce0fdce7748c6b6f1981ae761cd978d6253e8af6cfe40fe9ae7636757591332e208b1e0ba5f077fa5b789c71f946d46fbb4a7e02
-
SSDEEP
6144:Uzv+kSZBbdH19ex4T02J4fqz22tvymTiB62iKnWKKmDTcNwjreOwI+Tm1T8vbp:UzcRD02J4Sq2vHGB67KWKKmDWKSp
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe" aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
Processes:
resource yara_rule behavioral2/memory/2436-132-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2436-137-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/2436-137-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 4892 taskkill.exe 3712 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exepid process 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exepid process 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
taskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 3712 taskkill.exe Token: SeDebugPrivilege 4892 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exepid process 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.execmd.execmd.exedescription pid process target process PID 2436 wrote to memory of 208 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 2436 wrote to memory of 208 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 2436 wrote to memory of 208 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 208 wrote to memory of 3712 208 cmd.exe taskkill.exe PID 208 wrote to memory of 3712 208 cmd.exe taskkill.exe PID 208 wrote to memory of 3712 208 cmd.exe taskkill.exe PID 2436 wrote to memory of 1404 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 2436 wrote to memory of 1404 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 2436 wrote to memory of 1404 2436 aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe cmd.exe PID 1404 wrote to memory of 4892 1404 cmd.exe taskkill.exe PID 1404 wrote to memory of 4892 1404 cmd.exe taskkill.exe PID 1404 wrote to memory of 4892 1404 cmd.exe taskkill.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoViewContextMenu = "1" aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe"C:\Users\Admin\AppData\Local\Temp\aa7a2ca6699a022ec1b964aff1916051447403df3a818fd6b246256b5c99ac26.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4892