Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:07
Behavioral task
behavioral1
Sample
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe
Resource
win7-20221111-en
windows7-x64
9 signatures
150 seconds
General
-
Target
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe
-
Size
4.6MB
-
MD5
f743b2ee0e310ccc7f1c9d6a3436c2a5
-
SHA1
288995407093f696edce632dc3bc4e652db2ca93
-
SHA256
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd
-
SHA512
1e7fa7ee487c81ccaeea173125a48c3bb6b2ff15f8e968c9258b98d34aba413f88486d6382ccdb96c8a68b269d6a47ba75f377a79ee7718990e6e9435e76710e
-
SSDEEP
98304:Ehg8lhKl/C0rm1icj78fMhAioQ/GTYcVLV7KwEeFJXVbxL00pDwe9mONwV:Og8lWCX1icISA0fgB7Kqm0meEV
Malware Config
Signatures
-
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Processes:
resource yara_rule behavioral1/memory/1512-56-0x0000000000400000-0x0000000002F5C000-memory.dmp upx behavioral1/memory/1512-58-0x0000000000400000-0x0000000002F5C000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
Processes:
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exedescription ioc process File created C:\Windows\SysWOW64\Temps.exe 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe File opened for modification C:\Windows\SysWOW64\Temps.exe 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe File created C:\WINDOWS\SysWOW64\RGR.SYS 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe -
Drops file in Windows directory 2 IoCs
Processes:
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exedescription ioc process File created C:\windows\WinUpdate.exe 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe File created C:\Windows\Update 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe -
Processes:
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exepid process 1512 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exepid process 1512 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe 1512 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.execmd.exedescription pid process target process PID 1512 wrote to memory of 784 1512 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe cmd.exe PID 1512 wrote to memory of 784 1512 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe cmd.exe PID 1512 wrote to memory of 784 1512 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe cmd.exe PID 1512 wrote to memory of 784 1512 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe cmd.exe PID 784 wrote to memory of 1120 784 cmd.exe reg.exe PID 784 wrote to memory of 1120 784 cmd.exe reg.exe PID 784 wrote to memory of 1120 784 cmd.exe reg.exe PID 784 wrote to memory of 1120 784 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe"C:\Users\Admin\AppData\Local\Temp\7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:1120