Analysis
-
max time kernel
189s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:07
Behavioral task
behavioral1
Sample
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe
Resource
win7-20221111-en
windows7-x64
9 signatures
150 seconds
General
-
Target
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe
-
Size
4.6MB
-
MD5
f743b2ee0e310ccc7f1c9d6a3436c2a5
-
SHA1
288995407093f696edce632dc3bc4e652db2ca93
-
SHA256
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd
-
SHA512
1e7fa7ee487c81ccaeea173125a48c3bb6b2ff15f8e968c9258b98d34aba413f88486d6382ccdb96c8a68b269d6a47ba75f377a79ee7718990e6e9435e76710e
-
SSDEEP
98304:Ehg8lhKl/C0rm1icj78fMhAioQ/GTYcVLV7KwEeFJXVbxL00pDwe9mONwV:Og8lWCX1icISA0fgB7Kqm0meEV
Malware Config
Signatures
-
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Processes:
resource yara_rule behavioral2/memory/4524-132-0x0000000000400000-0x0000000002F5C000-memory.dmp upx behavioral2/memory/4524-133-0x0000000000400000-0x0000000002F5C000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
Processes:
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exedescription ioc process File created C:\WINDOWS\SysWOW64\RGR.SYS 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe File created C:\Windows\SysWOW64\Temps.exe 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe File opened for modification C:\Windows\SysWOW64\Temps.exe 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe -
Drops file in Windows directory 2 IoCs
Processes:
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exedescription ioc process File created C:\windows\WinUpdate.exe 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe File created C:\Windows\Update 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exepid process 4524 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exepid process 4524 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe 4524 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.execmd.exedescription pid process target process PID 4524 wrote to memory of 2436 4524 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe cmd.exe PID 4524 wrote to memory of 2436 4524 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe cmd.exe PID 4524 wrote to memory of 2436 4524 7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe cmd.exe PID 2436 wrote to memory of 4988 2436 cmd.exe reg.exe PID 2436 wrote to memory of 4988 2436 cmd.exe reg.exe PID 2436 wrote to memory of 4988 2436 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe"C:\Users\Admin\AppData\Local\Temp\7eff2e2e5ba9d270bc758025c8d3e8b4b12dda5edae6b3101af57afd12afc5cd.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:4988