Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:08
Static task
static1
Behavioral task
behavioral1
Sample
63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe
Resource
win10v2004-20220812-en
General
-
Target
63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe
-
Size
4.4MB
-
MD5
2ab405c0e1a9dd350cbc1493f292e1e3
-
SHA1
dbda5a6cd08197da7611797f80a19965e8b58b2d
-
SHA256
63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5
-
SHA512
e8305eb7e0614e14330d86371a637f984f92537f7fadef8a2a0d42749a03c7da7ec3e4c2b65330df2601bec23e9de9c71f38c99db3a1d068d98a7b8b143096e9
-
SSDEEP
98304:wmzbauQbhI5m0yR1qZiB5CFFxsyHL3hpPf7MZjkklsCJ:BatbhI5m0yiFyGLr37Gjk4J
Malware Config
Signatures
-
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\System32\\avg.exe" 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe -
Drops file in System32 directory 2 IoCs
Processes:
63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exedescription ioc process File created C:\WINDOWS\SysWOW64\DNT.SYS 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe File created C:\Windows\SysWOW64\avg.exe 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1176 1752 WerFault.exe 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exepid process 1752 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe 1752 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.execmd.exedescription pid process target process PID 1752 wrote to memory of 1544 1752 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe cmd.exe PID 1752 wrote to memory of 1544 1752 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe cmd.exe PID 1752 wrote to memory of 1544 1752 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe cmd.exe PID 1752 wrote to memory of 1544 1752 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe cmd.exe PID 1544 wrote to memory of 468 1544 cmd.exe reg.exe PID 1544 wrote to memory of 468 1544 cmd.exe reg.exe PID 1544 wrote to memory of 468 1544 cmd.exe reg.exe PID 1544 wrote to memory of 468 1544 cmd.exe reg.exe PID 1752 wrote to memory of 1176 1752 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe WerFault.exe PID 1752 wrote to memory of 1176 1752 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe WerFault.exe PID 1752 wrote to memory of 1176 1752 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe WerFault.exe PID 1752 wrote to memory of 1176 1752 63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe"C:\Users\Admin\AppData\Local\Temp\63fb4a422c9fbcd312706a7f1dfe3ba2bc538a9a2d7757cdc95f8780289ce2f5.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 5762⤵
- Program crash
PID:1176