Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:49
Static task
static1
Behavioral task
behavioral1
Sample
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe
Resource
win10v2004-20221111-en
General
-
Target
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe
-
Size
550KB
-
MD5
7e3a1ae9ce4c8971933e5f16ad58df02
-
SHA1
0cf6ad94c3e739696826b57b55e70b55b2a6d5ec
-
SHA256
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac
-
SHA512
407ee9095273f61d61361f0475be4ae9ed5c69154fef00be6b18d419fbed644c07d051a62c9d8b797c9bd059636df9de5a44e8607dc8fb4059901d9ee48136a8
-
SSDEEP
6144:pBG8ZoIbalOX5ZyEWwRnJNGn84AgI8rlzM2YsCkbZRiY1VGpzlb91mzR:RZo/O/51a8VgIwzM2jCkbzP14PGz
Malware Config
Signatures
-
Processes:
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe -
Processes:
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe -
Disables taskbar notifications via registry modification
-
Processes:
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\DisableAntiSpyware = "1" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\43469812FB1959900000434654D15E48 = "C:\\ProgramData\\43469812FB1959900000434654D15E48\\43469812FB1959900000434654D15E48.exe" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe -
Processes:
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exepid process 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exepid process 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exepid process 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exepid process 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe 992 e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe"C:\Users\Admin\AppData\Local\Temp\e6d31067e6f6c2f0f250e081e73018ba07a7542288f8c0ed4f7075d6b21132ac.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:992