Analysis
-
max time kernel
20s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:10
Behavioral task
behavioral1
Sample
64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exe
Resource
win7-20221111-en
windows7-x64
7 signatures
150 seconds
General
-
Target
64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exe
-
Size
199KB
-
MD5
964065c1a9f017b646a4bd6ab98f03f8
-
SHA1
84d22a0643d84621c5dace86a0f2477c9b051d20
-
SHA256
64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3
-
SHA512
499a8659ba97e418cfb7fa11894a4d79d6f64e83d17ef835c03decdb7c51d3b06101995de474a7b0ab03d82846c721f60e2af0b91614df6b0a6e286a415eb3a7
-
SSDEEP
6144:qOdcQ/5T8HeP83ZmNvczKBXBC0lJqDoSr:qOj/5T8HePyemK1coS
Malware Config
Signatures
-
Processes:
64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exe -
Processes:
64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exe -
Processes:
resource yara_rule behavioral1/memory/2040-54-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2040-55-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Processes:
64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exe -
Processes:
64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exe -
Drops file in System32 directory 1 IoCs
Processes:
64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exedescription ioc process File created C:\Windows\SysWOW64\wimlogom.exe 64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exe"C:\Users\Admin\AppData\Local\Temp\64926ae1050636a4494456351f5ccbb34ac920167095ca55e48b28601628caf3.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in System32 directory
- System policy modification
PID:2040