Analysis
-
max time kernel
100s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:33
Static task
static1
Behavioral task
behavioral1
Sample
3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe
Resource
win10v2004-20221111-en
Errors
General
-
Target
3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe
-
Size
99KB
-
MD5
3e431a34f2c09109e47958e6cee614d6
-
SHA1
f19747f34121b8225b0b508d0d3ba1781772d05a
-
SHA256
3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848
-
SHA512
8caf6e1e177db6a1554dae0ad09d44da45a168a2f2fe435f8ddff3c6633967b9a94cf7875dd3728b640851b15132f482b3a118b8db4769a5fb0834021ab8f85c
-
SSDEEP
3072:gMERCkEVeLZC7tXGZQvGozOVA0PAnrBztx7lDn0K:IEVOC75GyvDzOq8A9zP7pn0K
Malware Config
Signatures
-
Processes:
3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "1" 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Roaming\\Identities\\rupjk\\rupjk.exe\" -shell" 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe -
Processes:
3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exedescription ioc process File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\E: svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exedescription pid process PID 4280 set thread context of 0 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3408 4848 WerFault.exe svchost.exe 4960 4848 WerFault.exe svchost.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "58" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
svchost.exewmprph.exepid process 4848 svchost.exe 4848 svchost.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe 3732 wmprph.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
svchost.exepid process 4848 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exedescription pid process Token: SeShutdownPrivilege 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe Token: SeShutdownPrivilege 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe Token: SeDebugPrivilege 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 1516 LogonUI.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exesvchost.exedescription pid process target process PID 4280 wrote to memory of 4848 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe svchost.exe PID 4280 wrote to memory of 4848 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe svchost.exe PID 4280 wrote to memory of 4848 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe svchost.exe PID 4280 wrote to memory of 4848 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe svchost.exe PID 4280 wrote to memory of 240 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe calc.exe PID 4280 wrote to memory of 240 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe calc.exe PID 4280 wrote to memory of 240 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe calc.exe PID 4280 wrote to memory of 240 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe calc.exe PID 4280 wrote to memory of 240 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe calc.exe PID 4848 wrote to memory of 3604 4848 svchost.exe notepad.exe PID 4848 wrote to memory of 3604 4848 svchost.exe notepad.exe PID 4848 wrote to memory of 3604 4848 svchost.exe notepad.exe PID 4848 wrote to memory of 3604 4848 svchost.exe notepad.exe PID 4280 wrote to memory of 3732 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe wmprph.exe PID 4280 wrote to memory of 3732 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe wmprph.exe PID 4280 wrote to memory of 3732 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe wmprph.exe PID 4280 wrote to memory of 3732 4280 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe wmprph.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "1" 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe"C:\Users\Admin\AppData\Local\Temp\3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe"1⤵
- UAC bypass
- Adds policy Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4280 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"3⤵PID:3604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 7083⤵
- Program crash
PID:3408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 7323⤵
- Program crash
PID:4960 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"2⤵PID:240
-
C:\Program Files (x86)\Windows Media Player\wmprph.exe"C:\Program Files (x86)\Windows Media Player\wmprph.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4848 -ip 48481⤵PID:2000
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa399f855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4848 -ip 48481⤵PID:3880