Analysis

  • max time kernel
    100s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:33

Errors

Reason
Machine shutdown

General

  • Target

    3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe

  • Size

    99KB

  • MD5

    3e431a34f2c09109e47958e6cee614d6

  • SHA1

    f19747f34121b8225b0b508d0d3ba1781772d05a

  • SHA256

    3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848

  • SHA512

    8caf6e1e177db6a1554dae0ad09d44da45a168a2f2fe435f8ddff3c6633967b9a94cf7875dd3728b640851b15132f482b3a118b8db4769a5fb0834021ab8f85c

  • SSDEEP

    3072:gMERCkEVeLZC7tXGZQvGozOVA0PAnrBztx7lDn0K:IEVOC75GyvDzOq8A9zP7pn0K

Malware Config

Signatures

  • UAC bypass 3 TTPs 3 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe
    "C:\Users\Admin\AppData\Local\Temp\3ace460dcf3cbaccc03e32cdd2c8d8f5307c4ab6c08196daf9dc1d816f89d848.exe"
    1⤵
    • UAC bypass
    • Adds policy Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4280
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Adds Run key to start application
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4848
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\SysWOW64\notepad.exe"
        3⤵
          PID:3604
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 708
          3⤵
          • Program crash
          PID:3408
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 732
          3⤵
          • Program crash
          PID:4960
      • C:\Windows\SysWOW64\calc.exe
        "C:\Windows\SysWOW64\calc.exe"
        2⤵
          PID:240
        • C:\Program Files (x86)\Windows Media Player\wmprph.exe
          "C:\Program Files (x86)\Windows Media Player\wmprph.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3732
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4848 -ip 4848
        1⤵
          PID:2000
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x4 /state0:0xa399f855 /state1:0x41c64e6d
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:1516
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4848 -ip 4848
          1⤵
            PID:3880

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/0-145-0x0000000000400000-0x000000000044E000-memory.dmp

            Filesize

            312KB

          • memory/240-137-0x0000000000000000-mapping.dmp

          • memory/3604-142-0x0000000000600000-0x0000000000629000-memory.dmp

            Filesize

            164KB

          • memory/3604-147-0x0000000000600000-0x0000000000629000-memory.dmp

            Filesize

            164KB

          • memory/3604-144-0x0000000000600000-0x0000000000629000-memory.dmp

            Filesize

            164KB

          • memory/3604-143-0x0000000000600000-0x0000000000629000-memory.dmp

            Filesize

            164KB

          • memory/3604-140-0x0000000000000000-mapping.dmp

          • memory/3604-141-0x0000000000600000-0x0000000000629000-memory.dmp

            Filesize

            164KB

          • memory/3732-146-0x0000000000000000-mapping.dmp

          • memory/3732-148-0x0000000000BA0000-0x0000000000BC9000-memory.dmp

            Filesize

            164KB

          • memory/4280-138-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/4280-132-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/4280-133-0x00000000025C0000-0x00000000025D6000-memory.dmp

            Filesize

            88KB

          • memory/4280-149-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/4280-150-0x00000000025C0000-0x00000000025D6000-memory.dmp

            Filesize

            88KB

          • memory/4848-139-0x00000000006C0000-0x00000000006E9000-memory.dmp

            Filesize

            164KB

          • memory/4848-136-0x0000000000000000-mapping.dmp

          • memory/4848-151-0x00000000006C0000-0x00000000006E9000-memory.dmp

            Filesize

            164KB