Analysis
-
max time kernel
150s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 19:35
Static task
static1
Behavioral task
behavioral1
Sample
c744ae35396ad2508891af93325e347ffb1d11537127986faa4f8e995c2a9e7e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c744ae35396ad2508891af93325e347ffb1d11537127986faa4f8e995c2a9e7e.exe
Resource
win10v2004-20220812-en
General
-
Target
c744ae35396ad2508891af93325e347ffb1d11537127986faa4f8e995c2a9e7e.exe
-
Size
564KB
-
MD5
0da3d0cac4222f2f3a0466ca64585f45
-
SHA1
1a85755a9c22a9c2478c6468ff1038c840d58a2f
-
SHA256
c744ae35396ad2508891af93325e347ffb1d11537127986faa4f8e995c2a9e7e
-
SHA512
2418b2b556f1fe16c02c46649a403379d98c5f38c714b5795d3c322cdbc842560d1f8b998b08f83db40b4981756f8479fb3f069d5af026bbb5edbe78f597309c
-
SSDEEP
12288:VNIQAPGsAqY9IMVYd38sJdpQHlGlY8KfTGt6tmb/l9TXQAG:SPGSY91VwNJcFMqTXmbdVXbG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Chromium.exe -
Executes dropped EXE 1 IoCs
pid Process 3604 Chromium.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run Chromium.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chromium = "\"C:\\Users\\Admin\\AppData\\Roaming\\Chromium.exe\"" Chromium.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Chromium.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4912 c744ae35396ad2508891af93325e347ffb1d11537127986faa4f8e995c2a9e7e.exe 4912 c744ae35396ad2508891af93325e347ffb1d11537127986faa4f8e995c2a9e7e.exe 3604 Chromium.exe 3604 Chromium.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4912 wrote to memory of 3604 4912 c744ae35396ad2508891af93325e347ffb1d11537127986faa4f8e995c2a9e7e.exe 80 PID 4912 wrote to memory of 3604 4912 c744ae35396ad2508891af93325e347ffb1d11537127986faa4f8e995c2a9e7e.exe 80 PID 4912 wrote to memory of 3604 4912 c744ae35396ad2508891af93325e347ffb1d11537127986faa4f8e995c2a9e7e.exe 80 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Chromium.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Chromium.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c744ae35396ad2508891af93325e347ffb1d11537127986faa4f8e995c2a9e7e.exe"C:\Users\Admin\AppData\Local\Temp\c744ae35396ad2508891af93325e347ffb1d11537127986faa4f8e995c2a9e7e.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Roaming\Chromium.exeC:\Users\Admin\AppData\Roaming\Chromium.exe2⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564KB
MD50da3d0cac4222f2f3a0466ca64585f45
SHA11a85755a9c22a9c2478c6468ff1038c840d58a2f
SHA256c744ae35396ad2508891af93325e347ffb1d11537127986faa4f8e995c2a9e7e
SHA5122418b2b556f1fe16c02c46649a403379d98c5f38c714b5795d3c322cdbc842560d1f8b998b08f83db40b4981756f8479fb3f069d5af026bbb5edbe78f597309c
-
Filesize
564KB
MD50da3d0cac4222f2f3a0466ca64585f45
SHA11a85755a9c22a9c2478c6468ff1038c840d58a2f
SHA256c744ae35396ad2508891af93325e347ffb1d11537127986faa4f8e995c2a9e7e
SHA5122418b2b556f1fe16c02c46649a403379d98c5f38c714b5795d3c322cdbc842560d1f8b998b08f83db40b4981756f8479fb3f069d5af026bbb5edbe78f597309c