Analysis
-
max time kernel
155s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 03:07
Static task
static1
Behavioral task
behavioral1
Sample
8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe
Resource
win7-20220812-en
windows7-x64
6 signatures
150 seconds
General
-
Target
8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe
-
Size
3.9MB
-
MD5
c2f21f1c5ab4d4bce11ff0e56d3b86e2
-
SHA1
a153a7a3b3c0069eb1fa56afe0008459a6885159
-
SHA256
8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e
-
SHA512
b9f946591f2f2b57d538beea0082c9292d7722575163f4208e14e1123b612733a7be920f4ff6299de90c79e8ced3b7e85b3c944bc484d22e0394809e07989a45
-
SSDEEP
98304:SdYtjJiXIl4EK1EJy339cSq9zPwz/HGQv/8/MnuI:Sd4jJiXI8LH9cNPq/5cUu
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1812-136-0x0000000003100000-0x0000000003172000-memory.dmp upx behavioral2/memory/1812-137-0x0000000003100000-0x0000000003172000-memory.dmp upx behavioral2/memory/1812-140-0x0000000003100000-0x0000000003172000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1812 8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe 1812 8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe 1812 8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe 1812 8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1812 8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1812 8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1812 8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe 1812 8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe 1812 8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe 1812 8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe 1812 8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe"C:\Users\Admin\AppData\Local\Temp\8067f3006e2a64ada5247b7dceb27da4e9eb13ef60496610120ff523ebe5f56e.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1812