Analysis
-
max time kernel
158s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 10:18
Static task
static1
Behavioral task
behavioral1
Sample
cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe
Resource
win10v2004-20220812-en
General
-
Target
cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe
-
Size
37KB
-
MD5
0c3d68a6953b0b8d495e66ce38e746a0
-
SHA1
c69a3566a45370c4dff668e50cb37c71882663dd
-
SHA256
cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42
-
SHA512
c004ce20b848fa5d215d634c204bd9537833cf2855662b0c905f2c9eff6e19398777459ae7feb80bbb9da2b1c65300cf0c8d588f22d65f72648e43320cf252a0
-
SSDEEP
768:z2A3l1G/Z/EFQNkX3mLd4mwPEhNzg3IhZ6vdgXiH9zKYcXgYyGqdXw:z2AV1GBsmNkMOPEjhhoHzcXundX
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe -
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 4280 cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinSocketA.dll cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe File opened for modification C:\Windows\SysWOW64\WinSocketA.dll cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4280 cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe 4280 cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe 4280 cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe 4280 cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 4280 cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 4280 cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4280 wrote to memory of 4720 4280 cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe 79 PID 4280 wrote to memory of 4720 4280 cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe 79 PID 4280 wrote to memory of 4720 4280 cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe 79 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe"C:\Users\Admin\AppData\Local\Temp\cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\cf83c532630832887a5d0ee2f7701ae9157f318af685c6e816b2576384d97b42.exe"2⤵PID:4720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD55beca6a5e37601fc333ba66bcfa9bca1
SHA16b6d0dd3039c575bda2b42d692fa5356ce7b4efc
SHA2563bfd111a796f6605c4b79326f227a06c432ddd44d720d2645536b96b332024d8
SHA5125576f1ec86e0d0127637310d509602fa56ba7a90b68f4120c62385b2472da1169e976a96793b604dd93520421406d6141f69685ad8bc8b84793c4c3414fedf78