Analysis
-
max time kernel
201s -
max time network
287s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe
Resource
win10v2004-20221111-en
General
-
Target
bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe
-
Size
32KB
-
MD5
b4c076ad22ad25ecd22841c1caa6ff72
-
SHA1
78aa047397b56ad3a8616a70abbe0089aa879a27
-
SHA256
bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b
-
SHA512
b17aab57a1473c6418682b1b308fb45e0b682bf9602af32103ea96417f6bf25315463a713f01665e73a818d323372f7b5a548ac499bb7d89aa86b312da41393f
-
SSDEEP
768:zgpcJkoH/cYLeV/omwUZJt6R7pA21KUsFZh4naaj:ufoH0lpweJt6R7pA21KRThQzj
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Audio Driver = "C:\\Program Files\\Common Files\\lsass.exe" bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe -
Executes dropped EXE 2 IoCs
pid Process 1636 csrss.exe 628 lsass.exe -
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{f952a1c4-6219-11ed-b738-806e6f6e6963} bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{f952a1c4-6219-11ed-b738-806e6f6e6963}\StubPath = "C:\\ProgramData\\csrss.exe -r" bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{f952a1c4-6219-11ed-b738-806e6f6e6963}\IsInstalled = "1" bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1684 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Audio Driver = "C:\\ProgramData\\csrss.exe" bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\lsass.exe bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe File opened for modification C:\Program Files\Common Files\lsass.exe bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 1120 bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe Token: SeDebugPrivilege 1636 csrss.exe Token: SeDebugPrivilege 628 lsass.exe Token: SeIncreaseQuotaPrivilege 1636 csrss.exe Token: SeSecurityPrivilege 1636 csrss.exe Token: SeTakeOwnershipPrivilege 1636 csrss.exe Token: SeLoadDriverPrivilege 1636 csrss.exe Token: SeSystemProfilePrivilege 1636 csrss.exe Token: SeSystemtimePrivilege 1636 csrss.exe Token: SeProfSingleProcessPrivilege 1636 csrss.exe Token: SeIncBasePriorityPrivilege 1636 csrss.exe Token: SeCreatePagefilePrivilege 1636 csrss.exe Token: SeBackupPrivilege 1636 csrss.exe Token: SeRestorePrivilege 1636 csrss.exe Token: SeShutdownPrivilege 1636 csrss.exe Token: SeDebugPrivilege 1636 csrss.exe Token: SeSystemEnvironmentPrivilege 1636 csrss.exe Token: SeRemoteShutdownPrivilege 1636 csrss.exe Token: SeUndockPrivilege 1636 csrss.exe Token: SeManageVolumePrivilege 1636 csrss.exe Token: 33 1636 csrss.exe Token: 34 1636 csrss.exe Token: 35 1636 csrss.exe Token: SeIncreaseQuotaPrivilege 1636 csrss.exe Token: SeSecurityPrivilege 1636 csrss.exe Token: SeTakeOwnershipPrivilege 1636 csrss.exe Token: SeLoadDriverPrivilege 1636 csrss.exe Token: SeSystemProfilePrivilege 1636 csrss.exe Token: SeSystemtimePrivilege 1636 csrss.exe Token: SeProfSingleProcessPrivilege 1636 csrss.exe Token: SeIncBasePriorityPrivilege 1636 csrss.exe Token: SeCreatePagefilePrivilege 1636 csrss.exe Token: SeBackupPrivilege 1636 csrss.exe Token: SeRestorePrivilege 1636 csrss.exe Token: SeShutdownPrivilege 1636 csrss.exe Token: SeDebugPrivilege 1636 csrss.exe Token: SeSystemEnvironmentPrivilege 1636 csrss.exe Token: SeRemoteShutdownPrivilege 1636 csrss.exe Token: SeUndockPrivilege 1636 csrss.exe Token: SeManageVolumePrivilege 1636 csrss.exe Token: 33 1636 csrss.exe Token: 34 1636 csrss.exe Token: 35 1636 csrss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1636 1120 bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe 28 PID 1120 wrote to memory of 1636 1120 bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe 28 PID 1120 wrote to memory of 1636 1120 bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe 28 PID 1120 wrote to memory of 628 1120 bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe 29 PID 1120 wrote to memory of 628 1120 bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe 29 PID 1120 wrote to memory of 628 1120 bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe 29 PID 1636 wrote to memory of 1684 1636 csrss.exe 30 PID 1636 wrote to memory of 1684 1636 csrss.exe 30 PID 1636 wrote to memory of 1684 1636 csrss.exe 30 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe"C:\Users\Admin\AppData\Local\Temp\bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b.exe"1⤵
- UAC bypass
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1120 -
C:\ProgramData\csrss.exe"C:\ProgramData\csrss.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1636 -
C:\Windows\system32\netsh.exe"netsh.exe" firewall add allowedprogram program="C:\ProgramData\csrss.exe" name="Audio Driver" mode=ENABLE scope=ALL profile=ALL3⤵
- Modifies Windows Firewall
PID:1684
-
-
-
C:\Program Files\Common Files\lsass.exe"C:\Program Files\Common Files\lsass.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:628
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5b4c076ad22ad25ecd22841c1caa6ff72
SHA178aa047397b56ad3a8616a70abbe0089aa879a27
SHA256bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b
SHA512b17aab57a1473c6418682b1b308fb45e0b682bf9602af32103ea96417f6bf25315463a713f01665e73a818d323372f7b5a548ac499bb7d89aa86b312da41393f
-
Filesize
32KB
MD5b4c076ad22ad25ecd22841c1caa6ff72
SHA178aa047397b56ad3a8616a70abbe0089aa879a27
SHA256bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b
SHA512b17aab57a1473c6418682b1b308fb45e0b682bf9602af32103ea96417f6bf25315463a713f01665e73a818d323372f7b5a548ac499bb7d89aa86b312da41393f
-
Filesize
32KB
MD5b4c076ad22ad25ecd22841c1caa6ff72
SHA178aa047397b56ad3a8616a70abbe0089aa879a27
SHA256bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b
SHA512b17aab57a1473c6418682b1b308fb45e0b682bf9602af32103ea96417f6bf25315463a713f01665e73a818d323372f7b5a548ac499bb7d89aa86b312da41393f
-
Filesize
32KB
MD5b4c076ad22ad25ecd22841c1caa6ff72
SHA178aa047397b56ad3a8616a70abbe0089aa879a27
SHA256bc391f3d31649d8f0698f5e9759ff0a003df8ff2bfa135dfef5646b0e566214b
SHA512b17aab57a1473c6418682b1b308fb45e0b682bf9602af32103ea96417f6bf25315463a713f01665e73a818d323372f7b5a548ac499bb7d89aa86b312da41393f