Analysis
-
max time kernel
163s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 05:21
Behavioral task
behavioral1
Sample
77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe
Resource
win7-20221111-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe
Resource
win10v2004-20221111-en
8 signatures
150 seconds
General
-
Target
77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe
-
Size
39KB
-
MD5
ec97bc04d36e83ce5ed092bf156878f6
-
SHA1
e5fce1e8277db9dcf9f11559c0c165f0d3b124f8
-
SHA256
77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1
-
SHA512
9852daca6286340ca4634a8f0a26a463415bfa81c3632de99894c8e8c340e3bdfcfa1ad5193246cfb31781bcf913a08f7b9d2f90863c1323f43761ef2b4a4a61
-
SSDEEP
768:k9Bn2RpxSECWHVYgnqk6i4WUGCmaflH6t8VHjVnb/0w:kDn23xSvAVznq9i4HGChY0jVnjD
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\winlogon32.exe" 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss32.exe = "C:\\Windows\\system32\\smss32.exe" 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe = "C:\\Windows\\system32\\smss32.exe" 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\smss32.exe 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe File opened for modification C:\Windows\SysWOW64\smss32.exe 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe File created C:\Windows\SysWOW64\winlogon32.exe 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\Enabled = "0" 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\PhishingFilter 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\PhishingFilter 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe -
System policy modification 1 TTPs 7 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop = "1" 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper = "1" 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges = "1" 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe"C:\Users\Admin\AppData\Local\Temp\77eef7ddc2580e0ad42d64d7ca507263a18523cfaf739fece662131a94eb9aa1.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer Phishing Filter
- System policy modification
PID:1380