Analysis
-
max time kernel
277s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe
Resource
win10v2004-20221111-en
General
-
Target
bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe
-
Size
592KB
-
MD5
6bfc33a181806aaa06116c0ed7b1c484
-
SHA1
05a3a0b8916296266920f7cb7bbc54388a735e58
-
SHA256
bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a
-
SHA512
35afc608ce0ff0d3b4024a6a6f11994367db30610d83fb46e3bfeda1a476aecfbe6cb7a10544a249f758159098feffd085a7229a406b081d14d35162f865822d
-
SSDEEP
12288:fBPK6WGvLov/q6AYYYYYYYYYYYRYYYYYYYYYY3E7f5i5sQE7x3l2je+Lh97gMF5W:kOsEYYYYYYYYYYYRYYYYYYYYYY8f5Qm5
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\explorer.exe = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe:*:Enabled:Windows Messanger" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{ACFDED6A-E7FD-95E2-A8DF-141DDCEC0CE9} bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Active Setup\Installed Components\{ACFDED6A-E7FD-95E2-A8DF-141DDCEC0CE9}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ACFDED6A-E7FD-95E2-A8DF-141DDCEC0CE9} bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ACFDED6A-E7FD-95E2-A8DF-141DDCEC0CE9}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1372 set thread context of 684 1372 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 28 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1112 reg.exe 1248 reg.exe 704 reg.exe 1272 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeCreateTokenPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeAssignPrimaryTokenPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeLockMemoryPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeIncreaseQuotaPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeMachineAccountPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeTcbPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeSecurityPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeTakeOwnershipPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeLoadDriverPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeSystemProfilePrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeSystemtimePrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeProfSingleProcessPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeIncBasePriorityPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeCreatePagefilePrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeCreatePermanentPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeBackupPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeRestorePrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeShutdownPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeDebugPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeAuditPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeSystemEnvironmentPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeChangeNotifyPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeRemoteShutdownPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeUndockPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeSyncAgentPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeEnableDelegationPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeManageVolumePrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeImpersonatePrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeCreateGlobalPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: 31 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: 32 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: 33 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: 34 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: 35 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeDebugPrivilege 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1372 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1372 wrote to memory of 684 1372 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 28 PID 1372 wrote to memory of 684 1372 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 28 PID 1372 wrote to memory of 684 1372 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 28 PID 1372 wrote to memory of 684 1372 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 28 PID 1372 wrote to memory of 684 1372 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 28 PID 1372 wrote to memory of 684 1372 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 28 PID 1372 wrote to memory of 684 1372 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 28 PID 1372 wrote to memory of 684 1372 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 28 PID 1372 wrote to memory of 684 1372 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 28 PID 684 wrote to memory of 912 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 29 PID 684 wrote to memory of 912 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 29 PID 684 wrote to memory of 912 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 29 PID 684 wrote to memory of 912 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 29 PID 684 wrote to memory of 780 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 32 PID 684 wrote to memory of 780 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 32 PID 684 wrote to memory of 780 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 32 PID 684 wrote to memory of 780 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 32 PID 684 wrote to memory of 1520 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 30 PID 684 wrote to memory of 1520 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 30 PID 684 wrote to memory of 1520 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 30 PID 684 wrote to memory of 1520 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 30 PID 684 wrote to memory of 976 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 35 PID 684 wrote to memory of 976 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 35 PID 684 wrote to memory of 976 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 35 PID 684 wrote to memory of 976 684 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 35 PID 912 wrote to memory of 1112 912 cmd.exe 37 PID 912 wrote to memory of 1112 912 cmd.exe 37 PID 912 wrote to memory of 1112 912 cmd.exe 37 PID 912 wrote to memory of 1112 912 cmd.exe 37 PID 780 wrote to memory of 704 780 cmd.exe 39 PID 780 wrote to memory of 704 780 cmd.exe 39 PID 780 wrote to memory of 704 780 cmd.exe 39 PID 780 wrote to memory of 704 780 cmd.exe 39 PID 1520 wrote to memory of 1248 1520 cmd.exe 38 PID 1520 wrote to memory of 1248 1520 cmd.exe 38 PID 1520 wrote to memory of 1248 1520 cmd.exe 38 PID 1520 wrote to memory of 1248 1520 cmd.exe 38 PID 976 wrote to memory of 1272 976 cmd.exe 40 PID 976 wrote to memory of 1272 976 cmd.exe 40 PID 976 wrote to memory of 1272 976 cmd.exe 40 PID 976 wrote to memory of 1272 976 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe"C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exeC:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:704
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\explorer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\explorer.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\explorer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\explorer.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1272
-
-
-