Analysis
-
max time kernel
183s -
max time network
215s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe
Resource
win10v2004-20221111-en
General
-
Target
bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe
-
Size
592KB
-
MD5
6bfc33a181806aaa06116c0ed7b1c484
-
SHA1
05a3a0b8916296266920f7cb7bbc54388a735e58
-
SHA256
bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a
-
SHA512
35afc608ce0ff0d3b4024a6a6f11994367db30610d83fb46e3bfeda1a476aecfbe6cb7a10544a249f758159098feffd085a7229a406b081d14d35162f865822d
-
SSDEEP
12288:fBPK6WGvLov/q6AYYYYYYYYYYYRYYYYYYYYYY3E7f5i5sQE7x3l2je+Lh97gMF5W:kOsEYYYYYYYYYYYRYYYYYYYYYY8f5Qm5
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\explorer.exe = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ACFDED6A-E7FD-95E2-A8DF-141DDCEC0CE9} bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ACFDED6A-E7FD-95E2-A8DF-141DDCEC0CE9}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{ACFDED6A-E7FD-95E2-A8DF-141DDCEC0CE9} bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{ACFDED6A-E7FD-95E2-A8DF-141DDCEC0CE9}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1780 set thread context of 4224 1780 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 81 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 4828 reg.exe 1012 reg.exe 3932 reg.exe 4348 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeCreateTokenPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeAssignPrimaryTokenPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeLockMemoryPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeIncreaseQuotaPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeMachineAccountPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeTcbPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeSecurityPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeTakeOwnershipPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeLoadDriverPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeSystemProfilePrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeSystemtimePrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeProfSingleProcessPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeIncBasePriorityPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeCreatePagefilePrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeCreatePermanentPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeBackupPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeRestorePrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeShutdownPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeDebugPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeAuditPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeSystemEnvironmentPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeChangeNotifyPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeRemoteShutdownPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeUndockPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeSyncAgentPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeEnableDelegationPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeManageVolumePrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeImpersonatePrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeCreateGlobalPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: 31 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: 32 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: 33 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: 34 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: 35 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe Token: SeDebugPrivilege 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1780 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1780 wrote to memory of 4224 1780 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 81 PID 1780 wrote to memory of 4224 1780 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 81 PID 1780 wrote to memory of 4224 1780 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 81 PID 1780 wrote to memory of 4224 1780 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 81 PID 1780 wrote to memory of 4224 1780 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 81 PID 1780 wrote to memory of 4224 1780 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 81 PID 1780 wrote to memory of 4224 1780 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 81 PID 1780 wrote to memory of 4224 1780 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 81 PID 4224 wrote to memory of 3672 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 82 PID 4224 wrote to memory of 3672 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 82 PID 4224 wrote to memory of 3672 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 82 PID 4224 wrote to memory of 3608 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 83 PID 4224 wrote to memory of 3608 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 83 PID 4224 wrote to memory of 3608 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 83 PID 4224 wrote to memory of 3660 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 84 PID 4224 wrote to memory of 3660 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 84 PID 4224 wrote to memory of 3660 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 84 PID 4224 wrote to memory of 3424 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 85 PID 4224 wrote to memory of 3424 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 85 PID 4224 wrote to memory of 3424 4224 bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe 85 PID 3424 wrote to memory of 3932 3424 cmd.exe 92 PID 3424 wrote to memory of 3932 3424 cmd.exe 92 PID 3424 wrote to memory of 3932 3424 cmd.exe 92 PID 3672 wrote to memory of 1012 3672 cmd.exe 91 PID 3672 wrote to memory of 1012 3672 cmd.exe 91 PID 3672 wrote to memory of 1012 3672 cmd.exe 91 PID 3660 wrote to memory of 4348 3660 cmd.exe 93 PID 3660 wrote to memory of 4348 3660 cmd.exe 93 PID 3660 wrote to memory of 4348 3660 cmd.exe 93 PID 3608 wrote to memory of 4828 3608 cmd.exe 90 PID 3608 wrote to memory of 4828 3608 cmd.exe 90 PID 3608 wrote to memory of 4828 3608 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe"C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exeC:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1012
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\bcf03a73801fcbda6a8ff6fd406345d3679454ee795198923c0b4bf1a0855e9a.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:4828
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:4348
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\explorer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\explorer.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\explorer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\explorer.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:3932
-
-
-