Analysis

  • max time kernel
    132s
  • max time network
    111s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 22:54

General

  • Target

    cb6efa4618a4d2eaeddf120261857aec4152a787d66c8538948866175bf0978a.exe

  • Size

    31KB

  • MD5

    6a36b8c14ef9b81f6412847382825d06

  • SHA1

    7fabed6a4b3bd2d33b2589c6a10e3ade62580657

  • SHA256

    cb6efa4618a4d2eaeddf120261857aec4152a787d66c8538948866175bf0978a

  • SHA512

    c1ef7e0cad949ae7673354c1badfbed5aae2f3ff8a1ab9d46d52e271e2422743b6b078e925f6e40cb53994f46fe555fa380a5ee173af5352bd21655e8aa7cf0d

  • SSDEEP

    768:8wJLzF75I2PSey90Ro3O/niDpDvvV+h/7lvK7OceK6RnbcuyD7UZuEk:hzFpByR3O/iDpjqo7Oce9nouy8cL

Malware Config

Signatures

  • UAC bypass 3 TTPs 3 IoCs
  • Stops running service(s) 3 TTPs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 63 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb6efa4618a4d2eaeddf120261857aec4152a787d66c8538948866175bf0978a.exe
    "C:\Users\Admin\AppData\Local\Temp\cb6efa4618a4d2eaeddf120261857aec4152a787d66c8538948866175bf0978a.exe"
    1⤵
    • UAC bypass
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1792
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c sc stop policyagent
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:528
      • C:\Windows\SysWOW64\sc.exe
        sc stop policyagent
        3⤵
        • Launches sc.exe
        PID:1176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\7102366.DEP

    Filesize

    12.1MB

    MD5

    6ac88bdcb96cb6a6cd6020f2560a4006

    SHA1

    6b870049c7311cb3d8aff622ed7b1102668d35d2

    SHA256

    630743624439e9c0c7cef1fbc45b64a2298bdfd3f164729af1dc0e4720febcf7

    SHA512

    10afe5a9569baedf4af399af48b9e6944adcc10a325541c535a9451f1adda21d04188bb39ce2d3a9bac87bf66fa9fa877d637eb9f6804a2c99ce661251b756a2

  • memory/1792-54-0x0000000076381000-0x0000000076383000-memory.dmp

    Filesize

    8KB

  • memory/1792-55-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1792-56-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB