Analysis
-
max time kernel
297s -
max time network
311s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 17:00
Static task
static1
Behavioral task
behavioral1
Sample
72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe
Resource
win10v2004-20221111-en
General
-
Target
72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe
-
Size
184KB
-
MD5
2f88dbb08adad835192dd10bcf0de3d0
-
SHA1
e632684e46c58dd4c642912f40352eb41b93c732
-
SHA256
72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2
-
SHA512
16d9a0beb0628265060010e5a2f7e66f435ee7e36015f67c263a6e8f531acb6096300978898527198c193342641aca4d15c8a3b899419c015b3e99828e8649ef
-
SSDEEP
3072:uyYrBL2yxWmCzd2d87qix4OgUWvG47OJYcGbsQ74jaWsxSZTMZjp9Ryu50h8k:yRBxWvzM87DxJKwYcejWss2jp90a0N
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 5100 netsh.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows\CurrentVersion\Run 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Oturum Yöneticisi = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Oturum Yöneticisi.exe\"" 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4568 wrote to memory of 1968 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 81 PID 4568 wrote to memory of 1968 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 81 PID 4568 wrote to memory of 1968 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 81 PID 4568 wrote to memory of 1220 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 84 PID 4568 wrote to memory of 1220 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 84 PID 4568 wrote to memory of 1220 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 84 PID 4568 wrote to memory of 5100 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 86 PID 4568 wrote to memory of 5100 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 86 PID 4568 wrote to memory of 5100 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 86 PID 4568 wrote to memory of 4604 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 87 PID 4568 wrote to memory of 4604 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 87 PID 4568 wrote to memory of 4604 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 87 PID 4568 wrote to memory of 3148 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 89 PID 4568 wrote to memory of 3148 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 89 PID 4568 wrote to memory of 3148 4568 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe 89 PID 3148 wrote to memory of 4824 3148 net.exe 93 PID 3148 wrote to memory of 4824 3148 net.exe 93 PID 3148 wrote to memory of 4824 3148 net.exe 93 PID 4604 wrote to memory of 2616 4604 net.exe 92 PID 4604 wrote to memory of 2616 4604 net.exe 92 PID 4604 wrote to memory of 2616 4604 net.exe 92 PID 3620 wrote to memory of 4732 3620 explorer.exe 99 PID 3620 wrote to memory of 4732 3620 explorer.exe 99 PID 4732 wrote to memory of 1200 4732 msedge.exe 103 PID 4732 wrote to memory of 1200 4732 msedge.exe 103 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe"C:\Users\Admin\AppData\Local\Temp\72b352915720bc6f7e8c1f12489288f3dd3935eeeec0676bd0fdba8d71051af2.exe"1⤵
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4568 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵PID:1968
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.google.com.tr/2⤵PID:1220
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable2⤵
- Modifies Windows Firewall
PID:5100
-
-
C:\Windows\SysWOW64\net.exenet stop security center2⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop security center3⤵PID:2616
-
-
-
C:\Windows\SysWOW64\net.exenet stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend3⤵PID:4824
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com.tr/2⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0x118,0x128,0x7fff698046f8,0x7fff69804708,0x7fff698047183⤵PID:1200
-
-