Analysis
-
max time kernel
165s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe
Resource
win10v2004-20220812-en
General
-
Target
bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe
-
Size
631KB
-
MD5
374a423ba5c64c7ac87a3bcf45ed672a
-
SHA1
fc0b1b41db5e5e2cf6e42a7e391d6054dbc219a1
-
SHA256
bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab
-
SHA512
d9a96ef54a59f0e2f97240e923c914a2bc7a1f5f80242a8be6efd3b6769e11fcd06380fb66d487925c48277127d9bc95669101a690045de0183f43e38ac0c697
-
SSDEEP
12288:d/G4YqH5E4FFaWbrxTYWWcxBGKzqfy32mYL/4:d+4YW5Ey7rpmaA0qfP
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe -
Disables taskbar notifications via registry modification
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Security Center\svc bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\svc bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\DisableAntiSpyware = "1" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\2F51B710BCCEC47700002F5187C3C90B = "C:\\ProgramData\\2F51B710BCCEC47700002F5187C3C90B\\2F51B710BCCEC47700002F5187C3C90B.exe" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe -
Program crash 11 IoCs
pid pid_target Process procid_target 4844 4988 WerFault.exe 78 1416 4988 WerFault.exe 78 3576 4988 WerFault.exe 78 3484 4988 WerFault.exe 78 1772 4988 WerFault.exe 78 852 4988 WerFault.exe 78 3928 4988 WerFault.exe 78 904 4988 WerFault.exe 78 4808 4988 WerFault.exe 78 1424 4988 WerFault.exe 78 3188 4988 WerFault.exe 78 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe 4988 bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe"C:\Users\Admin\AppData\Local\Temp\bfe75fdc9fe6b5de80cc18bd11f943b4d18172e37ddb6fc7170c8e9f126e2aab.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 5362⤵
- Program crash
PID:4844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 5482⤵
- Program crash
PID:1416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 6802⤵
- Program crash
PID:3576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 5482⤵
- Program crash
PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 7682⤵
- Program crash
PID:1772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 7762⤵
- Program crash
PID:852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 5482⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 5482⤵
- Program crash
PID:904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 8522⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 10962⤵
- Program crash
PID:1424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 11162⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4988 -ip 49881⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4988 -ip 49881⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4988 -ip 49881⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4988 -ip 49881⤵PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4988 -ip 49881⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4988 -ip 49881⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4988 -ip 49881⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4988 -ip 49881⤵PID:1748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4988 -ip 49881⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4988 -ip 49881⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4988 -ip 49881⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4988 -ip 49881⤵PID:2692