Analysis
-
max time kernel
184s -
max time network
226s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 20:35
Static task
static1
Behavioral task
behavioral1
Sample
e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe
Resource
win7-20220812-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe
-
Size
96KB
-
MD5
18e6370a84aec2e649bec006772fb5ef
-
SHA1
064710ed66c090048821adbb5f946ec2a13214d3
-
SHA256
e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6
-
SHA512
3a244c6a2331850f2ddd6cba5551d3207aaa68c0e6c6426a9d378f9e059814a0b53227efe3729b801bb08369ec3f0c57f9839e5c397ce24a144f318009fbedad
-
SSDEEP
1536:40Qqnnu9gAx7mkE+oKi8vkptLAOz8lW6:+l9gx1JKBkptEO+W
Score
10/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iexplorer = "C:\\Windows\\iexplorer.exe" e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4916 set thread context of 1952 4916 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe 77 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\iexplorer.exe e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe File created C:\Windows\iexplorer.exe e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4984 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4916 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe 1952 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4916 wrote to memory of 1952 4916 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe 77 PID 4916 wrote to memory of 1952 4916 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe 77 PID 4916 wrote to memory of 1952 4916 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe 77 PID 4916 wrote to memory of 1952 4916 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe 77 PID 4916 wrote to memory of 1952 4916 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe 77 PID 4916 wrote to memory of 1952 4916 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe 77 PID 4916 wrote to memory of 1952 4916 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe 77 PID 4916 wrote to memory of 1952 4916 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe 77 PID 1952 wrote to memory of 2580 1952 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe 78 PID 1952 wrote to memory of 2580 1952 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe 78 PID 1952 wrote to memory of 2580 1952 e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe 78 PID 2580 wrote to memory of 4984 2580 cmd.exe 80 PID 2580 wrote to memory of 4984 2580 cmd.exe 80 PID 2580 wrote to memory of 4984 2580 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe"C:\Users\Admin\AppData\Local\Temp\e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe"C:\Users\Admin\AppData\Local\Temp\e85b490ae2b0d55ab4e8abcc41f06597bae2588d339640c0f9e11ad65a8012b6.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
PID:4984
-
-
-