Analysis
-
max time kernel
155s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 04:32
Behavioral task
behavioral1
Sample
67cee746f920fcee16b95f4f41710657d955f0c7a3582a2f7a51c1bcb266d6ff.exe
Resource
win7-20220901-en
windows7-x64
6 signatures
150 seconds
General
-
Target
67cee746f920fcee16b95f4f41710657d955f0c7a3582a2f7a51c1bcb266d6ff.exe
-
Size
145KB
-
MD5
894a5083eea34f53952c77ef35bed9ca
-
SHA1
73a514a28fe34b1470e7fbd209831a44dc92a5f4
-
SHA256
67cee746f920fcee16b95f4f41710657d955f0c7a3582a2f7a51c1bcb266d6ff
-
SHA512
5ea05cf40d25abc3fdc312ab66d918dc0ce59929238674f28fb5a662fa678c350028a9b870e547e8ce030893d2841b8884d895a55b23992e3988221792ebcf97
-
SSDEEP
3072:elJToVjk4CiLzZCGhA8OgVa6IWzwX6/cc/tErrMg4out/B77777J77c77c77c7:eldoVjk4CiL0WA8Og86IiwXvrmoS/B7y
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 67cee746f920fcee16b95f4f41710657d955f0c7a3582a2f7a51c1bcb266d6ff.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 67cee746f920fcee16b95f4f41710657d955f0c7a3582a2f7a51c1bcb266d6ff.exe -
resource yara_rule behavioral2/memory/4596-132-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral2/memory/4596-133-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral2/memory/4596-134-0x0000000000400000-0x0000000000469000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 67cee746f920fcee16b95f4f41710657d955f0c7a3582a2f7a51c1bcb266d6ff.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 67cee746f920fcee16b95f4f41710657d955f0c7a3582a2f7a51c1bcb266d6ff.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 67cee746f920fcee16b95f4f41710657d955f0c7a3582a2f7a51c1bcb266d6ff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 67cee746f920fcee16b95f4f41710657d955f0c7a3582a2f7a51c1bcb266d6ff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67cee746f920fcee16b95f4f41710657d955f0c7a3582a2f7a51c1bcb266d6ff.exe"C:\Users\Admin\AppData\Local\Temp\67cee746f920fcee16b95f4f41710657d955f0c7a3582a2f7a51c1bcb266d6ff.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- System policy modification
PID:4596