Analysis
-
max time kernel
50s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 23:17
Behavioral task
behavioral1
Sample
d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0.exe
Resource
win7-20220812-en
windows7-x64
7 signatures
150 seconds
General
-
Target
d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0.exe
-
Size
35KB
-
MD5
55487903c61cf2c36f92a50177ef6089
-
SHA1
63b2f720ef1ff9fbf9495d2287dce421b7862c79
-
SHA256
d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0
-
SHA512
c9038692d7ca34dfef6279d83b428456b19f4c190e4ca56e9b19c6bc437c20bef2801d9c579ff3008510848aec426b3a84cd4c11610d6cffa67e893b3d8b599e
-
SSDEEP
768:/RdPPOjUDR95XD3EjHImwMvkGu1NNcwwvzEdzH:/Rdtr5XD3X6VHwIzEdz
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0.exe -
resource yara_rule behavioral1/memory/1908-56-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/1908-58-0x0000000000400000-0x0000000000418000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\NoExplorer = "1" d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\obnrobj.dll d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0.exe File opened for modification C:\WINDOWS\SysWOW64\obnrobj.dll d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1908 d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0.exe"C:\Users\Admin\AppData\Local\Temp\d07ec892b181b5e576c675f47004c376097de033507551a5a86a12121ea0f6d0.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1908