Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 09:34
Static task
static1
Behavioral task
behavioral1
Sample
aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe
Resource
win7-20220812-en
General
-
Target
aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe
-
Size
1.2MB
-
MD5
1ac7f905b952d6a74fe9d70dfaeb4a87
-
SHA1
0e6882d7f2bd2887489a91bfbe00963c5be9c766
-
SHA256
aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289
-
SHA512
0a5d76d36619ff75c402771d45026edf0b365b8765b8c4664c5e3a6c184afd6851102af87bd34f766fe37fb078df8d1b9cfd7bb1a0a2037d4c036a29969c0ff8
-
SSDEEP
12288:ab0ZipUUTrXv6bkNtXDUqwa0bO+iCeJPQvHOERQ5A925YEoRlBM24il+gspTbqqI:ab0ZippTrXSbkjwN4pPRdxojeilT5lZr
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1588 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1148 set thread context of 1200 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 40 -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 920 sc.exe 1944 sc.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E716575F-6955-3A8A-6955-3A8A69553A8A}\InProcServer32 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E716575F-6955-3A8A-6955-3A8A69553A8A}\InProcServer32\ = "%SystemRoot%\\SysWow64\\windowscodecsext.dll" aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E716575F-6955-3A8A-6955-3A8A69553A8A}\InProcServer32\ThreadingModel = "Both" aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E716575F-6955-3A8A-6955-3A8A69553A8A} aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E716575F-6955-3A8A-6955-3A8A69553A8A}\Containers aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe Token: SeIncBasePriorityPrivilege 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1588 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 29 PID 1148 wrote to memory of 1588 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 29 PID 1148 wrote to memory of 1588 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 29 PID 1148 wrote to memory of 1588 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 29 PID 1148 wrote to memory of 812 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 30 PID 1148 wrote to memory of 812 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 30 PID 1148 wrote to memory of 812 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 30 PID 1148 wrote to memory of 812 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 30 PID 1148 wrote to memory of 1464 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 32 PID 1148 wrote to memory of 1464 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 32 PID 1148 wrote to memory of 1464 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 32 PID 1148 wrote to memory of 1464 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 32 PID 1148 wrote to memory of 288 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 33 PID 1148 wrote to memory of 288 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 33 PID 1148 wrote to memory of 288 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 33 PID 1148 wrote to memory of 288 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 33 PID 1148 wrote to memory of 920 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 37 PID 1148 wrote to memory of 920 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 37 PID 1148 wrote to memory of 920 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 37 PID 1148 wrote to memory of 920 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 37 PID 1148 wrote to memory of 1944 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 38 PID 1148 wrote to memory of 1944 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 38 PID 1148 wrote to memory of 1944 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 38 PID 1148 wrote to memory of 1944 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 38 PID 1148 wrote to memory of 1200 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 40 PID 1148 wrote to memory of 1200 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 40 PID 1148 wrote to memory of 1200 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 40 PID 1148 wrote to memory of 1200 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 40 PID 1148 wrote to memory of 1200 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 40 PID 1148 wrote to memory of 1200 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 40 PID 1148 wrote to memory of 1200 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 40 PID 1148 wrote to memory of 1200 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 40 PID 1148 wrote to memory of 1200 1148 aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe 40 PID 288 wrote to memory of 676 288 net.exe 43 PID 288 wrote to memory of 676 288 net.exe 43 PID 288 wrote to memory of 676 288 net.exe 43 PID 288 wrote to memory of 676 288 net.exe 43 PID 1464 wrote to memory of 1812 1464 net.exe 44 PID 1464 wrote to memory of 1812 1464 net.exe 44 PID 1464 wrote to memory of 1812 1464 net.exe 44 PID 1464 wrote to memory of 1812 1464 net.exe 44 PID 812 wrote to memory of 2008 812 net.exe 42 PID 812 wrote to memory of 2008 812 net.exe 42 PID 812 wrote to memory of 2008 812 net.exe 42 PID 812 wrote to memory of 2008 812 net.exe 42 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe"C:\Users\Admin\AppData\Local\Temp\aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe"1⤵
- UAC bypass
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1148 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable2⤵
- Modifies Windows Firewall
PID:1588
-
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc2⤵
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc3⤵PID:2008
-
-
-
C:\Windows\SysWOW64\net.exenet stop security center2⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop security center3⤵PID:1812
-
-
-
C:\Windows\SysWOW64\net.exenet stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend3⤵PID:676
-
-
-
C:\Windows\SysWOW64\sc.exesc stop SharedAccess2⤵
- Launches sc.exe
PID:920
-
-
C:\Windows\SysWOW64\sc.exesc DELETE SharedAccess2⤵
- Launches sc.exe
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exeC:\Users\Admin\AppData\Local\Temp\aa0bed5e015059be0267bd6c3f4e361477de25b3cf5fa01bfbc11a95daf3a289.exe2⤵PID:1200
-