Analysis
-
max time kernel
173s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe
Resource
win10v2004-20221111-en
General
-
Target
ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe
-
Size
92KB
-
MD5
d173fa568e03d8fe35a36d72e5028cc5
-
SHA1
aa98a12bc226f79a3e3eebda3461c225434afe70
-
SHA256
ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89
-
SHA512
986f575eb94407df4795d554ebab460220c47e05a031435cf6b1d3cfd79ca6cb54904716bb2b6c9d5e336f9b35fa29a13a66f2ca32eb98c0320bfab10c5e3dd5
-
SSDEEP
1536:/a0kJO8PwA5DPNRUiRrVthIeqQJcRebXKvDNALKbR1XVOH:S9pfU0VthPqQJkebToXVOH
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe -
Executes dropped EXE 8 IoCs
pid Process 4188 ~1cb0bb76.tmp 4668 ~72c5d870.tmp 3584 ~3962ef24.tmp 5060 ~c8da51d8.tmp 4436 ~8f776656.tmp 1844 ~e58be3a.tmp 1384 ~e58bea8.tmp 1668 ~ba81b99a.tmp -
Loads dropped DLL 1 IoCs
pid Process 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon.exe = "c:\\windows\\winlogon.exe" ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe -
Enumerates connected drives 3 TTPs 15 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\V: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\I: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\J: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\S: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\Y: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\Z: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\E: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\F: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\G: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\H: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\R: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\T: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\W: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened (read-only) \??\X: ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\su212796.dl_ ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File created C:\Windows\SysWOW64\su212796.dll ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File created \??\c:\windows\winlogon.exe ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened for modification \??\c:\windows\winlogon.exe ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe File opened for modification C:\WINDOWS\WINLOGON.EXE ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2348 wrote to memory of 4188 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 86 PID 2348 wrote to memory of 4188 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 86 PID 2348 wrote to memory of 4188 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 86 PID 2348 wrote to memory of 4668 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 87 PID 2348 wrote to memory of 4668 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 87 PID 2348 wrote to memory of 4668 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 87 PID 2348 wrote to memory of 3584 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 88 PID 2348 wrote to memory of 3584 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 88 PID 2348 wrote to memory of 3584 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 88 PID 2348 wrote to memory of 5060 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 89 PID 2348 wrote to memory of 5060 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 89 PID 2348 wrote to memory of 5060 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 89 PID 2348 wrote to memory of 4436 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 90 PID 2348 wrote to memory of 4436 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 90 PID 2348 wrote to memory of 4436 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 90 PID 2348 wrote to memory of 1844 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 91 PID 2348 wrote to memory of 1844 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 91 PID 2348 wrote to memory of 1844 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 91 PID 2348 wrote to memory of 1384 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 92 PID 2348 wrote to memory of 1384 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 92 PID 2348 wrote to memory of 1384 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 92 PID 2348 wrote to memory of 1668 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 93 PID 2348 wrote to memory of 1668 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 93 PID 2348 wrote to memory of 1668 2348 ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe 93 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe"C:\Users\Admin\AppData\Local\Temp\ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\~1cb0bb76.tmp"C:\Users\Admin\AppData\Local\Temp\~1cb0bb76.tmp"2⤵
- Executes dropped EXE
PID:4188
-
-
C:\Users\Admin\AppData\Local\Temp\~72c5d870.tmp"C:\Users\Admin\AppData\Local\Temp\~72c5d870.tmp"2⤵
- Executes dropped EXE
PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\~3962ef24.tmp"C:\Users\Admin\AppData\Local\Temp\~3962ef24.tmp"2⤵
- Executes dropped EXE
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\~c8da51d8.tmp"C:\Users\Admin\AppData\Local\Temp\~c8da51d8.tmp"2⤵
- Executes dropped EXE
PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\~8f776656.tmp"C:\Users\Admin\AppData\Local\Temp\~8f776656.tmp"2⤵
- Executes dropped EXE
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\~e58be3a.tmp"C:\Users\Admin\AppData\Local\Temp\~e58be3a.tmp"2⤵
- Executes dropped EXE
PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\~e58bea8.tmp"C:\Users\Admin\AppData\Local\Temp\~e58bea8.tmp"2⤵
- Executes dropped EXE
PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\~ba81b99a.tmp"C:\Users\Admin\AppData\Local\Temp\~ba81b99a.tmp"2⤵
- Executes dropped EXE
PID:1668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5ffbd7036c1d415db0b12734d7ab3deda
SHA1a98a8f1c2695ecdf4e1948516525e17f739bca14
SHA2564b8a06ebd542abc1b75a1b8cb68dc561013f22b6af44e9fc292668d80ce41664
SHA512d18519a25ed24cc8122f51dbc90141f2fc749c43cab37055d2573ca548b2dffc874f4abd9383e35ce875270823a0d83d8dd1a202fe82b4b7a1cc345fcbbb387d
-
Filesize
66KB
MD5ffbd7036c1d415db0b12734d7ab3deda
SHA1a98a8f1c2695ecdf4e1948516525e17f739bca14
SHA2564b8a06ebd542abc1b75a1b8cb68dc561013f22b6af44e9fc292668d80ce41664
SHA512d18519a25ed24cc8122f51dbc90141f2fc749c43cab37055d2573ca548b2dffc874f4abd9383e35ce875270823a0d83d8dd1a202fe82b4b7a1cc345fcbbb387d
-
Filesize
66KB
MD5e566b19369db78945fc075a359a4d164
SHA13aac0db20129774bda566176e7a29c7893908d57
SHA256c0e9cce2a6b87cba6efe975872e3ec59e8ede20c93e84086500b457bc2936e2b
SHA512b63a9ce3703e28ff7fa90c296b5c62c388a063a8638cf17e26b8952be47ec3e3974d93d92ebb15087f4251d85ccc12e81e85f9d90044c05925a7956fbcb4d77b
-
Filesize
66KB
MD5e566b19369db78945fc075a359a4d164
SHA13aac0db20129774bda566176e7a29c7893908d57
SHA256c0e9cce2a6b87cba6efe975872e3ec59e8ede20c93e84086500b457bc2936e2b
SHA512b63a9ce3703e28ff7fa90c296b5c62c388a063a8638cf17e26b8952be47ec3e3974d93d92ebb15087f4251d85ccc12e81e85f9d90044c05925a7956fbcb4d77b
-
Filesize
66KB
MD57d811bd4f3d9a36681d29a9bf434886f
SHA105fc70947d24d41992d7625dc7838f71751ae678
SHA25699c40abca1952e7f96f1643f991d2d4633902affebc724951ab5a00995f10b38
SHA512a77354c171a53f103d9a28ce96849edbfc1704a7474520accbcdd4f42a8a5751117cc07577a000b971971d8e03435c0bf66bc05dcdaf5425b1d6a5e965bf145d
-
Filesize
66KB
MD57d811bd4f3d9a36681d29a9bf434886f
SHA105fc70947d24d41992d7625dc7838f71751ae678
SHA25699c40abca1952e7f96f1643f991d2d4633902affebc724951ab5a00995f10b38
SHA512a77354c171a53f103d9a28ce96849edbfc1704a7474520accbcdd4f42a8a5751117cc07577a000b971971d8e03435c0bf66bc05dcdaf5425b1d6a5e965bf145d
-
Filesize
66KB
MD546e3f80067fdf038b8628505d16d0226
SHA188dc5b5ce31213413d6e28b8aa8abb38542a9e42
SHA256d75ab02df1ee6bb5903ef2262eb0ac9c508e6f139bb49cbed288a40a8b22afa9
SHA51249f0e0ac9ff56e2b9d26260e13c9ab6baeaee088c284e35dde1685b8e50ef2935cfc4fb020492b811169d57444cf344949b2ec0bf28543166e8eea7f1d34412d
-
Filesize
66KB
MD546e3f80067fdf038b8628505d16d0226
SHA188dc5b5ce31213413d6e28b8aa8abb38542a9e42
SHA256d75ab02df1ee6bb5903ef2262eb0ac9c508e6f139bb49cbed288a40a8b22afa9
SHA51249f0e0ac9ff56e2b9d26260e13c9ab6baeaee088c284e35dde1685b8e50ef2935cfc4fb020492b811169d57444cf344949b2ec0bf28543166e8eea7f1d34412d
-
Filesize
66KB
MD57ba3fa8f6896f15d2a867539c4898b50
SHA16433aefa5839f0c9b8a8ae9fc8d59925e13c68f7
SHA25632bf25f96a3bd3700de51c8a173e6934546c89b7826f9c3d40901dedf2c2d3a1
SHA512dd7e70ec9bc3aed5fac2424d39b25ccc2113c92f4f575b09e3f1a418c70b78a722dc174b5ab81e13ed417daf726295b9aa051e9224cbfaca7c4f9696bd8a0404
-
Filesize
66KB
MD57ba3fa8f6896f15d2a867539c4898b50
SHA16433aefa5839f0c9b8a8ae9fc8d59925e13c68f7
SHA25632bf25f96a3bd3700de51c8a173e6934546c89b7826f9c3d40901dedf2c2d3a1
SHA512dd7e70ec9bc3aed5fac2424d39b25ccc2113c92f4f575b09e3f1a418c70b78a722dc174b5ab81e13ed417daf726295b9aa051e9224cbfaca7c4f9696bd8a0404
-
Filesize
66KB
MD5fd9645922c25532d367bd9babb41b1a6
SHA18579a30bd96c7eaf95d27805f761d6f197c4f49b
SHA256126aa9c719215621ee238da228691954e15df30756c9337d8cbec1824b99a959
SHA512d838c2725e4de007251016142ef37adfa34ba1165f79148253aaf0701494d1ce2e8d1dc15cd930c92255cc8de75d897b360c1aa726d894d82935a15a8a0c0f79
-
Filesize
66KB
MD5fd9645922c25532d367bd9babb41b1a6
SHA18579a30bd96c7eaf95d27805f761d6f197c4f49b
SHA256126aa9c719215621ee238da228691954e15df30756c9337d8cbec1824b99a959
SHA512d838c2725e4de007251016142ef37adfa34ba1165f79148253aaf0701494d1ce2e8d1dc15cd930c92255cc8de75d897b360c1aa726d894d82935a15a8a0c0f79
-
Filesize
66KB
MD56438df5d18f9a23413da74c20d3dfe03
SHA19db987c11c7f98e1b34d2925c0fbf24faa32a401
SHA2566b5aa3449abace4cff231df7a6d0d535ed1dd883397dae6bd942777157324968
SHA512e2c23d821553825f9c436e045107cad93789f5a4edec4d782cd1df2aad5ddb5f69bcd020224b7f249996e5db7a06e47b233d113c6955673aa589fa31d50c2a4b
-
Filesize
66KB
MD56438df5d18f9a23413da74c20d3dfe03
SHA19db987c11c7f98e1b34d2925c0fbf24faa32a401
SHA2566b5aa3449abace4cff231df7a6d0d535ed1dd883397dae6bd942777157324968
SHA512e2c23d821553825f9c436e045107cad93789f5a4edec4d782cd1df2aad5ddb5f69bcd020224b7f249996e5db7a06e47b233d113c6955673aa589fa31d50c2a4b
-
Filesize
66KB
MD50c7e7d4a317b1218b179dd965d4f0bed
SHA1c48ba64cb1625c1b7400d11171b762dd5b1ae96a
SHA256d213285df5e01e04a26e6ea5f1655c54e9660896de9114fe46150af5e7b87784
SHA5124fc896c78fa13f44c38902bb6c8842d82e15ecf8a5e399f675bcd89eb30021fc6aec14f9246e335b02b61875bfafad1e7caa00a1fc82794fb283732563579aa2
-
Filesize
66KB
MD50c7e7d4a317b1218b179dd965d4f0bed
SHA1c48ba64cb1625c1b7400d11171b762dd5b1ae96a
SHA256d213285df5e01e04a26e6ea5f1655c54e9660896de9114fe46150af5e7b87784
SHA5124fc896c78fa13f44c38902bb6c8842d82e15ecf8a5e399f675bcd89eb30021fc6aec14f9246e335b02b61875bfafad1e7caa00a1fc82794fb283732563579aa2
-
Filesize
80KB
MD59b02808f4e0b8a5e71a37949b6db062b
SHA1715e45ad25db0fd7d2c1d856906637fd6467715c
SHA2560c8f585418bce392ecbd330bae9a3535a4d92a2c9283e031024612935641cc30
SHA51291844eb4490713c328704a0e4351fbce976a72136622b21f56fd9ae6f821eb5aa445c61ad07d885e67b126a2e66c3bb73d8e90bc305ffb48c94dcac650c6f415