Analysis
-
max time kernel
157s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 16:04
Static task
static1
Behavioral task
behavioral1
Sample
5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe
Resource
win7-20221111-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe
-
Size
603KB
-
MD5
ae4fdaf5342444bd17d0f95fca9e180c
-
SHA1
21040dc0b209cdba1b7db874318dcff8146038ec
-
SHA256
5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b
-
SHA512
ab1d3db02c24e0aea701ec0c709480732760036e9a081c26000ba0aadc00fea767b08edca0dd4143b79c93d830bf901d142514d2113c32087df3a6cabb327cb9
-
SSDEEP
12288:tllGx3jvBXviRlfN7BBAI36MX4TlRrZd1p:t6jZXoTJ34TlRrZd
Score
10/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe -
Disables taskbar notifications via registry modification
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Security Center\svc 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\svc 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\DisableAntiSpyware = "1" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\0652A38ED8E3E6F3000006529D40EBA3 = "C:\\ProgramData\\0652A38ED8E3E6F3000006529D40EBA3\\0652A38ED8E3E6F3000006529D40EBA3.exe" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe -
Program crash 15 IoCs
pid pid_target Process procid_target 2748 3584 WerFault.exe 79 2076 3584 WerFault.exe 79 4224 3584 WerFault.exe 79 4664 3584 WerFault.exe 79 3024 3584 WerFault.exe 79 4032 3584 WerFault.exe 79 1684 3584 WerFault.exe 79 400 3584 WerFault.exe 79 1424 3584 WerFault.exe 79 3548 3584 WerFault.exe 79 616 3584 WerFault.exe 79 4272 3584 WerFault.exe 79 2632 3584 WerFault.exe 79 2052 3584 WerFault.exe 79 3148 3584 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe 3584 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe"C:\Users\Admin\AppData\Local\Temp\5e743fa549ed109e4b27c9fd01ac14629b7a6306db377b9a6f7f09ca954bde0b.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 5482⤵
- Program crash
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 6842⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 7082⤵
- Program crash
PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 7242⤵
- Program crash
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 7802⤵
- Program crash
PID:3024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 7682⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 8202⤵
- Program crash
PID:1684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 8562⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 10202⤵
- Program crash
PID:1424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 10442⤵
- Program crash
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 11122⤵
- Program crash
PID:616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 13042⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 8282⤵
- Program crash
PID:2632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 14802⤵
- Program crash
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 5922⤵
- Program crash
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3584 -ip 35841⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3584 -ip 35841⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3584 -ip 35841⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3584 -ip 35841⤵PID:3368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3584 -ip 35841⤵PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3584 -ip 35841⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3584 -ip 35841⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3584 -ip 35841⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3584 -ip 35841⤵PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3584 -ip 35841⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3584 -ip 35841⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3584 -ip 35841⤵PID:2880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3584 -ip 35841⤵PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3584 -ip 35841⤵PID:1020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3584 -ip 35841⤵PID:2692