Analysis
-
max time kernel
105s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
b4ed6765d4848e89b7aeee7d71b25686553cd59aeafdae29228d83d9d8f7bff0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b4ed6765d4848e89b7aeee7d71b25686553cd59aeafdae29228d83d9d8f7bff0.exe
Resource
win10v2004-20220901-en
General
-
Target
b4ed6765d4848e89b7aeee7d71b25686553cd59aeafdae29228d83d9d8f7bff0.exe
-
Size
56KB
-
MD5
83d1b23846870ca87cfc9ca9efd41527
-
SHA1
1d94ab2339d842527dd7b283e72488504cd5e954
-
SHA256
b4ed6765d4848e89b7aeee7d71b25686553cd59aeafdae29228d83d9d8f7bff0
-
SHA512
3a48a0ac384944582aaf0f1ae59fbb29e605b8e1ff28e040c5b31e1540d2a4063564cf3548cd9b5ccb829cf75c7de5a2f7abfbb305d2571ff0f08b5a3590b389
-
SSDEEP
768://Cc9et/M/57hQ6GceJeTaENag0qSUWPYfIc/Qi3qEBQpApHc:HCcYt/MRlQ6VeJ/LOUpApHc
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" b4ed6765d4848e89b7aeee7d71b25686553cd59aeafdae29228d83d9d8f7bff0.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E6630F5F-B6DB-4246-B921-8C1A5FB792C4} b4ed6765d4848e89b7aeee7d71b25686553cd59aeafdae29228d83d9d8f7bff0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E6630F5F-B6DB-4246-B921-8C1A5FB792C4}\StubPath = "C:\\Windows\\system32\\spoolsvr.exe" b4ed6765d4848e89b7aeee7d71b25686553cd59aeafdae29228d83d9d8f7bff0.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\spoolsvr.exe b4ed6765d4848e89b7aeee7d71b25686553cd59aeafdae29228d83d9d8f7bff0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2224 b4ed6765d4848e89b7aeee7d71b25686553cd59aeafdae29228d83d9d8f7bff0.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b4ed6765d4848e89b7aeee7d71b25686553cd59aeafdae29228d83d9d8f7bff0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" b4ed6765d4848e89b7aeee7d71b25686553cd59aeafdae29228d83d9d8f7bff0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4ed6765d4848e89b7aeee7d71b25686553cd59aeafdae29228d83d9d8f7bff0.exe"C:\Users\Admin\AppData\Local\Temp\b4ed6765d4848e89b7aeee7d71b25686553cd59aeafdae29228d83d9d8f7bff0.exe"1⤵
- UAC bypass
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2224