Analysis
-
max time kernel
65s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 23:51
Behavioral task
behavioral1
Sample
abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe
Resource
win7-20220901-en
windows7-x64
9 signatures
150 seconds
General
-
Target
abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe
-
Size
34KB
-
MD5
16733b4c328622b2dbc4b062214cdd22
-
SHA1
c1ebbb333f7b8c36615f12c05d9522e3ac7ab64f
-
SHA256
abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698
-
SHA512
d3b8fc0598e1214bbe39816b8f0caa0406e7b813d3da19d11fa08f2bbcdb6cd6bc4e0f428fad70fc2859304bd8a41d9c9d12f8dcbe4d7950d7fe50762f51776e
-
SSDEEP
768:I+6RcpA0HJXVGQwxspJgwivSBEaoV4jZ34agYUtqZ:ILa3H2wim1oV0dJ+C
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
resource yara_rule behavioral1/memory/1600-58-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/1600-59-0x0000000000400000-0x0000000000426000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wscntfy.exe abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe File opened for modification C:\Windows\SysWOW64\wscntfy.exe abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\PhishingFilter\Enabled = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PhishingFilter abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PhishingFilter\Enabled = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\PhishingFilter abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\PhishingFilter abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\PhishingFilter\Enabled = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1600 abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe 1600 abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe"C:\Users\Admin\AppData\Local\Temp\abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer Phishing Filter
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1600