Analysis
-
max time kernel
152s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 23:51
Behavioral task
behavioral1
Sample
abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe
Resource
win7-20220901-en
9 signatures
150 seconds
General
-
Target
abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe
-
Size
34KB
-
MD5
16733b4c328622b2dbc4b062214cdd22
-
SHA1
c1ebbb333f7b8c36615f12c05d9522e3ac7ab64f
-
SHA256
abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698
-
SHA512
d3b8fc0598e1214bbe39816b8f0caa0406e7b813d3da19d11fa08f2bbcdb6cd6bc4e0f428fad70fc2859304bd8a41d9c9d12f8dcbe4d7950d7fe50762f51776e
-
SSDEEP
768:I+6RcpA0HJXVGQwxspJgwivSBEaoV4jZ34agYUtqZ:ILa3H2wim1oV0dJ+C
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
resource yara_rule behavioral2/memory/2832-133-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2832-136-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2832-138-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wscntfy.exe abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe File opened for modification C:\Windows\SysWOW64\wscntfy.exe abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer Phishing Filter 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\PhishingFilter\Enabled = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\PhishingFilter abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\Enabled = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\PhishingFilter abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\PhishingFilter abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\PhishingFilter\Enabled = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3808 shutdown.exe Token: SeRemoteShutdownPrivilege 3808 shutdown.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2832 abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe 2832 abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2832 wrote to memory of 3808 2832 abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe 87 PID 2832 wrote to memory of 3808 2832 abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe 87 PID 2832 wrote to memory of 3808 2832 abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe 87 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe"C:\Users\Admin\AppData\Local\Temp\abb9cc05863a9a471b365643773198df2dd34623296c3447a655274b0fba0698.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer Phishing Filter
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2832 -
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" -r -f -t 6002⤵
- Suspicious use of AdjustPrivilegeToken
PID:3808
-