Analysis
-
max time kernel
207s -
max time network
216s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 14:55
Behavioral task
behavioral1
Sample
4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe
Resource
win7-20221111-en
windows7-x64
12 signatures
150 seconds
General
-
Target
4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe
-
Size
401KB
-
MD5
f0903e43e848fc69dbf9564ee9d92a26
-
SHA1
43b9f205e95c3561c7696fe00ee0344a986974d8
-
SHA256
4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490
-
SHA512
1af875d646b500addc40271242250c113b7496615f7cee41e020b058d815a2b51458216e3b1aa40735f6fbfbc6cbad64fc9c1667720236783ecca6cbc38d204e
-
SSDEEP
6144:nuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLIyHqS61/R9USayhy:u6Wq4aaE6KwyF5L0Y2D1PqLIn1oH
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe -
resource yara_rule behavioral2/memory/2876-132-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral2/memory/2876-133-0x0000000000400000-0x00000000004EE000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2876-133-0x0000000000400000-0x00000000004EE000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2876 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe 2876 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe 2876 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe 2876 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2876 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe 2876 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe 2876 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2876 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe 2876 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe 2876 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe"C:\Users\Admin\AppData\Local\Temp\4c5eeb6d63db26cfc2928494fe89aeb927381b5bf528741a7775c49a80b30490.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- System policy modification
PID:2876