Analysis
-
max time kernel
130s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
fb9fa099330ad18d15dd4fa8c732e7e63d3006b1fefcbacea42d98fae72f80c7.exe
Resource
win7-20221111-en
4 signatures
150 seconds
General
-
Target
fb9fa099330ad18d15dd4fa8c732e7e63d3006b1fefcbacea42d98fae72f80c7.exe
-
Size
40KB
-
MD5
b5620b90cd328394f31a9d176ff7b08b
-
SHA1
6f330d97740f7e9101132ac4e9090e4af6a8ef2b
-
SHA256
fb9fa099330ad18d15dd4fa8c732e7e63d3006b1fefcbacea42d98fae72f80c7
-
SHA512
5c7d6ed84695d5c8197eef50b839f6e1009c34089e124135378b377ec6677a1836174fe69273d388efcf991e22fb823695c17f4a607f3e95ede7ae12ff95b99f
-
SSDEEP
384:KQfSZ93kWF1E/yqWLeRYqYzmSAnYxOUdIP7oX8rAAC82bpFNjVgVl3czDX0sVK9:KJZ1EKqRYqYza8jX8JCd9R4
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2576 reg.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2484 fb9fa099330ad18d15dd4fa8c732e7e63d3006b1fefcbacea42d98fae72f80c7.exe 2484 fb9fa099330ad18d15dd4fa8c732e7e63d3006b1fefcbacea42d98fae72f80c7.exe 2484 fb9fa099330ad18d15dd4fa8c732e7e63d3006b1fefcbacea42d98fae72f80c7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2800 2484 fb9fa099330ad18d15dd4fa8c732e7e63d3006b1fefcbacea42d98fae72f80c7.exe 81 PID 2484 wrote to memory of 2800 2484 fb9fa099330ad18d15dd4fa8c732e7e63d3006b1fefcbacea42d98fae72f80c7.exe 81 PID 2484 wrote to memory of 2800 2484 fb9fa099330ad18d15dd4fa8c732e7e63d3006b1fefcbacea42d98fae72f80c7.exe 81 PID 2800 wrote to memory of 2576 2800 cmd.exe 83 PID 2800 wrote to memory of 2576 2800 cmd.exe 83 PID 2800 wrote to memory of 2576 2800 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb9fa099330ad18d15dd4fa8c732e7e63d3006b1fefcbacea42d98fae72f80c7.exe"C:\Users\Admin\AppData\Local\Temp\fb9fa099330ad18d15dd4fa8c732e7e63d3006b1fefcbacea42d98fae72f80c7.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:2576
-
-