Analysis
-
max time kernel
96s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2023 06:48
Behavioral task
behavioral1
Sample
c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exe
Resource
win7-20230220-en
windows7-x64
6 signatures
150 seconds
General
-
Target
c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exe
-
Size
244KB
-
MD5
17782ef70085b3d7fe63a6cc4ad315cb
-
SHA1
18564fa1323633d905571b9b4b9dea51e0d0b5a9
-
SHA256
c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda
-
SHA512
6d5e22e4d058555344d37b2f96455ca56f40076472d1872b5b03bbf35eeffc4e68202cc2becd0611ccff0930eb88a91370cd28d5307b5c5fe1be87021800205f
-
SSDEEP
3072:nFXMiTZOek0drM6a4VsBGcddZ2G3xebtvZxsmz:nFXMiTZxdrpK1vEZA
Malware Config
Signatures
-
Processes:
c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\IESettingSync c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exedescription pid process Token: SeDebugPrivilege 3268 c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exepid process 3268 c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exe 3268 c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exe 3268 c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exe"C:\Users\Admin\AppData\Local\Temp\c633820dcc53595bb956125ca723c7b2a4bc9b1baf44534c9597910185052cda.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3268