Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2023, 03:45

General

  • Target

    d664295e0760cfc993320b34a1c9a0e7.exe

  • Size

    560KB

  • MD5

    d664295e0760cfc993320b34a1c9a0e7

  • SHA1

    14a57de65343990a557963c4ed69fd1243c729f5

  • SHA256

    94ccbafb8cebaffb3a3e79c31e0b16dcef16f9caae6dad02b093ee84fc16f49b

  • SHA512

    52a4ad444978ff902da3ae4391bb37c3715aeb67e2bb7fa4fb16fdde7f62af3344211d00ccbde8bdbb05a012579c5a476d0ba74a008572fd49efdb09b2cc1504

  • SSDEEP

    12288:1PVV/jr///zyXGyBcw/aNPRWPXA1mrahYJfuy:tjD3zyXJBceOJW0mrhf

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d664295e0760cfc993320b34a1c9a0e7.exe
    "C:\Users\Admin\AppData\Local\Temp\d664295e0760cfc993320b34a1c9a0e7.exe"
    1⤵
    • Adds policy Run key to start application
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1088
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:2564
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\d664295e0760cfc993320b34a1c9a0e7.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\d664295e0760cfc993320b34a1c9a0e7.exe:*:Enabled:Windows Messanger" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4704
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\d664295e0760cfc993320b34a1c9a0e7.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\d664295e0760cfc993320b34a1c9a0e7.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:4272
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\updates.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\updates.exe:*:Enabled:Windows Messanger" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4772
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\updates.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\updates.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:3244
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3908
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:3156
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:1004

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\wsuA846.tmp

          Filesize

          14KB

          MD5

          c01eaa0bdcd7c30a42bbb35a9acbf574

          SHA1

          0aee3e1b873e41d040f1991819d0027b6cc68f54

          SHA256

          32297224427103aa1834dba276bf5d49cd5dd6bda0291422e47ad0d0706c6d40

          SHA512

          d26ff775ad39425933cd3df92209faa53ec5b701e65bfbcccc64ce8dd3e79f619a9bad7cc975a98a95f2006ae89e50551877fc315a3050e48d5ab89e0802e2b7

        • memory/1848-139-0x0000000076750000-0x0000000076840000-memory.dmp

          Filesize

          960KB

        • memory/1848-141-0x00000000766D0000-0x000000007674A000-memory.dmp

          Filesize

          488KB

        • memory/1848-140-0x0000000077E06000-0x0000000077E07000-memory.dmp

          Filesize

          4KB

        • memory/1848-142-0x0000000076750000-0x0000000076840000-memory.dmp

          Filesize

          960KB

        • memory/1848-146-0x00000000766D0000-0x000000007674A000-memory.dmp

          Filesize

          488KB