Analysis
-
max time kernel
147s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20231025-en -
resource tags
arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system -
submitted
12/11/2023, 06:01
Static task
static1
General
-
Target
57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe
-
Size
175KB
-
MD5
f80c45ad8b0c5f6300417d1a096f1084
-
SHA1
f526bc7e7e4d5cc8dae1108a7a96d67e92c880f6
-
SHA256
57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51
-
SHA512
4a5cee0c69ed02d7eb6aa4dc590fda3d151b0f95ecf88eb4070d9fa73cc2afc31791c36b3680b23d0f66af1152410056db58cd82f56aa0c245b5bdf66b963868
-
SSDEEP
3072:QHSQnvJrkAlEEPuFH4o39wlUpeL/E6vFgJNRR4beXLbRkjFAJDHYhKfJeYUO:QhgAiBB39wlUsTE6vBbeXLbyGJ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe = "0" 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe -
Downloads MZ/PE file
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WyA9Xo3cAhz8YAZ9gPKn8Klu.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6B1m7gbRFpA3Pke657ScEkkd.bat AddInProcess32.exe -
Executes dropped EXE 2 IoCs
pid Process 4460 zr5sRGhrwh1tdWOqycn3RnRi.exe 1224 Broom.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe = "0" 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4224 set thread context of 980 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 74 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 1296 powershell.exe 1296 powershell.exe 1296 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe Token: SeDebugPrivilege 980 AddInProcess32.exe Token: SeDebugPrivilege 1296 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1224 Broom.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4224 wrote to memory of 1296 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 71 PID 4224 wrote to memory of 1296 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 71 PID 4224 wrote to memory of 1296 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 71 PID 4224 wrote to memory of 2084 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 73 PID 4224 wrote to memory of 2084 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 73 PID 4224 wrote to memory of 2084 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 73 PID 4224 wrote to memory of 980 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 74 PID 4224 wrote to memory of 980 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 74 PID 4224 wrote to memory of 980 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 74 PID 4224 wrote to memory of 980 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 74 PID 4224 wrote to memory of 980 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 74 PID 4224 wrote to memory of 980 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 74 PID 4224 wrote to memory of 980 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 74 PID 4224 wrote to memory of 980 4224 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe 74 PID 980 wrote to memory of 4460 980 AddInProcess32.exe 75 PID 980 wrote to memory of 4460 980 AddInProcess32.exe 75 PID 980 wrote to memory of 4460 980 AddInProcess32.exe 75 PID 4460 wrote to memory of 1224 4460 zr5sRGhrwh1tdWOqycn3RnRi.exe 76 PID 4460 wrote to memory of 1224 4460 zr5sRGhrwh1tdWOqycn3RnRi.exe 76 PID 4460 wrote to memory of 1224 4460 zr5sRGhrwh1tdWOqycn3RnRi.exe 76 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe"C:\Users\Admin\AppData\Local\Temp\57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵PID:2084
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\Pictures\zr5sRGhrwh1tdWOqycn3RnRi.exe"C:\Users\Admin\Pictures\zr5sRGhrwh1tdWOqycn3RnRi.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1224
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
7KB
MD5fcad815e470706329e4e327194acc07c
SHA1c4edd81d00318734028d73be94bc3904373018a9
SHA256280d939a66a0107297091b3b6f86d6529ef6fac222a85dbc82822c3d5dc372b8
SHA512f4031b49946da7c6c270e0354ac845b5c77b9dfcd267442e0571dd33ccd5146bc352ed42b59800c9d166c8c1ede61469a00a4e8d3738d937502584e8a1b72485
-
Filesize
2.5MB
MD5e667404b229fb0be21bd339298f5d7c8
SHA132614e1b3342385b1eb20314e4881482c5d9d22f
SHA256163ff2b3d915e4829962eeb5c7161aacd9473a1c9e36d853d67163f8c409eca5
SHA512a4630141837051cd7b0bf2e58d972601fdb0d17e240abed96a90a72e7ab3631e0133b92c1fe3ab9de0c93032b13f3cba96be58c0745bcb0e1182ed50183522ec
-
Filesize
2.5MB
MD5e667404b229fb0be21bd339298f5d7c8
SHA132614e1b3342385b1eb20314e4881482c5d9d22f
SHA256163ff2b3d915e4829962eeb5c7161aacd9473a1c9e36d853d67163f8c409eca5
SHA512a4630141837051cd7b0bf2e58d972601fdb0d17e240abed96a90a72e7ab3631e0133b92c1fe3ab9de0c93032b13f3cba96be58c0745bcb0e1182ed50183522ec