Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
6a6c91c252eb0a31faade2ce71ea54b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6a6c91c252eb0a31faade2ce71ea54b9.exe
Resource
win10v2004-20231215-en
General
-
Target
6a6c91c252eb0a31faade2ce71ea54b9.exe
-
Size
898KB
-
MD5
6a6c91c252eb0a31faade2ce71ea54b9
-
SHA1
37f3afc8e730506fbea34f09300a893dd5a07a6d
-
SHA256
92441d62ebcd8c2474473bcf7d7599c6772e4828fa9803e97c808d1bec18e98d
-
SHA512
347e7e79fdd23d821e4d5234f88a4b6a5e2a83b0d3eaddfc76928c1e44edb6de1523da1f7aad5cb2641f5d7f784b725eab618efe485a3b54c4596de1d2585e2e
-
SSDEEP
12288:nx53rirHbCWJuS5TIcqk70D9DO0bY907IDU6/eb0esFCEg:nx53UgXcqk70x6YYe75mZdCEg
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6a6c91c252eb0a31faade2ce71ea54b9.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4976 netsh.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System32 = "\"C:\\Users\\Admin\\AppData\\Roaming\\logon.exe\"" 6a6c91c252eb0a31faade2ce71ea54b9.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System64 = "\"C:\\Windows\\system32\\logon.exe\"" 6a6c91c252eb0a31faade2ce71ea54b9.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\logon.exe 6a6c91c252eb0a31faade2ce71ea54b9.exe File opened for modification C:\Windows\SysWOW64\logon.exe 6a6c91c252eb0a31faade2ce71ea54b9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2944 wrote to memory of 4976 2944 6a6c91c252eb0a31faade2ce71ea54b9.exe 32 PID 2944 wrote to memory of 4976 2944 6a6c91c252eb0a31faade2ce71ea54b9.exe 32 PID 2944 wrote to memory of 4976 2944 6a6c91c252eb0a31faade2ce71ea54b9.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a6c91c252eb0a31faade2ce71ea54b9.exe"C:\Users\Admin\AppData\Local\Temp\6a6c91c252eb0a31faade2ce71ea54b9.exe"1⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\netsh.exe"netsh.exe" firewall set opmode disable2⤵
- Modifies Windows Firewall
PID:4976
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1