Analysis

  • max time kernel
    60s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 00:15

General

  • Target

    1c292c9ebc755df120e7d8ba7857dcb5.exe

  • Size

    552KB

  • MD5

    1c292c9ebc755df120e7d8ba7857dcb5

  • SHA1

    1c264a1688f69625f71f2ee023541b0d2f0f83fd

  • SHA256

    05c39e2b9030ccb8fcda1663a1454067df1f5a21fb7a25937a12291ca2066dbd

  • SHA512

    1717a501fdd0cb83e8be4cb1295f58fc1ce9827835e5614bcd5554b9ff4e3330910331cd5d2c350101af9c9a4bff70b0375a118193e24083b06f614ba762370f

  • SSDEEP

    6144:ORMlLv36Qd7POVhtGmDkl3zT7aACtOajjKWyFeXDbpSJNFnQa6zVJSAESGB7:OSlLV5QtGmDi1Cv7GfJNpQZJJKB

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables taskbar notifications via registry modification
  • Windows security modification 2 TTPs 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c292c9ebc755df120e7d8ba7857dcb5.exe
    "C:\Users\Admin\AppData\Local\Temp\1c292c9ebc755df120e7d8ba7857dcb5.exe"
    1⤵
    • UAC bypass
    • Windows security bypass
    • Windows security modification
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:2180

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2180-0-0x00000000003D0000-0x00000000003D6000-memory.dmp

          Filesize

          24KB

        • memory/2180-2-0x00000000003E0000-0x00000000003E3000-memory.dmp

          Filesize

          12KB

        • memory/2180-1-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/2180-3-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/2180-5-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/2180-9-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB

        • memory/2180-17-0x0000000000400000-0x000000000050D000-memory.dmp

          Filesize

          1.1MB