Analysis
-
max time kernel
190s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 15:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
79e37b464938e19ec450f2408bf5dd07.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
79e37b464938e19ec450f2408bf5dd07.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
79e37b464938e19ec450f2408bf5dd07.exe
-
Size
1.0MB
-
MD5
79e37b464938e19ec450f2408bf5dd07
-
SHA1
11caa525e5a5061a4e6b5b86006601c784b6a95f
-
SHA256
a27e62c716fd3e19d53fe27c25a3238d805fecc13375b46c67409eabc0c7275e
-
SHA512
fc00ca78ee6d6aeb7f259f0a854008057d50c1682adddb624ef56a6a770fc5657576b6d801260db7a3e4fc2247de64202baea4ab9a8c509bc696c32f55c55a30
-
SSDEEP
24576:wT+XEHz48vLwhrAdKu0Gr1yDJXvKoxuecF3C58ospiEwV5wXC:wTn8kdK7amZKwuPF3wFHwy
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 79e37b464938e19ec450f2408bf5dd07.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 79e37b464938e19ec450f2408bf5dd07.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 79e37b464938e19ec450f2408bf5dd07.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 79e37b464938e19ec450f2408bf5dd07.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2780 set thread context of 2676 2780 79e37b464938e19ec450f2408bf5dd07.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2528 2676 WerFault.exe 29 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 2780 79e37b464938e19ec450f2408bf5dd07.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2780 79e37b464938e19ec450f2408bf5dd07.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2676 2780 79e37b464938e19ec450f2408bf5dd07.exe 29 PID 2780 wrote to memory of 2676 2780 79e37b464938e19ec450f2408bf5dd07.exe 29 PID 2780 wrote to memory of 2676 2780 79e37b464938e19ec450f2408bf5dd07.exe 29 PID 2780 wrote to memory of 2676 2780 79e37b464938e19ec450f2408bf5dd07.exe 29 PID 2780 wrote to memory of 2676 2780 79e37b464938e19ec450f2408bf5dd07.exe 29 PID 2780 wrote to memory of 2676 2780 79e37b464938e19ec450f2408bf5dd07.exe 29 PID 2780 wrote to memory of 2676 2780 79e37b464938e19ec450f2408bf5dd07.exe 29 PID 2780 wrote to memory of 2676 2780 79e37b464938e19ec450f2408bf5dd07.exe 29 PID 2780 wrote to memory of 2676 2780 79e37b464938e19ec450f2408bf5dd07.exe 29 PID 2676 wrote to memory of 2528 2676 79e37b464938e19ec450f2408bf5dd07.exe 30 PID 2676 wrote to memory of 2528 2676 79e37b464938e19ec450f2408bf5dd07.exe 30 PID 2676 wrote to memory of 2528 2676 79e37b464938e19ec450f2408bf5dd07.exe 30 PID 2676 wrote to memory of 2528 2676 79e37b464938e19ec450f2408bf5dd07.exe 30 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 79e37b464938e19ec450f2408bf5dd07.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79e37b464938e19ec450f2408bf5dd07.exe"C:\Users\Admin\AppData\Local\Temp\79e37b464938e19ec450f2408bf5dd07.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\79e37b464938e19ec450f2408bf5dd07.exeC:\Users\Admin\AppData\Local\Temp\79e37b464938e19ec450f2408bf5dd07.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 1283⤵
- Program crash
PID:2528
-
-