Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
prueba.exe
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
prueba.exe
-
Size
32KB
-
MD5
12405a80873fd3356816a2d119092b20
-
SHA1
1a197f7072ac437b045e5c09a0367f28fa057e03
-
SHA256
35cde2f922dbf21b04ecd279f03a7059fc5ad36271e7fd2d2d8c24b11c3b40c4
-
SHA512
561fab62d9ae72356e6ac141dc3469ff428e8e18b38003a6b041029fe96c8f0282d2ef279b191f25af084e61ddcef44863465fa52011eef81e4e41269500a6f6
-
SSDEEP
384:r74YGqTn5LmaXL9Pv+Z2F4za5bngoHkXLvuY+eVypYDJ0sNCn:RGMcaX75cDKYQpiLU
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2176 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2172 prueba.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2316 2172 prueba.exe 18 PID 2172 wrote to memory of 2316 2172 prueba.exe 18 PID 2172 wrote to memory of 2316 2172 prueba.exe 18 PID 2172 wrote to memory of 2316 2172 prueba.exe 18 PID 2316 wrote to memory of 2176 2316 cmd.exe 17 PID 2316 wrote to memory of 2176 2316 cmd.exe 17 PID 2316 wrote to memory of 2176 2316 cmd.exe 17 PID 2316 wrote to memory of 2176 2316 cmd.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\prueba.exe"C:\Users\Admin\AppData\Local\Temp\prueba.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2316
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f1⤵
- UAC bypass
- Modifies registry key
PID:2176