Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
7434859c3d599b1e6d66e23223ceb842.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7434859c3d599b1e6d66e23223ceb842.exe
Resource
win10v2004-20231215-en
General
-
Target
7434859c3d599b1e6d66e23223ceb842.exe
-
Size
364KB
-
MD5
7434859c3d599b1e6d66e23223ceb842
-
SHA1
e305d918c1d44cba163fe11bbe3ee9d7b94cfb5c
-
SHA256
ee350f0dc09c7f71e59a928e485caef023cc04e84f98fda7a83fbc33482dfca0
-
SHA512
2ddef289f84a03172df1940d1503334a9846168b1bea78ddc251212f228fafecad2347c7791145cc6072f86a5205abf67f65e2ea1354a8766bba8e79b0aad71c
-
SSDEEP
6144:U5u9zt0vzIvxHxQ9JaXAU79jun7jdlF5EA/WfLSzusLMYA97cJdISmnR2eCsbP7R:U5yt0cxH+GXBsnp5EYWzEuWMHofaR2eR
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6AEB00014973000A4136B4EB2331.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000A4136B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 3052 043A6AEB00014973000A4136B4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 043A6AEB00014973000A4136B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2932 7434859c3d599b1e6d66e23223ceb842.exe 2932 7434859c3d599b1e6d66e23223ceb842.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6AEB00014973000A4136B4EB2331.exe -
Modifies registry class 22 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\shell\start\command\IsolatedCommand = "\"%1\" %*" 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\.exe 043A6AEB00014973000A4136B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\.exe\ = "043A6" 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\shell\open 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\shell\start 043A6AEB00014973000A4136B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\shell\start\command\ = "\"%1\" %*" 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\shell\runas 043A6AEB00014973000A4136B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\shell\runas\command\ = "\"%1\" %*" 043A6AEB00014973000A4136B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\%s\ = "043A6" 043A6AEB00014973000A4136B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\ = "Application" 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\DefaultIcon 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\shell\start\command 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\shell\runas\command 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\%s 043A6AEB00014973000A4136B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\DefaultIcon\ = "%1" 043A6AEB00014973000A4136B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\shell\open\command\ = "\"C:\\ProgramData\\043A6AEB00014973000A4136B4EB2331\\043A6AEB00014973000A4136B4EB2331.exe\" -s \"%1\" %*" 043A6AEB00014973000A4136B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\shell\open\command\IsolatedCommand = "\"%1\" %*" 043A6AEB00014973000A4136B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\Content Type = "application/x-msdownload" 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\shell\open\command 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\shell 043A6AEB00014973000A4136B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\043A6\shell\runas\command\IsolatedCommand = "\"%1\" %*" 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2932 7434859c3d599b1e6d66e23223ceb842.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3052 043A6AEB00014973000A4136B4EB2331.exe 3052 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 3052 2932 7434859c3d599b1e6d66e23223ceb842.exe 28 PID 2932 wrote to memory of 3052 2932 7434859c3d599b1e6d66e23223ceb842.exe 28 PID 2932 wrote to memory of 3052 2932 7434859c3d599b1e6d66e23223ceb842.exe 28 PID 2932 wrote to memory of 3052 2932 7434859c3d599b1e6d66e23223ceb842.exe 28 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6AEB00014973000A4136B4EB2331.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7434859c3d599b1e6d66e23223ceb842.exe"C:\Users\Admin\AppData\Local\Temp\7434859c3d599b1e6d66e23223ceb842.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\ProgramData\043A6AEB00014973000A4136B4EB2331\043A6AEB00014973000A4136B4EB2331.exe"C:\ProgramData\043A6AEB00014973000A4136B4EB2331\043A6AEB00014973000A4136B4EB2331.exe" -d "C:\Users\Admin\AppData\Local\Temp\7434859c3d599b1e6d66e23223ceb842.exe"2⤵
- UAC bypass
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD57434859c3d599b1e6d66e23223ceb842
SHA1e305d918c1d44cba163fe11bbe3ee9d7b94cfb5c
SHA256ee350f0dc09c7f71e59a928e485caef023cc04e84f98fda7a83fbc33482dfca0
SHA5122ddef289f84a03172df1940d1503334a9846168b1bea78ddc251212f228fafecad2347c7791145cc6072f86a5205abf67f65e2ea1354a8766bba8e79b0aad71c