Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 07:13
Static task
static1
Behavioral task
behavioral1
Sample
7999aaa9f33981c58a73448cc5778c0c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7999aaa9f33981c58a73448cc5778c0c.exe
Resource
win10v2004-20231222-en
General
-
Target
7999aaa9f33981c58a73448cc5778c0c.exe
-
Size
232KB
-
MD5
7999aaa9f33981c58a73448cc5778c0c
-
SHA1
cc5ff93b593de57aeea9ec7713f9b61ac57fa28d
-
SHA256
0cf276945bc54e734b7ea57cce18b2dabdc7bb18d0a849ee54f319de5c11ba5c
-
SHA512
bf5e2c5370d149959d61b68caa72b5ac8fc678d97adce15cf41409ffabf4a9cb52233d794fb2ea423dea8b046a9c2c3f0b043b0b6bd0c278bad15b95db94123a
-
SSDEEP
3072:lHMNyf21VHTCyPNHhP/VToqbeAtoH2ts7bLkAV7sp23MANi4q6DT4a:lHM1t5tDoH2tIs
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List Easy Cafe Client.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile Easy Cafe Client.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications Easy Cafe Client.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Easy Cafe Client.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Easy Cafe Client.exe:*:Enabled:Easy Cafe Client" Easy Cafe Client.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Easy Cafe Client.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" Easy Cafe Client.exe -
Executes dropped EXE 1 IoCs
pid Process 3900 Easy Cafe Client.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" Easy Cafe Client.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Easy Cafe Client = "C:\\Users\\Admin\\AppData\\Roaming\\Easy Cafe Client.exe" Easy Cafe Client.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Easy Cafe Client.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Easy Cafe Client.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Easy Cafe Client.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Log.txt Easy Cafe Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 3900 Easy Cafe Client.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4068 7999aaa9f33981c58a73448cc5778c0c.exe 3900 Easy Cafe Client.exe 3900 Easy Cafe Client.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4068 wrote to memory of 3900 4068 7999aaa9f33981c58a73448cc5778c0c.exe 28 PID 4068 wrote to memory of 3900 4068 7999aaa9f33981c58a73448cc5778c0c.exe 28 PID 4068 wrote to memory of 3900 4068 7999aaa9f33981c58a73448cc5778c0c.exe 28 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Easy Cafe Client.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7999aaa9f33981c58a73448cc5778c0c.exe"C:\Users\Admin\AppData\Local\Temp\7999aaa9f33981c58a73448cc5778c0c.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Roaming\Easy Cafe Client.exe
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3900
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD57999aaa9f33981c58a73448cc5778c0c
SHA1cc5ff93b593de57aeea9ec7713f9b61ac57fa28d
SHA2560cf276945bc54e734b7ea57cce18b2dabdc7bb18d0a849ee54f319de5c11ba5c
SHA512bf5e2c5370d149959d61b68caa72b5ac8fc678d97adce15cf41409ffabf4a9cb52233d794fb2ea423dea8b046a9c2c3f0b043b0b6bd0c278bad15b95db94123a