Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
b93127274edde80050d425d8306ef03e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b93127274edde80050d425d8306ef03e.exe
Resource
win10v2004-20240226-en
General
-
Target
b93127274edde80050d425d8306ef03e.exe
-
Size
2.4MB
-
MD5
b93127274edde80050d425d8306ef03e
-
SHA1
404d8306b2a391bf744490d993ac6059144da2c6
-
SHA256
cb875bdb6314c7e7edefa075640162eb99cf088f72fe18a18584761c092efad8
-
SHA512
d9ba993be85d0d08b7a719ce955498a1ae9c27cfb5d595fc689507d9832b049a78970cbda810093786e9ce3348e9809e1d59335d009ab02061f965c7d1105f1c
-
SSDEEP
49152:Tj9EMp9bpMd3nHHGg1rKlmAYkGtUx7lBhKCn+tYjd2lP+6+o:TK9rsrYjY7lD3+tUd2l2
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\atualizada.sys b93127274edde80050d425d8306ef03e.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\atualizada\ImagePath = "system32\\drivers\\atualizada.sys" b93127274edde80050d425d8306ef03e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\Copa.exe" b93127274edde80050d425d8306ef03e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Copa.exe b93127274edde80050d425d8306ef03e.exe File opened for modification C:\Windows\Copa.exe b93127274edde80050d425d8306ef03e.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4736 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4336 b93127274edde80050d425d8306ef03e.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 664 Process not Found 664 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4336 b93127274edde80050d425d8306ef03e.exe 4336 b93127274edde80050d425d8306ef03e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4336 wrote to memory of 5036 4336 b93127274edde80050d425d8306ef03e.exe 88 PID 4336 wrote to memory of 5036 4336 b93127274edde80050d425d8306ef03e.exe 88 PID 4336 wrote to memory of 5036 4336 b93127274edde80050d425d8306ef03e.exe 88 PID 5036 wrote to memory of 4736 5036 cmd.exe 90 PID 5036 wrote to memory of 4736 5036 cmd.exe 90 PID 5036 wrote to memory of 4736 5036 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b93127274edde80050d425d8306ef03e.exe"C:\Users\Admin\AppData\Local\Temp\b93127274edde80050d425d8306ef03e.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:4736
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2