Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe
Resource
win7-20220901-en
General
-
Target
3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe
-
Size
834KB
-
MD5
5bae3e4a5dc8a9f4196e25682e2717d0
-
SHA1
38288154296e2efd3beb4c4775809200b87ffb80
-
SHA256
3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0
-
SHA512
3ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a
-
SSDEEP
24576:VsO5HqwFQcggPtwr/Rhzhyti5nj7xlUKmPoWC6hZd7:RALVyO7xmTw6N
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" mrdjsqxkng.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallOverride = "1" mrdjsqxkng.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusDisableNotify = "1" mrdjsqxkng.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride = "1" mrdjsqxkng.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts ztpzpa47w6mjj4hzjbtvqf.exe -
Executes dropped EXE 5 IoCs
pid Process 2292 ztpzpa47w6mjj4hzjbtvqf.exe 3152 mrdjsqxkng.exe 4024 gfaaboswn.exe 2268 mrdjsqxkng.exe 3008 ztpzpa47z7tjj4hz.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2140 netsh.exe -
Loads dropped DLL 4 IoCs
pid Process 1340 3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe 1340 3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" mrdjsqxkng.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallOverride = "1" mrdjsqxkng.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusDisableNotify = "1" mrdjsqxkng.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride = "1" mrdjsqxkng.exe -
Drops file in Windows directory 22 IoCs
description ioc Process File opened for modification C:\Windows\qjlugngmmagmh\ mrdjsqxkng.exe File created C:\Windows\qjlugngmmagmh\cfg mrdjsqxkng.exe File opened for modification C:\Windows\qjlugngmmagmh\tst gfaaboswn.exe File opened for modification C:\Windows\qjlugngmmagmh\ mrdjsqxkng.exe File opened for modification C:\Windows\qjlugngmmagmh\tst ztpzpa47w6mjj4hzjbtvqf.exe File opened for modification C:\Windows\mrdjsqxkng.exe ztpzpa47w6mjj4hzjbtvqf.exe File opened for modification C:\Windows\gfaaboswn.exe mrdjsqxkng.exe File created C:\Windows\qjlugngmmagmh\run mrdjsqxkng.exe File opened for modification C:\Windows\qjlugngmmagmh\ gfaaboswn.exe File created C:\Windows\qjlugngmmagmh\lck mrdjsqxkng.exe File created C:\Windows\qjlugngmmagmh\lck ztpzpa47w6mjj4hzjbtvqf.exe File opened for modification C:\Windows\qjlugngmmagmh\tst mrdjsqxkng.exe File opened for modification C:\Windows\qjlugngmmagmh\lck mrdjsqxkng.exe File created C:\Windows\gfaaboswn.exe mrdjsqxkng.exe File opened for modification C:\Windows\qjlugngmmagmh\rng mrdjsqxkng.exe File created C:\Windows\qjlugngmmagmh\etc ztpzpa47w6mjj4hzjbtvqf.exe File opened for modification C:\Windows\qjlugngmmagmh\ 3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe File opened for modification C:\Windows\qjlugngmmagmh\ ztpzpa47w6mjj4hzjbtvqf.exe File created C:\Windows\mrdjsqxkng.exe ztpzpa47w6mjj4hzjbtvqf.exe File created C:\Windows\qjlugngmmagmh\rng mrdjsqxkng.exe File opened for modification C:\Windows\qjlugngmmagmh\tst mrdjsqxkng.exe File created C:\Windows\qjlugngmmagmh\tst 3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-102 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-100 = "DHCP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-101 = "Provides RD Gateway enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 3152 mrdjsqxkng.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe 4024 gfaaboswn.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1340 wrote to memory of 2292 1340 3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe 27 PID 1340 wrote to memory of 2292 1340 3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe 27 PID 1340 wrote to memory of 2292 1340 3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe 27 PID 1340 wrote to memory of 2292 1340 3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe 27 PID 3152 wrote to memory of 4024 3152 mrdjsqxkng.exe 29 PID 3152 wrote to memory of 4024 3152 mrdjsqxkng.exe 29 PID 3152 wrote to memory of 4024 3152 mrdjsqxkng.exe 29 PID 3152 wrote to memory of 4024 3152 mrdjsqxkng.exe 29 PID 3152 wrote to memory of 2140 3152 mrdjsqxkng.exe 30 PID 3152 wrote to memory of 2140 3152 mrdjsqxkng.exe 30 PID 3152 wrote to memory of 2140 3152 mrdjsqxkng.exe 30 PID 3152 wrote to memory of 2140 3152 mrdjsqxkng.exe 30 PID 2292 wrote to memory of 2268 2292 ztpzpa47w6mjj4hzjbtvqf.exe 32 PID 2292 wrote to memory of 2268 2292 ztpzpa47w6mjj4hzjbtvqf.exe 32 PID 2292 wrote to memory of 2268 2292 ztpzpa47w6mjj4hzjbtvqf.exe 32 PID 2292 wrote to memory of 2268 2292 ztpzpa47w6mjj4hzjbtvqf.exe 32 PID 3152 wrote to memory of 3008 3152 mrdjsqxkng.exe 33 PID 3152 wrote to memory of 3008 3152 mrdjsqxkng.exe 33 PID 3152 wrote to memory of 3008 3152 mrdjsqxkng.exe 33 PID 3152 wrote to memory of 3008 3152 mrdjsqxkng.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe"C:\Users\Admin\AppData\Local\Temp\3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\ztpzpa47w6mjj4hzjbtvqf.exe"C:\Users\Admin\AppData\Local\Temp\ztpzpa47w6mjj4hzjbtvqf.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\mrdjsqxkng.exe"C:\Windows\mrdjsqxkng.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2268
-
-
-
C:\Windows\mrdjsqxkng.exeC:\Windows\mrdjsqxkng.exe1⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\gfaaboswn.exeWATCHDOGPROC "c:\windows\mrdjsqxkng.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe firewall set opmode disable2⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2140
-
-
C:\Windows\TEMP\ztpzpa47z7tjj4hz.exeC:\Windows\TEMP\ztpzpa47z7tjj4hz.exe -r 31417 tcp2⤵
- Executes dropped EXE
PID:3008
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
834KB
MD55bae3e4a5dc8a9f4196e25682e2717d0
SHA138288154296e2efd3beb4c4775809200b87ffb80
SHA2563c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0
SHA5123ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a
-
Filesize
34KB
MD5476f447617f65eebf35c52d4fd3b3188
SHA1179ee6e698803a45be916f107638f01d553d6e65
SHA256a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0
SHA51237c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9
-
Filesize
834KB
MD55bae3e4a5dc8a9f4196e25682e2717d0
SHA138288154296e2efd3beb4c4775809200b87ffb80
SHA2563c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0
SHA5123ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a
-
Filesize
834KB
MD55bae3e4a5dc8a9f4196e25682e2717d0
SHA138288154296e2efd3beb4c4775809200b87ffb80
SHA2563c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0
SHA5123ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a
-
Filesize
834KB
MD55bae3e4a5dc8a9f4196e25682e2717d0
SHA138288154296e2efd3beb4c4775809200b87ffb80
SHA2563c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0
SHA5123ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a
-
Filesize
10B
MD5f88afa0fa241403dfd98c4a821363068
SHA151222887163b34f02dc35eaffbb127940b44ec91
SHA2563ec913f1de6e549c24261b68f8623fcd609afcc301985d231414cbaa09e2b55e
SHA512e836a09cab1a5d9663da898b1a23f322dfae5244ec88282b7135b2c7fda47682cf490b0bac3a1fc7555b931bfc1f12a5892ee7dedc2c9238b45e9b86ff56814b
-
Filesize
4B
MD53bf81e2bf6dc61706efb9a6dadc5793a
SHA1bf1bbfb3b5aaddbc5065b8440ea616d84fad8ff2
SHA256961ae28829f0b1cfbd073eff070ac5ea8994618c0e84fab4764367464a14b854
SHA512354f74cb52f314226a6021c5745799d05a0c8ba21246c9717b8ce211193603c4704b72332f80576d15b14d76c8f772cd5b6fa7a10acb60fab67411573f732b1c
-
Filesize
10B
MD5d9e0d258df86c6859951b803fa0e539c
SHA1d04df79fdffa92605bdc478f4247fa2b55fceb7f
SHA256e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e
SHA5128c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e
-
Filesize
10B
MD5d9e0d258df86c6859951b803fa0e539c
SHA1d04df79fdffa92605bdc478f4247fa2b55fceb7f
SHA256e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e
SHA5128c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e
-
Filesize
10B
MD5d9e0d258df86c6859951b803fa0e539c
SHA1d04df79fdffa92605bdc478f4247fa2b55fceb7f
SHA256e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e
SHA5128c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e
-
Filesize
834KB
MD55bae3e4a5dc8a9f4196e25682e2717d0
SHA138288154296e2efd3beb4c4775809200b87ffb80
SHA2563c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0
SHA5123ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a
-
Filesize
834KB
MD55bae3e4a5dc8a9f4196e25682e2717d0
SHA138288154296e2efd3beb4c4775809200b87ffb80
SHA2563c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0
SHA5123ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a
-
Filesize
834KB
MD55bae3e4a5dc8a9f4196e25682e2717d0
SHA138288154296e2efd3beb4c4775809200b87ffb80
SHA2563c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0
SHA5123ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a
-
Filesize
834KB
MD55bae3e4a5dc8a9f4196e25682e2717d0
SHA138288154296e2efd3beb4c4775809200b87ffb80
SHA2563c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0
SHA5123ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a
-
Filesize
34KB
MD5476f447617f65eebf35c52d4fd3b3188
SHA1179ee6e698803a45be916f107638f01d553d6e65
SHA256a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0
SHA51237c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9
-
Filesize
34KB
MD5476f447617f65eebf35c52d4fd3b3188
SHA1179ee6e698803a45be916f107638f01d553d6e65
SHA256a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0
SHA51237c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9