Analysis
-
max time kernel
148s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe
Resource
win10v2004-20220812-en
General
-
Target
dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe
-
Size
444KB
-
MD5
509b167c4bd2b60595bd42de24b199e8
-
SHA1
03e0a995ef327c2d1cc04d680efb5317a1dbe0a1
-
SHA256
dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef
-
SHA512
49104d7139c8e020d7cfff5db5d41d4a2b849724e7838769fe4f2ef941165bff2d23c97436f3939df02bdb33cc29c85e1288d74b317f8d67eb2d6bcb465bd074
-
SSDEEP
12288:h99zBEkgRPMws0oo56R1piQ8BD4rnNqzDyOfyrz:1zNgRPM10YpiQOkZ6C
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C7881B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1264 F4D55F6500014973000C7881B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 1264 F4D55F6500014973000C7881B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1700 dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe 1700 dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C7881B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000C7881B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000C7881B4EB2331\\F4D55F6500014973000C7881B4EB2331.exe" F4D55F6500014973000C7881B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1700 dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe 1700 dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe 1700 dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe 1700 dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe 1700 dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe 1700 dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe 1700 dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1264 F4D55F6500014973000C7881B4EB2331.exe 1264 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1264 1700 dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe 28 PID 1700 wrote to memory of 1264 1700 dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe 28 PID 1700 wrote to memory of 1264 1700 dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe 28 PID 1700 wrote to memory of 1264 1700 dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe"C:\Users\Admin\AppData\Local\Temp\dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\ProgramData\F4D55F6500014973000C7881B4EB2331\F4D55F6500014973000C7881B4EB2331.exe"C:\ProgramData\F4D55F6500014973000C7881B4EB2331\F4D55F6500014973000C7881B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1264
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD5509b167c4bd2b60595bd42de24b199e8
SHA103e0a995ef327c2d1cc04d680efb5317a1dbe0a1
SHA256dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef
SHA51249104d7139c8e020d7cfff5db5d41d4a2b849724e7838769fe4f2ef941165bff2d23c97436f3939df02bdb33cc29c85e1288d74b317f8d67eb2d6bcb465bd074
-
Filesize
444KB
MD5509b167c4bd2b60595bd42de24b199e8
SHA103e0a995ef327c2d1cc04d680efb5317a1dbe0a1
SHA256dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef
SHA51249104d7139c8e020d7cfff5db5d41d4a2b849724e7838769fe4f2ef941165bff2d23c97436f3939df02bdb33cc29c85e1288d74b317f8d67eb2d6bcb465bd074
-
Filesize
444KB
MD5509b167c4bd2b60595bd42de24b199e8
SHA103e0a995ef327c2d1cc04d680efb5317a1dbe0a1
SHA256dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef
SHA51249104d7139c8e020d7cfff5db5d41d4a2b849724e7838769fe4f2ef941165bff2d23c97436f3939df02bdb33cc29c85e1288d74b317f8d67eb2d6bcb465bd074
-
Filesize
444KB
MD5509b167c4bd2b60595bd42de24b199e8
SHA103e0a995ef327c2d1cc04d680efb5317a1dbe0a1
SHA256dce47ba7a402fce51189e58255cc3cbcc9d00b4034dd077baeb1ad90f592d8ef
SHA51249104d7139c8e020d7cfff5db5d41d4a2b849724e7838769fe4f2ef941165bff2d23c97436f3939df02bdb33cc29c85e1288d74b317f8d67eb2d6bcb465bd074