Analysis
-
max time kernel
149s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:55
Static task
static1
Behavioral task
behavioral1
Sample
9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe
Resource
win10v2004-20220901-en
General
-
Target
9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe
-
Size
370KB
-
MD5
1d281bd4ce4ba0361cb0b06366244c74
-
SHA1
f999ccb49543bf413449a3cb9d5f6debe2659f84
-
SHA256
9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7
-
SHA512
89943f84389979b230bc97111e9aef1a4b581d6501e7f950170adcb09afec2d0659b45498d9ca707d26b5efaaea755aa02d5d31ec0e1dadb071d617fe2ce9b03
-
SSDEEP
6144:7TQtCkTZJQP4MwopG9rCJtxr25JVhtesH+IbYYQRNe7FJJ:XQt9ZM4MjGrCJtVGVhteFYfZ
Malware Config
Signatures
-
Processes:
9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exeF4D55F6500014973000C7881B4EB2331.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C7881B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
F4D55F6500014973000C7881B4EB2331.exepid process 844 F4D55F6500014973000C7881B4EB2331.exe -
Deletes itself 1 IoCs
Processes:
F4D55F6500014973000C7881B4EB2331.exepid process 844 F4D55F6500014973000C7881B4EB2331.exe -
Loads dropped DLL 2 IoCs
Processes:
9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exepid process 1204 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe 1204 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe -
Processes:
9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exeF4D55F6500014973000C7881B4EB2331.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C7881B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C7881B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
F4D55F6500014973000C7881B4EB2331.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000C7881B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000C7881B4EB2331\\F4D55F6500014973000C7881B4EB2331.exe" F4D55F6500014973000C7881B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exeF4D55F6500014973000C7881B4EB2331.exepid process 1204 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe 1204 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe 1204 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe 1204 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe 1204 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe 1204 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe 1204 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
F4D55F6500014973000C7881B4EB2331.exepid process 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
F4D55F6500014973000C7881B4EB2331.exepid process 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
F4D55F6500014973000C7881B4EB2331.exepid process 844 F4D55F6500014973000C7881B4EB2331.exe 844 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exedescription pid process target process PID 1204 wrote to memory of 844 1204 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe F4D55F6500014973000C7881B4EB2331.exe PID 1204 wrote to memory of 844 1204 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe F4D55F6500014973000C7881B4EB2331.exe PID 1204 wrote to memory of 844 1204 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe F4D55F6500014973000C7881B4EB2331.exe PID 1204 wrote to memory of 844 1204 9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe F4D55F6500014973000C7881B4EB2331.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe"C:\Users\Admin\AppData\Local\Temp\9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\F4D55F6500014973000C7881B4EB2331\F4D55F6500014973000C7881B4EB2331.exe"C:\ProgramData\F4D55F6500014973000C7881B4EB2331\F4D55F6500014973000C7881B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\9ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\F4D55F6500014973000C7881B4EB2331\F4D55F6500014973000C7881B4EB2331.exeFilesize
370KB
MD51d281bd4ce4ba0361cb0b06366244c74
SHA1f999ccb49543bf413449a3cb9d5f6debe2659f84
SHA2569ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7
SHA51289943f84389979b230bc97111e9aef1a4b581d6501e7f950170adcb09afec2d0659b45498d9ca707d26b5efaaea755aa02d5d31ec0e1dadb071d617fe2ce9b03
-
C:\ProgramData\F4D55F6500014973000C7881B4EB2331\F4D55F6500014973000C7881B4EB2331.exeFilesize
370KB
MD51d281bd4ce4ba0361cb0b06366244c74
SHA1f999ccb49543bf413449a3cb9d5f6debe2659f84
SHA2569ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7
SHA51289943f84389979b230bc97111e9aef1a4b581d6501e7f950170adcb09afec2d0659b45498d9ca707d26b5efaaea755aa02d5d31ec0e1dadb071d617fe2ce9b03
-
\ProgramData\F4D55F6500014973000C7881B4EB2331\F4D55F6500014973000C7881B4EB2331.exeFilesize
370KB
MD51d281bd4ce4ba0361cb0b06366244c74
SHA1f999ccb49543bf413449a3cb9d5f6debe2659f84
SHA2569ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7
SHA51289943f84389979b230bc97111e9aef1a4b581d6501e7f950170adcb09afec2d0659b45498d9ca707d26b5efaaea755aa02d5d31ec0e1dadb071d617fe2ce9b03
-
\ProgramData\F4D55F6500014973000C7881B4EB2331\F4D55F6500014973000C7881B4EB2331.exeFilesize
370KB
MD51d281bd4ce4ba0361cb0b06366244c74
SHA1f999ccb49543bf413449a3cb9d5f6debe2659f84
SHA2569ca04c9198cc2d184b3f5ea3ff4161938c8d95c7efdd3d85cd33d1c4acbc07c7
SHA51289943f84389979b230bc97111e9aef1a4b581d6501e7f950170adcb09afec2d0659b45498d9ca707d26b5efaaea755aa02d5d31ec0e1dadb071d617fe2ce9b03
-
memory/844-59-0x0000000000000000-mapping.dmp
-
memory/844-66-0x0000000000410000-0x00000000004D8000-memory.dmpFilesize
800KB
-
memory/1204-55-0x0000000000410000-0x00000000004D8000-memory.dmpFilesize
800KB
-
memory/1204-54-0x0000000000410000-0x00000000004D8000-memory.dmpFilesize
800KB
-
memory/1204-56-0x0000000074DE1000-0x0000000074DE3000-memory.dmpFilesize
8KB
-
memory/1204-65-0x0000000000410000-0x00000000004D8000-memory.dmpFilesize
800KB
-
memory/1204-67-0x0000000000410000-0x00000000004D8000-memory.dmpFilesize
800KB