Analysis
-
max time kernel
201s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:57
Static task
static1
Behavioral task
behavioral1
Sample
e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe
Resource
win10v2004-20220812-en
General
-
Target
e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe
-
Size
456KB
-
MD5
414ea561861a7b9ad06b13c9d4ee2285
-
SHA1
956b16cf70583dc5ab8621767b352317e26eefc0
-
SHA256
e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596
-
SHA512
c971fd1fd8286a354be17a0b9db3f0a77b236f5d62297070c993214c44595e6f534ea2140b43b7a729264e09414ab872ab8c91a66bbf3ab0f7380f83f503c0e6
-
SSDEEP
6144:GFiDHU5gQCyYCzjy/J0VbkXmFq/NcARvMmqOIgfFLKFux7KuiQQGpuBZBppychE:GKKY3/J0VHFq6AREjrFbyQGEBZBi
Malware Config
Signatures
-
Processes:
e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exeF4D55F6500014973000B9D42B4EB2331.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
F4D55F6500014973000B9D42B4EB2331.exepid process 764 F4D55F6500014973000B9D42B4EB2331.exe -
Deletes itself 1 IoCs
Processes:
F4D55F6500014973000B9D42B4EB2331.exepid process 764 F4D55F6500014973000B9D42B4EB2331.exe -
Loads dropped DLL 2 IoCs
Processes:
e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exepid process 1668 e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe 1668 e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe -
Processes:
F4D55F6500014973000B9D42B4EB2331.exee8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B9D42B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
F4D55F6500014973000B9D42B4EB2331.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000B9D42B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000B9D42B4EB2331\\F4D55F6500014973000B9D42B4EB2331.exe" F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exeF4D55F6500014973000B9D42B4EB2331.exepid process 1668 e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe 1668 e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe 1668 e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe 1668 e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe 1668 e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe 1668 e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe 1668 e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
F4D55F6500014973000B9D42B4EB2331.exepid process 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
F4D55F6500014973000B9D42B4EB2331.exepid process 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
F4D55F6500014973000B9D42B4EB2331.exepid process 764 F4D55F6500014973000B9D42B4EB2331.exe 764 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exedescription pid process target process PID 1668 wrote to memory of 764 1668 e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe F4D55F6500014973000B9D42B4EB2331.exe PID 1668 wrote to memory of 764 1668 e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe F4D55F6500014973000B9D42B4EB2331.exe PID 1668 wrote to memory of 764 1668 e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe F4D55F6500014973000B9D42B4EB2331.exe PID 1668 wrote to memory of 764 1668 e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe F4D55F6500014973000B9D42B4EB2331.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe"C:\Users\Admin\AppData\Local\Temp\e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\ProgramData\F4D55F6500014973000B9D42B4EB2331\F4D55F6500014973000B9D42B4EB2331.exe"C:\ProgramData\F4D55F6500014973000B9D42B4EB2331\F4D55F6500014973000B9D42B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD5414ea561861a7b9ad06b13c9d4ee2285
SHA1956b16cf70583dc5ab8621767b352317e26eefc0
SHA256e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596
SHA512c971fd1fd8286a354be17a0b9db3f0a77b236f5d62297070c993214c44595e6f534ea2140b43b7a729264e09414ab872ab8c91a66bbf3ab0f7380f83f503c0e6
-
Filesize
456KB
MD5414ea561861a7b9ad06b13c9d4ee2285
SHA1956b16cf70583dc5ab8621767b352317e26eefc0
SHA256e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596
SHA512c971fd1fd8286a354be17a0b9db3f0a77b236f5d62297070c993214c44595e6f534ea2140b43b7a729264e09414ab872ab8c91a66bbf3ab0f7380f83f503c0e6
-
Filesize
456KB
MD5414ea561861a7b9ad06b13c9d4ee2285
SHA1956b16cf70583dc5ab8621767b352317e26eefc0
SHA256e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596
SHA512c971fd1fd8286a354be17a0b9db3f0a77b236f5d62297070c993214c44595e6f534ea2140b43b7a729264e09414ab872ab8c91a66bbf3ab0f7380f83f503c0e6
-
Filesize
456KB
MD5414ea561861a7b9ad06b13c9d4ee2285
SHA1956b16cf70583dc5ab8621767b352317e26eefc0
SHA256e8c2f544190c1a842ad58dacb41ebd113f0f985210229296a54f4a5525275596
SHA512c971fd1fd8286a354be17a0b9db3f0a77b236f5d62297070c993214c44595e6f534ea2140b43b7a729264e09414ab872ab8c91a66bbf3ab0f7380f83f503c0e6