Analysis
-
max time kernel
147s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:27
Static task
static1
Behavioral task
behavioral1
Sample
459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe
Resource
win10v2004-20220812-en
General
-
Target
459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe
-
Size
396KB
-
MD5
a28ba0cb0f67f46846beb29f8559c529
-
SHA1
545dee71e3593c69eb2f148564c0d16179c124d8
-
SHA256
459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240
-
SHA512
22703460de77e4ea5801f994e730302a24f32f21416b347d7d389d7c2dd5473df66f847708eb3e508e76cf6aaf3f47c658886b3487a59367b89892af787303b5
-
SSDEEP
6144:DJZIaFQzwRufKSzsjRx9Lagc32nwKpUlaaSBEgev:NasQwR6zugT3YwKpuVgz2
Malware Config
Signatures
-
Processes:
F4D55F6500014973000CE10CB4EB2331.exe459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000CE10CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000CE10CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000CE10CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000CE10CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000CE10CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
F4D55F6500014973000CE10CB4EB2331.exepid process 280 F4D55F6500014973000CE10CB4EB2331.exe -
Deletes itself 1 IoCs
Processes:
F4D55F6500014973000CE10CB4EB2331.exepid process 280 F4D55F6500014973000CE10CB4EB2331.exe -
Loads dropped DLL 2 IoCs
Processes:
459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exepid process 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe -
Processes:
459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exeF4D55F6500014973000CE10CB4EB2331.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000CE10CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000CE10CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000CE10CB4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000CE10CB4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000CE10CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000CE10CB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000CE10CB4EB2331.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
F4D55F6500014973000CE10CB4EB2331.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce F4D55F6500014973000CE10CB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000CE10CB4EB2331 = "C:\\ProgramData\\F4D55F6500014973000CE10CB4EB2331\\F4D55F6500014973000CE10CB4EB2331.exe" F4D55F6500014973000CE10CB4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exeF4D55F6500014973000CE10CB4EB2331.exepid process 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
F4D55F6500014973000CE10CB4EB2331.exepid process 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
F4D55F6500014973000CE10CB4EB2331.exepid process 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
F4D55F6500014973000CE10CB4EB2331.exepid process 280 F4D55F6500014973000CE10CB4EB2331.exe 280 F4D55F6500014973000CE10CB4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exedescription pid process target process PID 1892 wrote to memory of 280 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe F4D55F6500014973000CE10CB4EB2331.exe PID 1892 wrote to memory of 280 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe F4D55F6500014973000CE10CB4EB2331.exe PID 1892 wrote to memory of 280 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe F4D55F6500014973000CE10CB4EB2331.exe PID 1892 wrote to memory of 280 1892 459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe F4D55F6500014973000CE10CB4EB2331.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe"C:\Users\Admin\AppData\Local\Temp\459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\ProgramData\F4D55F6500014973000CE10CB4EB2331\F4D55F6500014973000CE10CB4EB2331.exe"C:\ProgramData\F4D55F6500014973000CE10CB4EB2331\F4D55F6500014973000CE10CB4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD5a28ba0cb0f67f46846beb29f8559c529
SHA1545dee71e3593c69eb2f148564c0d16179c124d8
SHA256459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240
SHA51222703460de77e4ea5801f994e730302a24f32f21416b347d7d389d7c2dd5473df66f847708eb3e508e76cf6aaf3f47c658886b3487a59367b89892af787303b5
-
Filesize
396KB
MD5a28ba0cb0f67f46846beb29f8559c529
SHA1545dee71e3593c69eb2f148564c0d16179c124d8
SHA256459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240
SHA51222703460de77e4ea5801f994e730302a24f32f21416b347d7d389d7c2dd5473df66f847708eb3e508e76cf6aaf3f47c658886b3487a59367b89892af787303b5
-
Filesize
396KB
MD5a28ba0cb0f67f46846beb29f8559c529
SHA1545dee71e3593c69eb2f148564c0d16179c124d8
SHA256459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240
SHA51222703460de77e4ea5801f994e730302a24f32f21416b347d7d389d7c2dd5473df66f847708eb3e508e76cf6aaf3f47c658886b3487a59367b89892af787303b5
-
Filesize
396KB
MD5a28ba0cb0f67f46846beb29f8559c529
SHA1545dee71e3593c69eb2f148564c0d16179c124d8
SHA256459fe2c41da9f6c8599e33bbb5009847e78a1b1372dee6f0520d6387ab7f1240
SHA51222703460de77e4ea5801f994e730302a24f32f21416b347d7d389d7c2dd5473df66f847708eb3e508e76cf6aaf3f47c658886b3487a59367b89892af787303b5