Analysis
-
max time kernel
200s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe
Resource
win10v2004-20221111-en
General
-
Target
61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe
-
Size
468KB
-
MD5
1bcbfa4fcc1ca36aaef99db51a24fba0
-
SHA1
a84b8ca2301fe90dcef1ea78518668cba9e312d0
-
SHA256
61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc
-
SHA512
ad6772b34f42fb3dc38b766242c9219a768c25416ba1236e2409e2f86efa0984aff514b932ec24658b81f5a9bdc5588a12e6f4526068b4af76643aab491a3560
-
SSDEEP
12288:uVO3unRzs9h1VkyDXUw0vnPcPTwuxxsmSAb:t3unRsJVkyDXUwcPcPTd3F
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1816 F4D55F6500014973000B9D42B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 1816 F4D55F6500014973000B9D42B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe 2020 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B9D42B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000B9D42B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000B9D42B4EB2331\\F4D55F6500014973000B9D42B4EB2331.exe" F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2020 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe 2020 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe 2020 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe 2020 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe 2020 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe 2020 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe 2020 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1816 F4D55F6500014973000B9D42B4EB2331.exe 1816 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1816 2020 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe 28 PID 2020 wrote to memory of 1816 2020 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe 28 PID 2020 wrote to memory of 1816 2020 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe 28 PID 2020 wrote to memory of 1816 2020 61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe"C:\Users\Admin\AppData\Local\Temp\61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\ProgramData\F4D55F6500014973000B9D42B4EB2331\F4D55F6500014973000B9D42B4EB2331.exe"C:\ProgramData\F4D55F6500014973000B9D42B4EB2331\F4D55F6500014973000B9D42B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\61f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD51bcbfa4fcc1ca36aaef99db51a24fba0
SHA1a84b8ca2301fe90dcef1ea78518668cba9e312d0
SHA25661f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc
SHA512ad6772b34f42fb3dc38b766242c9219a768c25416ba1236e2409e2f86efa0984aff514b932ec24658b81f5a9bdc5588a12e6f4526068b4af76643aab491a3560
-
Filesize
468KB
MD51bcbfa4fcc1ca36aaef99db51a24fba0
SHA1a84b8ca2301fe90dcef1ea78518668cba9e312d0
SHA25661f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc
SHA512ad6772b34f42fb3dc38b766242c9219a768c25416ba1236e2409e2f86efa0984aff514b932ec24658b81f5a9bdc5588a12e6f4526068b4af76643aab491a3560
-
Filesize
468KB
MD51bcbfa4fcc1ca36aaef99db51a24fba0
SHA1a84b8ca2301fe90dcef1ea78518668cba9e312d0
SHA25661f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc
SHA512ad6772b34f42fb3dc38b766242c9219a768c25416ba1236e2409e2f86efa0984aff514b932ec24658b81f5a9bdc5588a12e6f4526068b4af76643aab491a3560
-
Filesize
468KB
MD51bcbfa4fcc1ca36aaef99db51a24fba0
SHA1a84b8ca2301fe90dcef1ea78518668cba9e312d0
SHA25661f70019e304fb998b3a45788d407645b19c5c11bf0dd6c86e614719b93e0cfc
SHA512ad6772b34f42fb3dc38b766242c9219a768c25416ba1236e2409e2f86efa0984aff514b932ec24658b81f5a9bdc5588a12e6f4526068b4af76643aab491a3560