Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10-01-2023 01:37
Static task
static1
Behavioral task
behavioral1
Sample
eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe
Resource
win10v2004-20221111-en
General
-
Target
eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe
-
Size
342KB
-
MD5
ef4113d5c5280bb72150b7dac47c406d
-
SHA1
eeada6db6ca701d344a47915ffbb1c2b5990ab0f
-
SHA256
22fa46cb462ef067624cd618262621fc47f0c2ec7673815cb2d5ebdb4c85f6bf
-
SHA512
73f087da7399d2f4c83795ef13f6cfeaf9c59c2de6a5da7fe14781a89971e7fe0f2fd267b8abd74d0f5cb66378769cf5536ea6675eeba5fd9b495c17d9ced4c9
-
SSDEEP
6144:Jg0NItfLcSj5PSXyggMfOLRTYO+9wTLfdvyhEwFUsjRLTt+/fzdx:q1Fhgh2R8O+yFqpLh+zdx
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1628 F4D55F6500014973000C4E45B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 1628 F4D55F6500014973000C4E45B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1632 eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe 1632 eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C4E45B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000C4E45B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000C4E45B4EB2331\\F4D55F6500014973000C4E45B4EB2331.exe" F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1632 eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe 1632 eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe 1632 eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe 1632 eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe 1632 eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe 1632 eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe 1632 eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1628 F4D55F6500014973000C4E45B4EB2331.exe 1628 F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1628 1632 eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe 27 PID 1632 wrote to memory of 1628 1632 eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe 27 PID 1632 wrote to memory of 1628 1632 eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe 27 PID 1632 wrote to memory of 1628 1632 eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe"C:\Users\Admin\AppData\Local\Temp\eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\ProgramData\F4D55F6500014973000C4E45B4EB2331\F4D55F6500014973000C4E45B4EB2331.exe"C:\ProgramData\F4D55F6500014973000C4E45B4EB2331\F4D55F6500014973000C4E45B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\eeada6db6ca701d344a47915ffbb1c2b5990ab0f.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1628
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342KB
MD5ef4113d5c5280bb72150b7dac47c406d
SHA1eeada6db6ca701d344a47915ffbb1c2b5990ab0f
SHA25622fa46cb462ef067624cd618262621fc47f0c2ec7673815cb2d5ebdb4c85f6bf
SHA51273f087da7399d2f4c83795ef13f6cfeaf9c59c2de6a5da7fe14781a89971e7fe0f2fd267b8abd74d0f5cb66378769cf5536ea6675eeba5fd9b495c17d9ced4c9
-
Filesize
342KB
MD5ef4113d5c5280bb72150b7dac47c406d
SHA1eeada6db6ca701d344a47915ffbb1c2b5990ab0f
SHA25622fa46cb462ef067624cd618262621fc47f0c2ec7673815cb2d5ebdb4c85f6bf
SHA51273f087da7399d2f4c83795ef13f6cfeaf9c59c2de6a5da7fe14781a89971e7fe0f2fd267b8abd74d0f5cb66378769cf5536ea6675eeba5fd9b495c17d9ced4c9
-
Filesize
342KB
MD5ef4113d5c5280bb72150b7dac47c406d
SHA1eeada6db6ca701d344a47915ffbb1c2b5990ab0f
SHA25622fa46cb462ef067624cd618262621fc47f0c2ec7673815cb2d5ebdb4c85f6bf
SHA51273f087da7399d2f4c83795ef13f6cfeaf9c59c2de6a5da7fe14781a89971e7fe0f2fd267b8abd74d0f5cb66378769cf5536ea6675eeba5fd9b495c17d9ced4c9
-
Filesize
342KB
MD5ef4113d5c5280bb72150b7dac47c406d
SHA1eeada6db6ca701d344a47915ffbb1c2b5990ab0f
SHA25622fa46cb462ef067624cd618262621fc47f0c2ec7673815cb2d5ebdb4c85f6bf
SHA51273f087da7399d2f4c83795ef13f6cfeaf9c59c2de6a5da7fe14781a89971e7fe0f2fd267b8abd74d0f5cb66378769cf5536ea6675eeba5fd9b495c17d9ced4c9