Analysis
-
max time kernel
150s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10-01-2023 01:38
Static task
static1
Behavioral task
behavioral1
Sample
3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe
Resource
win10v2004-20221111-en
General
-
Target
3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe
-
Size
342KB
-
MD5
4b77b3dfd6081b3e3c13fd844f7acbb7
-
SHA1
3f16dac1e8b817cc03f871e17cc7b40a754ee751
-
SHA256
c3974ceee73cbee9bc5602ecc2dd127281e882a152da5ea338c53903560da184
-
SHA512
15da29e82c068038f412e765c171800469b850c90c93a50a253a2176fdc8dbc907e461960fbb5a0176295d47b4b220f5ace741822cede22a2bff47668998259a
-
SSDEEP
6144:mntQYveIk44ai9PakfDYtlUKS2pf/xYLcu5NC9wXMq0jKI/gwet:rYvDsakbClM2pxYB3CuM/x8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 536 F4D55F6500014973000B9D42B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 536 F4D55F6500014973000B9D42B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 976 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe 976 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000B9D42B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000B9D42B4EB2331\\F4D55F6500014973000B9D42B4EB2331.exe" F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 976 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe 976 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe 976 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe 976 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe 976 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe 976 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe 976 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 536 F4D55F6500014973000B9D42B4EB2331.exe 536 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 976 wrote to memory of 536 976 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe 28 PID 976 wrote to memory of 536 976 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe 28 PID 976 wrote to memory of 536 976 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe 28 PID 976 wrote to memory of 536 976 3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe"C:\Users\Admin\AppData\Local\Temp\3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:976 -
C:\ProgramData\F4D55F6500014973000B9D42B4EB2331\F4D55F6500014973000B9D42B4EB2331.exe"C:\ProgramData\F4D55F6500014973000B9D42B4EB2331\F4D55F6500014973000B9D42B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\3f16dac1e8b817cc03f871e17cc7b40a754ee751.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:536
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342KB
MD54b77b3dfd6081b3e3c13fd844f7acbb7
SHA13f16dac1e8b817cc03f871e17cc7b40a754ee751
SHA256c3974ceee73cbee9bc5602ecc2dd127281e882a152da5ea338c53903560da184
SHA51215da29e82c068038f412e765c171800469b850c90c93a50a253a2176fdc8dbc907e461960fbb5a0176295d47b4b220f5ace741822cede22a2bff47668998259a
-
Filesize
342KB
MD54b77b3dfd6081b3e3c13fd844f7acbb7
SHA13f16dac1e8b817cc03f871e17cc7b40a754ee751
SHA256c3974ceee73cbee9bc5602ecc2dd127281e882a152da5ea338c53903560da184
SHA51215da29e82c068038f412e765c171800469b850c90c93a50a253a2176fdc8dbc907e461960fbb5a0176295d47b4b220f5ace741822cede22a2bff47668998259a
-
Filesize
342KB
MD54b77b3dfd6081b3e3c13fd844f7acbb7
SHA13f16dac1e8b817cc03f871e17cc7b40a754ee751
SHA256c3974ceee73cbee9bc5602ecc2dd127281e882a152da5ea338c53903560da184
SHA51215da29e82c068038f412e765c171800469b850c90c93a50a253a2176fdc8dbc907e461960fbb5a0176295d47b4b220f5ace741822cede22a2bff47668998259a
-
Filesize
342KB
MD54b77b3dfd6081b3e3c13fd844f7acbb7
SHA13f16dac1e8b817cc03f871e17cc7b40a754ee751
SHA256c3974ceee73cbee9bc5602ecc2dd127281e882a152da5ea338c53903560da184
SHA51215da29e82c068038f412e765c171800469b850c90c93a50a253a2176fdc8dbc907e461960fbb5a0176295d47b4b220f5ace741822cede22a2bff47668998259a