Analysis
-
max time kernel
147s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
10/01/2023, 02:36
Static task
static1
Behavioral task
behavioral1
Sample
7cbb8ba8180c3d3950391711f400464ab8993a83.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7cbb8ba8180c3d3950391711f400464ab8993a83.exe
Resource
win10v2004-20220812-en
General
-
Target
7cbb8ba8180c3d3950391711f400464ab8993a83.exe
-
Size
456KB
-
MD5
cfae3377849aec4fcdbf9fdeac30c370
-
SHA1
7cbb8ba8180c3d3950391711f400464ab8993a83
-
SHA256
c87b363678d52a0c3c248a62b1285a8a7682c0766fdeed876e84d960f68d82ee
-
SHA512
a01949a2a08741815f60cd0824ade350644d571f199e487df7741e3c15260d811ea176b21b6522ac4b3798840dadbf8c89a63cab31b6611ee04ee865f68b7a5c
-
SSDEEP
12288:KLti7E6uK3LYfPiaDctwQUjCsxRmVRJjt:G0PuDfaaQtLUnxRmfjt
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 7cbb8ba8180c3d3950391711f400464ab8993a83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 7cbb8ba8180c3d3950391711f400464ab8993a83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 7cbb8ba8180c3d3950391711f400464ab8993a83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 7cbb8ba8180c3d3950391711f400464ab8993a83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 7cbb8ba8180c3d3950391711f400464ab8993a83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 992 F4D55F6500014973000C7881B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 992 F4D55F6500014973000C7881B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1528 7cbb8ba8180c3d3950391711f400464ab8993a83.exe 1528 7cbb8ba8180c3d3950391711f400464ab8993a83.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 7cbb8ba8180c3d3950391711f400464ab8993a83.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 7cbb8ba8180c3d3950391711f400464ab8993a83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 7cbb8ba8180c3d3950391711f400464ab8993a83.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 7cbb8ba8180c3d3950391711f400464ab8993a83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 7cbb8ba8180c3d3950391711f400464ab8993a83.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 7cbb8ba8180c3d3950391711f400464ab8993a83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C7881B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 7cbb8ba8180c3d3950391711f400464ab8993a83.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C7881B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000C7881B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000C7881B4EB2331\\F4D55F6500014973000C7881B4EB2331.exe" F4D55F6500014973000C7881B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1528 7cbb8ba8180c3d3950391711f400464ab8993a83.exe 1528 7cbb8ba8180c3d3950391711f400464ab8993a83.exe 1528 7cbb8ba8180c3d3950391711f400464ab8993a83.exe 1528 7cbb8ba8180c3d3950391711f400464ab8993a83.exe 1528 7cbb8ba8180c3d3950391711f400464ab8993a83.exe 1528 7cbb8ba8180c3d3950391711f400464ab8993a83.exe 1528 7cbb8ba8180c3d3950391711f400464ab8993a83.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 992 F4D55F6500014973000C7881B4EB2331.exe 992 F4D55F6500014973000C7881B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1528 wrote to memory of 992 1528 7cbb8ba8180c3d3950391711f400464ab8993a83.exe 26 PID 1528 wrote to memory of 992 1528 7cbb8ba8180c3d3950391711f400464ab8993a83.exe 26 PID 1528 wrote to memory of 992 1528 7cbb8ba8180c3d3950391711f400464ab8993a83.exe 26 PID 1528 wrote to memory of 992 1528 7cbb8ba8180c3d3950391711f400464ab8993a83.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cbb8ba8180c3d3950391711f400464ab8993a83.exe"C:\Users\Admin\AppData\Local\Temp\7cbb8ba8180c3d3950391711f400464ab8993a83.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\ProgramData\F4D55F6500014973000C7881B4EB2331\F4D55F6500014973000C7881B4EB2331.exe"C:\ProgramData\F4D55F6500014973000C7881B4EB2331\F4D55F6500014973000C7881B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\7cbb8ba8180c3d3950391711f400464ab8993a83.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:992
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD5cfae3377849aec4fcdbf9fdeac30c370
SHA17cbb8ba8180c3d3950391711f400464ab8993a83
SHA256c87b363678d52a0c3c248a62b1285a8a7682c0766fdeed876e84d960f68d82ee
SHA512a01949a2a08741815f60cd0824ade350644d571f199e487df7741e3c15260d811ea176b21b6522ac4b3798840dadbf8c89a63cab31b6611ee04ee865f68b7a5c
-
Filesize
456KB
MD5cfae3377849aec4fcdbf9fdeac30c370
SHA17cbb8ba8180c3d3950391711f400464ab8993a83
SHA256c87b363678d52a0c3c248a62b1285a8a7682c0766fdeed876e84d960f68d82ee
SHA512a01949a2a08741815f60cd0824ade350644d571f199e487df7741e3c15260d811ea176b21b6522ac4b3798840dadbf8c89a63cab31b6611ee04ee865f68b7a5c
-
Filesize
456KB
MD5cfae3377849aec4fcdbf9fdeac30c370
SHA17cbb8ba8180c3d3950391711f400464ab8993a83
SHA256c87b363678d52a0c3c248a62b1285a8a7682c0766fdeed876e84d960f68d82ee
SHA512a01949a2a08741815f60cd0824ade350644d571f199e487df7741e3c15260d811ea176b21b6522ac4b3798840dadbf8c89a63cab31b6611ee04ee865f68b7a5c
-
Filesize
456KB
MD5cfae3377849aec4fcdbf9fdeac30c370
SHA17cbb8ba8180c3d3950391711f400464ab8993a83
SHA256c87b363678d52a0c3c248a62b1285a8a7682c0766fdeed876e84d960f68d82ee
SHA512a01949a2a08741815f60cd0824ade350644d571f199e487df7741e3c15260d811ea176b21b6522ac4b3798840dadbf8c89a63cab31b6611ee04ee865f68b7a5c