Analysis
-
max time kernel
135s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10/01/2023, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
56b2ed4168a9ae9ffebead084809f6f256eba04a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
56b2ed4168a9ae9ffebead084809f6f256eba04a.exe
Resource
win10v2004-20221111-en
General
-
Target
56b2ed4168a9ae9ffebead084809f6f256eba04a.exe
-
Size
364KB
-
MD5
098f7deaf14f380726461f96d2c9c2ea
-
SHA1
56b2ed4168a9ae9ffebead084809f6f256eba04a
-
SHA256
08416c37ce652e369717b975c81e7d335cebeb4466cd1530be03785197023850
-
SHA512
a956c6b365da39f22be1c5a5087a939c557b8566fe340c89579351c53cef1a58fdd94f42227eae1532375b3174c949c5e82c2f4e95386e42dcc35775897fb7e3
-
SSDEEP
6144:qYsNBvA+j+4CnpCxAE0KPn7dB9Wc7V6qLJIg8ukjODlGzfcdc+pvsCojHViEosmH:qXv5j3CcxR0e7Uc7MOJIP1WGzUdNiCo6
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1196 F4D55F6500014973000C4E45B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 1196 F4D55F6500014973000C4E45B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1296 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe 1296 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C4E45B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000C4E45B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000C4E45B4EB2331\\F4D55F6500014973000C4E45B4EB2331.exe" F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1296 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe 1296 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe 1296 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe 1296 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe 1296 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe 1296 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe 1296 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1196 F4D55F6500014973000C4E45B4EB2331.exe 1196 F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1296 wrote to memory of 1196 1296 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe 28 PID 1296 wrote to memory of 1196 1296 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe 28 PID 1296 wrote to memory of 1196 1296 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe 28 PID 1296 wrote to memory of 1196 1296 56b2ed4168a9ae9ffebead084809f6f256eba04a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\56b2ed4168a9ae9ffebead084809f6f256eba04a.exe"C:\Users\Admin\AppData\Local\Temp\56b2ed4168a9ae9ffebead084809f6f256eba04a.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\ProgramData\F4D55F6500014973000C4E45B4EB2331\F4D55F6500014973000C4E45B4EB2331.exe"C:\ProgramData\F4D55F6500014973000C4E45B4EB2331\F4D55F6500014973000C4E45B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\56b2ed4168a9ae9ffebead084809f6f256eba04a.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1196
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD5098f7deaf14f380726461f96d2c9c2ea
SHA156b2ed4168a9ae9ffebead084809f6f256eba04a
SHA25608416c37ce652e369717b975c81e7d335cebeb4466cd1530be03785197023850
SHA512a956c6b365da39f22be1c5a5087a939c557b8566fe340c89579351c53cef1a58fdd94f42227eae1532375b3174c949c5e82c2f4e95386e42dcc35775897fb7e3
-
Filesize
364KB
MD5098f7deaf14f380726461f96d2c9c2ea
SHA156b2ed4168a9ae9ffebead084809f6f256eba04a
SHA25608416c37ce652e369717b975c81e7d335cebeb4466cd1530be03785197023850
SHA512a956c6b365da39f22be1c5a5087a939c557b8566fe340c89579351c53cef1a58fdd94f42227eae1532375b3174c949c5e82c2f4e95386e42dcc35775897fb7e3
-
Filesize
364KB
MD5098f7deaf14f380726461f96d2c9c2ea
SHA156b2ed4168a9ae9ffebead084809f6f256eba04a
SHA25608416c37ce652e369717b975c81e7d335cebeb4466cd1530be03785197023850
SHA512a956c6b365da39f22be1c5a5087a939c557b8566fe340c89579351c53cef1a58fdd94f42227eae1532375b3174c949c5e82c2f4e95386e42dcc35775897fb7e3
-
Filesize
364KB
MD5098f7deaf14f380726461f96d2c9c2ea
SHA156b2ed4168a9ae9ffebead084809f6f256eba04a
SHA25608416c37ce652e369717b975c81e7d335cebeb4466cd1530be03785197023850
SHA512a956c6b365da39f22be1c5a5087a939c557b8566fe340c89579351c53cef1a58fdd94f42227eae1532375b3174c949c5e82c2f4e95386e42dcc35775897fb7e3