Analysis
-
max time kernel
135s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10-01-2023 02:25
Static task
static1
Behavioral task
behavioral1
Sample
a98ed2e1323d5735f51836bad1508bc5a8f56725.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a98ed2e1323d5735f51836bad1508bc5a8f56725.exe
Resource
win10v2004-20220812-en
General
-
Target
a98ed2e1323d5735f51836bad1508bc5a8f56725.exe
-
Size
364KB
-
MD5
b3408319e852d4464b38e6a48d35c3f6
-
SHA1
a98ed2e1323d5735f51836bad1508bc5a8f56725
-
SHA256
b40ba33655b131b83600730d0e7925993c7777da1e1044f38896d36ce19ef9e3
-
SHA512
1346dfe555aa779f5de89e3056ba0ada647b0c4c3269ccabd3a09f342d3be2066532f7ec5019112e4a2e986f1525aa32e007bd1fa0e821da6d4ad8141c1c52dc
-
SSDEEP
6144:R4XyXMFWRPs8OW452Q0H2DjOnJm6Zy/ZPAQ9gBf:RJMFOkbV5f0H2DeJxZaZPJ+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a98ed2e1323d5735f51836bad1508bc5a8f56725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a98ed2e1323d5735f51836bad1508bc5a8f56725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a98ed2e1323d5735f51836bad1508bc5a8f56725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" a98ed2e1323d5735f51836bad1508bc5a8f56725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a98ed2e1323d5735f51836bad1508bc5a8f56725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C4E45B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1228 F4D55F6500014973000C4E45B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 1228 F4D55F6500014973000C4E45B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1632 a98ed2e1323d5735f51836bad1508bc5a8f56725.exe 1632 a98ed2e1323d5735f51836bad1508bc5a8f56725.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a98ed2e1323d5735f51836bad1508bc5a8f56725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a98ed2e1323d5735f51836bad1508bc5a8f56725.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc a98ed2e1323d5735f51836bad1508bc5a8f56725.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a98ed2e1323d5735f51836bad1508bc5a8f56725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000C4E45B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" a98ed2e1323d5735f51836bad1508bc5a8f56725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a98ed2e1323d5735f51836bad1508bc5a8f56725.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc a98ed2e1323d5735f51836bad1508bc5a8f56725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000C4E45B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000C4E45B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000C4E45B4EB2331\\F4D55F6500014973000C4E45B4EB2331.exe" F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1632 a98ed2e1323d5735f51836bad1508bc5a8f56725.exe 1632 a98ed2e1323d5735f51836bad1508bc5a8f56725.exe 1632 a98ed2e1323d5735f51836bad1508bc5a8f56725.exe 1632 a98ed2e1323d5735f51836bad1508bc5a8f56725.exe 1632 a98ed2e1323d5735f51836bad1508bc5a8f56725.exe 1632 a98ed2e1323d5735f51836bad1508bc5a8f56725.exe 1632 a98ed2e1323d5735f51836bad1508bc5a8f56725.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1228 F4D55F6500014973000C4E45B4EB2331.exe 1228 F4D55F6500014973000C4E45B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1228 1632 a98ed2e1323d5735f51836bad1508bc5a8f56725.exe 27 PID 1632 wrote to memory of 1228 1632 a98ed2e1323d5735f51836bad1508bc5a8f56725.exe 27 PID 1632 wrote to memory of 1228 1632 a98ed2e1323d5735f51836bad1508bc5a8f56725.exe 27 PID 1632 wrote to memory of 1228 1632 a98ed2e1323d5735f51836bad1508bc5a8f56725.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a98ed2e1323d5735f51836bad1508bc5a8f56725.exe"C:\Users\Admin\AppData\Local\Temp\a98ed2e1323d5735f51836bad1508bc5a8f56725.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\ProgramData\F4D55F6500014973000C4E45B4EB2331\F4D55F6500014973000C4E45B4EB2331.exe"C:\ProgramData\F4D55F6500014973000C4E45B4EB2331\F4D55F6500014973000C4E45B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\a98ed2e1323d5735f51836bad1508bc5a8f56725.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1228
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD5b3408319e852d4464b38e6a48d35c3f6
SHA1a98ed2e1323d5735f51836bad1508bc5a8f56725
SHA256b40ba33655b131b83600730d0e7925993c7777da1e1044f38896d36ce19ef9e3
SHA5121346dfe555aa779f5de89e3056ba0ada647b0c4c3269ccabd3a09f342d3be2066532f7ec5019112e4a2e986f1525aa32e007bd1fa0e821da6d4ad8141c1c52dc
-
Filesize
364KB
MD5b3408319e852d4464b38e6a48d35c3f6
SHA1a98ed2e1323d5735f51836bad1508bc5a8f56725
SHA256b40ba33655b131b83600730d0e7925993c7777da1e1044f38896d36ce19ef9e3
SHA5121346dfe555aa779f5de89e3056ba0ada647b0c4c3269ccabd3a09f342d3be2066532f7ec5019112e4a2e986f1525aa32e007bd1fa0e821da6d4ad8141c1c52dc
-
Filesize
364KB
MD5b3408319e852d4464b38e6a48d35c3f6
SHA1a98ed2e1323d5735f51836bad1508bc5a8f56725
SHA256b40ba33655b131b83600730d0e7925993c7777da1e1044f38896d36ce19ef9e3
SHA5121346dfe555aa779f5de89e3056ba0ada647b0c4c3269ccabd3a09f342d3be2066532f7ec5019112e4a2e986f1525aa32e007bd1fa0e821da6d4ad8141c1c52dc
-
Filesize
364KB
MD5b3408319e852d4464b38e6a48d35c3f6
SHA1a98ed2e1323d5735f51836bad1508bc5a8f56725
SHA256b40ba33655b131b83600730d0e7925993c7777da1e1044f38896d36ce19ef9e3
SHA5121346dfe555aa779f5de89e3056ba0ada647b0c4c3269ccabd3a09f342d3be2066532f7ec5019112e4a2e986f1525aa32e007bd1fa0e821da6d4ad8141c1c52dc