Analysis
-
max time kernel
29s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28/03/2023, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe
Resource
win10v2004-20230220-en
General
-
Target
8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe
-
Size
328KB
-
MD5
087559133a6f3ddd6923c9bfd102546f
-
SHA1
a26b3bfc0494f2a0ce623dafcf201b39fe9ceafd
-
SHA256
8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0
-
SHA512
fd6162d5b182b2d6b227a2289cc7df2ceb8e3545fbfa8ac64d15bf700201095edfddc6cbfc9cfaf47924f4004053bd70df77e0eff36fd37614c88709ec122afc
-
SSDEEP
6144:Kby+bnr+hp0yN90QE1Fv2QK7JyZaKbNaWzHHtpXJZDwav2FHordJR45S:1MrNy90rFeQK7mxFwav2irfgS
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ctIm52Ct56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ctIm52Ct56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ctIm52Ct56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beEM25WS38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beEM25WS38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beEM25WS38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beEM25WS38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ctIm52Ct56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ctIm52Ct56.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beEM25WS38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beEM25WS38.exe -
Executes dropped EXE 2 IoCs
pid Process 1256 beEM25WS38.exe 1380 ctIm52Ct56.exe -
Loads dropped DLL 4 IoCs
pid Process 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 1256 beEM25WS38.exe 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" beEM25WS38.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features ctIm52Ct56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" ctIm52Ct56.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features beEM25WS38.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1256 beEM25WS38.exe 1256 beEM25WS38.exe 1380 ctIm52Ct56.exe 1380 ctIm52Ct56.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1256 beEM25WS38.exe Token: SeDebugPrivilege 1380 ctIm52Ct56.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1256 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 28 PID 1372 wrote to memory of 1256 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 28 PID 1372 wrote to memory of 1256 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 28 PID 1372 wrote to memory of 1256 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 28 PID 1372 wrote to memory of 1256 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 28 PID 1372 wrote to memory of 1256 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 28 PID 1372 wrote to memory of 1256 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 28 PID 1372 wrote to memory of 1380 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 29 PID 1372 wrote to memory of 1380 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 29 PID 1372 wrote to memory of 1380 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 29 PID 1372 wrote to memory of 1380 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 29 PID 1372 wrote to memory of 1380 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 29 PID 1372 wrote to memory of 1380 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 29 PID 1372 wrote to memory of 1380 1372 8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe"C:\Users\Admin\AppData\Local\Temp\8c392e3e15046d4edb4e253ac9e8e63bb2ed2771f896e8a2df96edd29ed379c0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\beEM25WS38.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\beEM25WS38.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ctIm52Ct56.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ctIm52Ct56.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD52e26dba8fb0f0a5e89760ad7ed6912fe
SHA1b66d29da92a60aefa3fc5e84e11f6b1af5c4c5a4
SHA25663cf4d05b6d3365cc059f683e6a5b50ed6e5c1c47e9cdf68f99e0fd481853a5f
SHA512527e97acdf0ee505b30a23f7a721324e643aaf2d2c5dbcf1b4918de8eeafa84d1225c048f0fd6bfbdaa568789e81559ca92ab4e9b21c4929ef25b8e6e8a1115b
-
Filesize
232KB
MD52e26dba8fb0f0a5e89760ad7ed6912fe
SHA1b66d29da92a60aefa3fc5e84e11f6b1af5c4c5a4
SHA25663cf4d05b6d3365cc059f683e6a5b50ed6e5c1c47e9cdf68f99e0fd481853a5f
SHA512527e97acdf0ee505b30a23f7a721324e643aaf2d2c5dbcf1b4918de8eeafa84d1225c048f0fd6bfbdaa568789e81559ca92ab4e9b21c4929ef25b8e6e8a1115b
-
Filesize
232KB
MD52e26dba8fb0f0a5e89760ad7ed6912fe
SHA1b66d29da92a60aefa3fc5e84e11f6b1af5c4c5a4
SHA25663cf4d05b6d3365cc059f683e6a5b50ed6e5c1c47e9cdf68f99e0fd481853a5f
SHA512527e97acdf0ee505b30a23f7a721324e643aaf2d2c5dbcf1b4918de8eeafa84d1225c048f0fd6bfbdaa568789e81559ca92ab4e9b21c4929ef25b8e6e8a1115b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
232KB
MD52e26dba8fb0f0a5e89760ad7ed6912fe
SHA1b66d29da92a60aefa3fc5e84e11f6b1af5c4c5a4
SHA25663cf4d05b6d3365cc059f683e6a5b50ed6e5c1c47e9cdf68f99e0fd481853a5f
SHA512527e97acdf0ee505b30a23f7a721324e643aaf2d2c5dbcf1b4918de8eeafa84d1225c048f0fd6bfbdaa568789e81559ca92ab4e9b21c4929ef25b8e6e8a1115b
-
Filesize
232KB
MD52e26dba8fb0f0a5e89760ad7ed6912fe
SHA1b66d29da92a60aefa3fc5e84e11f6b1af5c4c5a4
SHA25663cf4d05b6d3365cc059f683e6a5b50ed6e5c1c47e9cdf68f99e0fd481853a5f
SHA512527e97acdf0ee505b30a23f7a721324e643aaf2d2c5dbcf1b4918de8eeafa84d1225c048f0fd6bfbdaa568789e81559ca92ab4e9b21c4929ef25b8e6e8a1115b
-
Filesize
232KB
MD52e26dba8fb0f0a5e89760ad7ed6912fe
SHA1b66d29da92a60aefa3fc5e84e11f6b1af5c4c5a4
SHA25663cf4d05b6d3365cc059f683e6a5b50ed6e5c1c47e9cdf68f99e0fd481853a5f
SHA512527e97acdf0ee505b30a23f7a721324e643aaf2d2c5dbcf1b4918de8eeafa84d1225c048f0fd6bfbdaa568789e81559ca92ab4e9b21c4929ef25b8e6e8a1115b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91