Analysis
-
max time kernel
67s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
11/04/2023, 01:12
Behavioral task
behavioral1
Sample
xzxz/DriveMgr.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
xzxz/New folder.exe
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
xzxz/VolDriver.exe
Resource
win10-20230220-en
Behavioral task
behavioral4
Sample
xzxz/a.lnk
Resource
win10-20230220-en
Behavioral task
behavioral5
Sample
xzxz/a2.lnk
Resource
win10-20230220-en
Behavioral task
behavioral6
Sample
xzxz/winoeev.exe
Resource
win10-20230220-en
General
-
Target
xzxz/winoeev.exe
-
Size
324KB
-
MD5
81bf96b5d25b56432ebb295d4488d032
-
SHA1
31abd9f36f2f390716f57aa3efaa787da510eb69
-
SHA256
0190d27c34cd33b9c688c7adb9634a94ef5adb9a6ae380963a1a41b26b42fc7e
-
SHA512
55ec4fbfed0b117279ce9461cdab43b5a390fa85579e707cd4b3d99cfcec5c5210d89a8f07cb76876c899bd0ccf89bd169010d3643e6ab0d51e6b6047372e5d2
-
SSDEEP
6144:O11c1XQEcGONpL2RxPu9bf8scBV+UdvrEFp7hKAwF:Os1XQbGGLexPu9bf8scBjvrEH7zQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" winoeev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" winoeev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" winoeev.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winoeev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winoeev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" winoeev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" winoeev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winoeev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winoeev.exe -
Modifies AppInit DLL entries 2 TTPs
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral6/files/0x000500000001a560-121.dat acprotect behavioral6/files/0x000500000001a560-126.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 4300 winoeev.exe -
resource yara_rule behavioral6/files/0x000500000001a560-121.dat upx behavioral6/memory/4300-125-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral6/files/0x000500000001a560-126.dat upx behavioral6/memory/4300-135-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral6/memory/4300-140-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral6/memory/4300-144-0x0000000010000000-0x0000000010030000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" winoeev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winoeev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winoeev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" winoeev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" winoeev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winoeev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winoeev.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: winoeev.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll winoeev.exe File created \??\c:\program files\common files\system\symsrv.dll.000 winoeev.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe 4300 winoeev.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4300 winoeev.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\xzxz\winoeev.exe"C:\Users\Admin\AppData\Local\Temp\xzxz\winoeev.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab