Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe
Resource
win10v2004-20230220-en
General
-
Target
d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe
-
Size
693KB
-
MD5
257c5899f3f77070f7378c656861dec4
-
SHA1
0fb9feefe8b1696fcb12de9ffee8089f8c969950
-
SHA256
d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1
-
SHA512
6e09112491333210076eaac729248397a6be5829ad9391c1cc40d81c7c9279a4236c2f35bd74c00f6f650985b38706d9e533da4781fbdbc39f19c0d264c1bfba
-
SSDEEP
12288:0y90GDmYZREv27UVoI3P4UVSlQ5Ez7weSpaBW/gnvt2:0yJFZR6273r1q5s7KaI2t2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 36970243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 36970243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 36970243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 36970243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 36970243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 36970243.exe -
Executes dropped EXE 3 IoCs
pid Process 632 un046162.exe 1748 36970243.exe 996 rk178862.exe -
Loads dropped DLL 8 IoCs
pid Process 1500 d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe 632 un046162.exe 632 un046162.exe 632 un046162.exe 1748 36970243.exe 632 un046162.exe 632 un046162.exe 996 rk178862.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 36970243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 36970243.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un046162.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un046162.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1748 36970243.exe 1748 36970243.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1748 36970243.exe Token: SeDebugPrivilege 996 rk178862.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1500 wrote to memory of 632 1500 d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe 27 PID 1500 wrote to memory of 632 1500 d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe 27 PID 1500 wrote to memory of 632 1500 d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe 27 PID 1500 wrote to memory of 632 1500 d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe 27 PID 1500 wrote to memory of 632 1500 d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe 27 PID 1500 wrote to memory of 632 1500 d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe 27 PID 1500 wrote to memory of 632 1500 d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe 27 PID 632 wrote to memory of 1748 632 un046162.exe 28 PID 632 wrote to memory of 1748 632 un046162.exe 28 PID 632 wrote to memory of 1748 632 un046162.exe 28 PID 632 wrote to memory of 1748 632 un046162.exe 28 PID 632 wrote to memory of 1748 632 un046162.exe 28 PID 632 wrote to memory of 1748 632 un046162.exe 28 PID 632 wrote to memory of 1748 632 un046162.exe 28 PID 632 wrote to memory of 996 632 un046162.exe 29 PID 632 wrote to memory of 996 632 un046162.exe 29 PID 632 wrote to memory of 996 632 un046162.exe 29 PID 632 wrote to memory of 996 632 un046162.exe 29 PID 632 wrote to memory of 996 632 un046162.exe 29 PID 632 wrote to memory of 996 632 un046162.exe 29 PID 632 wrote to memory of 996 632 un046162.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe"C:\Users\Admin\AppData\Local\Temp\d64f74ce08b66edfbb162d1f6e0824ae39108c225161b24ecfefa5d135b7e7c1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046162.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046162.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36970243.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\36970243.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk178862.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk178862.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5c73f2a0a2dd1c6d78af4adf3332e17dd
SHA19d56bad3a0668d4f8440ac9183058674d7f12d90
SHA256019b5800e32df37ef58ea91cc19aad93d0a9f3a2c821e58a5d04eb4d18efb421
SHA5121b7db9d330ac7f7953ceba0a28d2f662b527e096e3881b5b9c03e6d6fdc45d18c771b87e768d0c3cbed5680dc47bcbde128f78a89c7e4d273c10eb6f48486051
-
Filesize
540KB
MD5c73f2a0a2dd1c6d78af4adf3332e17dd
SHA19d56bad3a0668d4f8440ac9183058674d7f12d90
SHA256019b5800e32df37ef58ea91cc19aad93d0a9f3a2c821e58a5d04eb4d18efb421
SHA5121b7db9d330ac7f7953ceba0a28d2f662b527e096e3881b5b9c03e6d6fdc45d18c771b87e768d0c3cbed5680dc47bcbde128f78a89c7e4d273c10eb6f48486051
-
Filesize
258KB
MD5597ac9e8fbc1311bf1ad1b8be04d4eca
SHA170310732ac15956aba4d18c29b958539d12faa84
SHA2560c0ebd3f74d9897fa98ff21b54d18db1c22c2ecbbd8f0447dd7ce29fba1f0c8d
SHA512581526ae6192e6e8e6530fab0ed016b87cb28b1d4e0fe997e948f2f00805cbb9c1a5949368af44c7816079c161fc05a2767224c359440abbd30b1feda1169310
-
Filesize
258KB
MD5597ac9e8fbc1311bf1ad1b8be04d4eca
SHA170310732ac15956aba4d18c29b958539d12faa84
SHA2560c0ebd3f74d9897fa98ff21b54d18db1c22c2ecbbd8f0447dd7ce29fba1f0c8d
SHA512581526ae6192e6e8e6530fab0ed016b87cb28b1d4e0fe997e948f2f00805cbb9c1a5949368af44c7816079c161fc05a2767224c359440abbd30b1feda1169310
-
Filesize
258KB
MD5597ac9e8fbc1311bf1ad1b8be04d4eca
SHA170310732ac15956aba4d18c29b958539d12faa84
SHA2560c0ebd3f74d9897fa98ff21b54d18db1c22c2ecbbd8f0447dd7ce29fba1f0c8d
SHA512581526ae6192e6e8e6530fab0ed016b87cb28b1d4e0fe997e948f2f00805cbb9c1a5949368af44c7816079c161fc05a2767224c359440abbd30b1feda1169310
-
Filesize
340KB
MD5a5302a23fa5c1528f2d0b337100dcdbe
SHA12dd9d8e77797fff0255c215bcc0e765caf6b560d
SHA2562a9c97a418713061f03beec11452ba11fabe5a4c5a0b6487855a56ed70268ed5
SHA512e997d7746cce438a62152decb9d468f6cb9ba74f06d64d3403316d6db7aefe94c17bdbc1f5cd49713033aad23c325eef19f1fb461a61f0556f2b4ca398656236
-
Filesize
340KB
MD5a5302a23fa5c1528f2d0b337100dcdbe
SHA12dd9d8e77797fff0255c215bcc0e765caf6b560d
SHA2562a9c97a418713061f03beec11452ba11fabe5a4c5a0b6487855a56ed70268ed5
SHA512e997d7746cce438a62152decb9d468f6cb9ba74f06d64d3403316d6db7aefe94c17bdbc1f5cd49713033aad23c325eef19f1fb461a61f0556f2b4ca398656236
-
Filesize
340KB
MD5a5302a23fa5c1528f2d0b337100dcdbe
SHA12dd9d8e77797fff0255c215bcc0e765caf6b560d
SHA2562a9c97a418713061f03beec11452ba11fabe5a4c5a0b6487855a56ed70268ed5
SHA512e997d7746cce438a62152decb9d468f6cb9ba74f06d64d3403316d6db7aefe94c17bdbc1f5cd49713033aad23c325eef19f1fb461a61f0556f2b4ca398656236
-
Filesize
540KB
MD5c73f2a0a2dd1c6d78af4adf3332e17dd
SHA19d56bad3a0668d4f8440ac9183058674d7f12d90
SHA256019b5800e32df37ef58ea91cc19aad93d0a9f3a2c821e58a5d04eb4d18efb421
SHA5121b7db9d330ac7f7953ceba0a28d2f662b527e096e3881b5b9c03e6d6fdc45d18c771b87e768d0c3cbed5680dc47bcbde128f78a89c7e4d273c10eb6f48486051
-
Filesize
540KB
MD5c73f2a0a2dd1c6d78af4adf3332e17dd
SHA19d56bad3a0668d4f8440ac9183058674d7f12d90
SHA256019b5800e32df37ef58ea91cc19aad93d0a9f3a2c821e58a5d04eb4d18efb421
SHA5121b7db9d330ac7f7953ceba0a28d2f662b527e096e3881b5b9c03e6d6fdc45d18c771b87e768d0c3cbed5680dc47bcbde128f78a89c7e4d273c10eb6f48486051
-
Filesize
258KB
MD5597ac9e8fbc1311bf1ad1b8be04d4eca
SHA170310732ac15956aba4d18c29b958539d12faa84
SHA2560c0ebd3f74d9897fa98ff21b54d18db1c22c2ecbbd8f0447dd7ce29fba1f0c8d
SHA512581526ae6192e6e8e6530fab0ed016b87cb28b1d4e0fe997e948f2f00805cbb9c1a5949368af44c7816079c161fc05a2767224c359440abbd30b1feda1169310
-
Filesize
258KB
MD5597ac9e8fbc1311bf1ad1b8be04d4eca
SHA170310732ac15956aba4d18c29b958539d12faa84
SHA2560c0ebd3f74d9897fa98ff21b54d18db1c22c2ecbbd8f0447dd7ce29fba1f0c8d
SHA512581526ae6192e6e8e6530fab0ed016b87cb28b1d4e0fe997e948f2f00805cbb9c1a5949368af44c7816079c161fc05a2767224c359440abbd30b1feda1169310
-
Filesize
258KB
MD5597ac9e8fbc1311bf1ad1b8be04d4eca
SHA170310732ac15956aba4d18c29b958539d12faa84
SHA2560c0ebd3f74d9897fa98ff21b54d18db1c22c2ecbbd8f0447dd7ce29fba1f0c8d
SHA512581526ae6192e6e8e6530fab0ed016b87cb28b1d4e0fe997e948f2f00805cbb9c1a5949368af44c7816079c161fc05a2767224c359440abbd30b1feda1169310
-
Filesize
340KB
MD5a5302a23fa5c1528f2d0b337100dcdbe
SHA12dd9d8e77797fff0255c215bcc0e765caf6b560d
SHA2562a9c97a418713061f03beec11452ba11fabe5a4c5a0b6487855a56ed70268ed5
SHA512e997d7746cce438a62152decb9d468f6cb9ba74f06d64d3403316d6db7aefe94c17bdbc1f5cd49713033aad23c325eef19f1fb461a61f0556f2b4ca398656236
-
Filesize
340KB
MD5a5302a23fa5c1528f2d0b337100dcdbe
SHA12dd9d8e77797fff0255c215bcc0e765caf6b560d
SHA2562a9c97a418713061f03beec11452ba11fabe5a4c5a0b6487855a56ed70268ed5
SHA512e997d7746cce438a62152decb9d468f6cb9ba74f06d64d3403316d6db7aefe94c17bdbc1f5cd49713033aad23c325eef19f1fb461a61f0556f2b4ca398656236
-
Filesize
340KB
MD5a5302a23fa5c1528f2d0b337100dcdbe
SHA12dd9d8e77797fff0255c215bcc0e765caf6b560d
SHA2562a9c97a418713061f03beec11452ba11fabe5a4c5a0b6487855a56ed70268ed5
SHA512e997d7746cce438a62152decb9d468f6cb9ba74f06d64d3403316d6db7aefe94c17bdbc1f5cd49713033aad23c325eef19f1fb461a61f0556f2b4ca398656236