Analysis
-
max time kernel
152s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe
Resource
win10v2004-20230220-en
General
-
Target
df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe
-
Size
674KB
-
MD5
7440ff76fa12b307497d81a9ab9cd1c7
-
SHA1
31de0c1438cede9766194bcda8bcc2b77cd07ed8
-
SHA256
df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4
-
SHA512
8e28f67ab47050ab3fb55f00c10b08917904aa835d1091f1f801d1fd00e910d8bb327fbbcc7103af99d3b6a4c48926cb26e6f5f84504400e38c7bef765bb102f
-
SSDEEP
12288:Ey90VWPMB7TgeLNvzTAo/PLeNg0s3OuVvGWITSvDWphO82875h:EybPYd8o/P25KOOiTS6phO828T
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 56957119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 56957119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 56957119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 56957119.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 56957119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 56957119.exe -
Executes dropped EXE 3 IoCs
pid Process 1260 st749660.exe 1056 56957119.exe 924 kp624894.exe -
Loads dropped DLL 7 IoCs
pid Process 1312 df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe 1260 st749660.exe 1260 st749660.exe 1056 56957119.exe 1260 st749660.exe 1260 st749660.exe 924 kp624894.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 56957119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 56957119.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st749660.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st749660.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1056 56957119.exe 1056 56957119.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1056 56957119.exe Token: SeDebugPrivilege 924 kp624894.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1260 1312 df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe 28 PID 1312 wrote to memory of 1260 1312 df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe 28 PID 1312 wrote to memory of 1260 1312 df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe 28 PID 1312 wrote to memory of 1260 1312 df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe 28 PID 1312 wrote to memory of 1260 1312 df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe 28 PID 1312 wrote to memory of 1260 1312 df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe 28 PID 1312 wrote to memory of 1260 1312 df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe 28 PID 1260 wrote to memory of 1056 1260 st749660.exe 29 PID 1260 wrote to memory of 1056 1260 st749660.exe 29 PID 1260 wrote to memory of 1056 1260 st749660.exe 29 PID 1260 wrote to memory of 1056 1260 st749660.exe 29 PID 1260 wrote to memory of 1056 1260 st749660.exe 29 PID 1260 wrote to memory of 1056 1260 st749660.exe 29 PID 1260 wrote to memory of 1056 1260 st749660.exe 29 PID 1260 wrote to memory of 924 1260 st749660.exe 30 PID 1260 wrote to memory of 924 1260 st749660.exe 30 PID 1260 wrote to memory of 924 1260 st749660.exe 30 PID 1260 wrote to memory of 924 1260 st749660.exe 30 PID 1260 wrote to memory of 924 1260 st749660.exe 30 PID 1260 wrote to memory of 924 1260 st749660.exe 30 PID 1260 wrote to memory of 924 1260 st749660.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe"C:\Users\Admin\AppData\Local\Temp\df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
519KB
MD5411df1ab1a708202f347d5af552b9a58
SHA10cdc36cab112173b8527f82110ecc16f792902f2
SHA25650e5440679e1056d8f8b868e46b7e0b6c779ad2f2362654382fcae718773aa6e
SHA5129b4f8be9a04f843f942dd7ef0bd062319f44ca97d6d9fd6fb45eb60578b74f716916d4aff0aefff904cee7660749fe8695a2b7f227ed4c461c907be8610fca24
-
Filesize
519KB
MD5411df1ab1a708202f347d5af552b9a58
SHA10cdc36cab112173b8527f82110ecc16f792902f2
SHA25650e5440679e1056d8f8b868e46b7e0b6c779ad2f2362654382fcae718773aa6e
SHA5129b4f8be9a04f843f942dd7ef0bd062319f44ca97d6d9fd6fb45eb60578b74f716916d4aff0aefff904cee7660749fe8695a2b7f227ed4c461c907be8610fca24
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
415KB
MD5c8646ad71b08f3d1380a6be0537f281c
SHA11eab0e05dffb4a72be200dc4fad9cc1ce297fd36
SHA2567d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a
SHA512a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0
-
Filesize
415KB
MD5c8646ad71b08f3d1380a6be0537f281c
SHA11eab0e05dffb4a72be200dc4fad9cc1ce297fd36
SHA2567d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a
SHA512a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0
-
Filesize
415KB
MD5c8646ad71b08f3d1380a6be0537f281c
SHA11eab0e05dffb4a72be200dc4fad9cc1ce297fd36
SHA2567d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a
SHA512a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0
-
Filesize
519KB
MD5411df1ab1a708202f347d5af552b9a58
SHA10cdc36cab112173b8527f82110ecc16f792902f2
SHA25650e5440679e1056d8f8b868e46b7e0b6c779ad2f2362654382fcae718773aa6e
SHA5129b4f8be9a04f843f942dd7ef0bd062319f44ca97d6d9fd6fb45eb60578b74f716916d4aff0aefff904cee7660749fe8695a2b7f227ed4c461c907be8610fca24
-
Filesize
519KB
MD5411df1ab1a708202f347d5af552b9a58
SHA10cdc36cab112173b8527f82110ecc16f792902f2
SHA25650e5440679e1056d8f8b868e46b7e0b6c779ad2f2362654382fcae718773aa6e
SHA5129b4f8be9a04f843f942dd7ef0bd062319f44ca97d6d9fd6fb45eb60578b74f716916d4aff0aefff904cee7660749fe8695a2b7f227ed4c461c907be8610fca24
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
415KB
MD5c8646ad71b08f3d1380a6be0537f281c
SHA11eab0e05dffb4a72be200dc4fad9cc1ce297fd36
SHA2567d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a
SHA512a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0
-
Filesize
415KB
MD5c8646ad71b08f3d1380a6be0537f281c
SHA11eab0e05dffb4a72be200dc4fad9cc1ce297fd36
SHA2567d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a
SHA512a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0
-
Filesize
415KB
MD5c8646ad71b08f3d1380a6be0537f281c
SHA11eab0e05dffb4a72be200dc4fad9cc1ce297fd36
SHA2567d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a
SHA512a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0