Analysis
-
max time kernel
217s -
max time network
230s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
e41bf2b6dda69f86c72e4295ba6a5684ad52ad3c1d76d437db02aba19e7cffc0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e41bf2b6dda69f86c72e4295ba6a5684ad52ad3c1d76d437db02aba19e7cffc0.exe
Resource
win10v2004-20230221-en
General
-
Target
e41bf2b6dda69f86c72e4295ba6a5684ad52ad3c1d76d437db02aba19e7cffc0.exe
-
Size
695KB
-
MD5
a5d7d7aa7665e12fc8d71a341c3130e2
-
SHA1
f4f37caf70071a7dfee2c70f081d933be6ebbd19
-
SHA256
e41bf2b6dda69f86c72e4295ba6a5684ad52ad3c1d76d437db02aba19e7cffc0
-
SHA512
eb1ac077f3c6b5271f767411cb750ae3ac692494a6c6bccae38bab521b45f84c8ac218a17b550f1300193cd833423647ddc882972bc7de8a3e35277fbc1cf744
-
SSDEEP
12288:Ny90mXTZFubLxC/+tZ9COuFiHdt5jWZpPWy6Bn18btKGA+q3c+:NyStC/+tXCP4Urz6Bn18bt503d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 67166031.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 67166031.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 67166031.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 67166031.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 67166031.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 67166031.exe -
Executes dropped EXE 3 IoCs
pid Process 4456 un871210.exe 208 67166031.exe 1308 rk954358.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 67166031.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 67166031.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un871210.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e41bf2b6dda69f86c72e4295ba6a5684ad52ad3c1d76d437db02aba19e7cffc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e41bf2b6dda69f86c72e4295ba6a5684ad52ad3c1d76d437db02aba19e7cffc0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un871210.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3088 208 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 208 67166031.exe 208 67166031.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 208 67166031.exe Token: SeDebugPrivilege 1308 rk954358.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 796 wrote to memory of 4456 796 e41bf2b6dda69f86c72e4295ba6a5684ad52ad3c1d76d437db02aba19e7cffc0.exe 79 PID 796 wrote to memory of 4456 796 e41bf2b6dda69f86c72e4295ba6a5684ad52ad3c1d76d437db02aba19e7cffc0.exe 79 PID 796 wrote to memory of 4456 796 e41bf2b6dda69f86c72e4295ba6a5684ad52ad3c1d76d437db02aba19e7cffc0.exe 79 PID 4456 wrote to memory of 208 4456 un871210.exe 80 PID 4456 wrote to memory of 208 4456 un871210.exe 80 PID 4456 wrote to memory of 208 4456 un871210.exe 80 PID 4456 wrote to memory of 1308 4456 un871210.exe 84 PID 4456 wrote to memory of 1308 4456 un871210.exe 84 PID 4456 wrote to memory of 1308 4456 un871210.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e41bf2b6dda69f86c72e4295ba6a5684ad52ad3c1d76d437db02aba19e7cffc0.exe"C:\Users\Admin\AppData\Local\Temp\e41bf2b6dda69f86c72e4295ba6a5684ad52ad3c1d76d437db02aba19e7cffc0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un871210.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un871210.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\67166031.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\67166031.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 10884⤵
- Program crash
PID:3088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk954358.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk954358.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 208 -ip 2081⤵PID:1664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD51f40057b700f19ecd8f90276397e2ca0
SHA1397636bd2abc0d33f04b69c1bbbccad26d3b9da6
SHA256d95d395428d5b58cf367a759470d23ad8e07b67cc2d5398354e342f56253d178
SHA512594b94a2d6ddfb4b2c34e53da589eed28c3ad3bef185d185504204244ac07c8ca5d50d79f254079959a662feb55cd9c1b4e896544ccd5dc64325b250c7c54af4
-
Filesize
541KB
MD51f40057b700f19ecd8f90276397e2ca0
SHA1397636bd2abc0d33f04b69c1bbbccad26d3b9da6
SHA256d95d395428d5b58cf367a759470d23ad8e07b67cc2d5398354e342f56253d178
SHA512594b94a2d6ddfb4b2c34e53da589eed28c3ad3bef185d185504204244ac07c8ca5d50d79f254079959a662feb55cd9c1b4e896544ccd5dc64325b250c7c54af4
-
Filesize
258KB
MD571537c23116dbedf40aba52eb6199d7b
SHA1678490e081dc57d9ec769a76e34e1b2cb52a588b
SHA2560bea06aff520a74a98890d2221ac3c177d348b940ee63fc4cb063949dfd53c82
SHA51227234b4d0b3ff78c31578aa7d2c9e96050f82ac12b816f62d60985fa66015bc03f7f7bf05c39c2c77d9ddaf0d8fc82231e0a2c70e4ba3b8d0c83858b0fd3c756
-
Filesize
258KB
MD571537c23116dbedf40aba52eb6199d7b
SHA1678490e081dc57d9ec769a76e34e1b2cb52a588b
SHA2560bea06aff520a74a98890d2221ac3c177d348b940ee63fc4cb063949dfd53c82
SHA51227234b4d0b3ff78c31578aa7d2c9e96050f82ac12b816f62d60985fa66015bc03f7f7bf05c39c2c77d9ddaf0d8fc82231e0a2c70e4ba3b8d0c83858b0fd3c756
-
Filesize
340KB
MD5cc056d29bd59b5d63000449bea75b815
SHA1a4cdd85b736918c5ad5f5571822725ed54694687
SHA256785bd8e4845ed8fdd60803c11fc0437837cda11480190354d543bb92144b541f
SHA512ac13b84460948e4e7d3e57c0167d24e4fa4972719fa59e053973e64da3e4308df1fdbf6b2633895f71111828be8f58f2a12f8c443ab33a9345338ed2fae12890
-
Filesize
340KB
MD5cc056d29bd59b5d63000449bea75b815
SHA1a4cdd85b736918c5ad5f5571822725ed54694687
SHA256785bd8e4845ed8fdd60803c11fc0437837cda11480190354d543bb92144b541f
SHA512ac13b84460948e4e7d3e57c0167d24e4fa4972719fa59e053973e64da3e4308df1fdbf6b2633895f71111828be8f58f2a12f8c443ab33a9345338ed2fae12890