Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe
Resource
win10v2004-20230221-en
General
-
Target
ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe
-
Size
695KB
-
MD5
0dfd2d8e082aa02912c386264094d895
-
SHA1
67337054bc7eedd74f3c6d4457c84e7eed1b1786
-
SHA256
ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135
-
SHA512
0a33420fa5af6df199a86c9934aff87e47e6e54e6103e9ccdd05b939388bb3d6738b15d34f118e2d67d6f331059c3e86475ea32cc40756787cba8e0e2599aea2
-
SSDEEP
12288:sy901BNCIT+84LqyU3uWn2Ki9j03H8o8YbInekof3QWWx6bJquSbZemZOdZIAf:syYBNCIi2NuW2Kia3TpIneO6EbZJA1f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 12062463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 12062463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 12062463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 12062463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 12062463.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 12062463.exe -
Executes dropped EXE 3 IoCs
pid Process 2004 un477873.exe 772 12062463.exe 1816 rk913381.exe -
Loads dropped DLL 8 IoCs
pid Process 2028 ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe 2004 un477873.exe 2004 un477873.exe 2004 un477873.exe 772 12062463.exe 2004 un477873.exe 2004 un477873.exe 1816 rk913381.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 12062463.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 12062463.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un477873.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un477873.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 772 12062463.exe 772 12062463.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 772 12062463.exe Token: SeDebugPrivilege 1816 rk913381.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2004 2028 ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe 27 PID 2028 wrote to memory of 2004 2028 ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe 27 PID 2028 wrote to memory of 2004 2028 ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe 27 PID 2028 wrote to memory of 2004 2028 ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe 27 PID 2028 wrote to memory of 2004 2028 ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe 27 PID 2028 wrote to memory of 2004 2028 ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe 27 PID 2028 wrote to memory of 2004 2028 ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe 27 PID 2004 wrote to memory of 772 2004 un477873.exe 28 PID 2004 wrote to memory of 772 2004 un477873.exe 28 PID 2004 wrote to memory of 772 2004 un477873.exe 28 PID 2004 wrote to memory of 772 2004 un477873.exe 28 PID 2004 wrote to memory of 772 2004 un477873.exe 28 PID 2004 wrote to memory of 772 2004 un477873.exe 28 PID 2004 wrote to memory of 772 2004 un477873.exe 28 PID 2004 wrote to memory of 1816 2004 un477873.exe 29 PID 2004 wrote to memory of 1816 2004 un477873.exe 29 PID 2004 wrote to memory of 1816 2004 un477873.exe 29 PID 2004 wrote to memory of 1816 2004 un477873.exe 29 PID 2004 wrote to memory of 1816 2004 un477873.exe 29 PID 2004 wrote to memory of 1816 2004 un477873.exe 29 PID 2004 wrote to memory of 1816 2004 un477873.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe"C:\Users\Admin\AppData\Local\Temp\ec85071f91f4478d15217b37484908ec6da5d8d77f4d10b1fbc0744362725135.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477873.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477873.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12062463.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12062463.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk913381.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk913381.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD55f302a905ad6c203be441900700bed8a
SHA1ecd30b46c8e78e5bd83ee05afef66889503c1a50
SHA256f130e6f386d68f1628da8d9c3884368cd29a313a393a885059e57f38e7909b03
SHA512488163d5b62d7beea1b328f722dae392885c982fecc1fb54c738616167c768300b783d3dc826365c6f038940ffcbe51437c2879282321c5822013cdf9f2e3adc
-
Filesize
541KB
MD55f302a905ad6c203be441900700bed8a
SHA1ecd30b46c8e78e5bd83ee05afef66889503c1a50
SHA256f130e6f386d68f1628da8d9c3884368cd29a313a393a885059e57f38e7909b03
SHA512488163d5b62d7beea1b328f722dae392885c982fecc1fb54c738616167c768300b783d3dc826365c6f038940ffcbe51437c2879282321c5822013cdf9f2e3adc
-
Filesize
257KB
MD5574765ed04857c761aeaf22bbffe5417
SHA19c03529e4b04a129dc4a0863833128b4535ecb34
SHA25649a4a71636e177b809ad7fa28afea553ee6008bf5bf4dd8d6b284e39f61db46a
SHA5120abbf9c422f721b0c0be7c696375ada542d84f3bd996cdae16723e521b5c55e5a7383cfc103d5869ea8730a0de7b37f1467de0fda846cdacf251022a32aa7657
-
Filesize
257KB
MD5574765ed04857c761aeaf22bbffe5417
SHA19c03529e4b04a129dc4a0863833128b4535ecb34
SHA25649a4a71636e177b809ad7fa28afea553ee6008bf5bf4dd8d6b284e39f61db46a
SHA5120abbf9c422f721b0c0be7c696375ada542d84f3bd996cdae16723e521b5c55e5a7383cfc103d5869ea8730a0de7b37f1467de0fda846cdacf251022a32aa7657
-
Filesize
257KB
MD5574765ed04857c761aeaf22bbffe5417
SHA19c03529e4b04a129dc4a0863833128b4535ecb34
SHA25649a4a71636e177b809ad7fa28afea553ee6008bf5bf4dd8d6b284e39f61db46a
SHA5120abbf9c422f721b0c0be7c696375ada542d84f3bd996cdae16723e521b5c55e5a7383cfc103d5869ea8730a0de7b37f1467de0fda846cdacf251022a32aa7657
-
Filesize
340KB
MD5247d6159101b101678ae29e38ccde984
SHA12f0fb6ab91ec4376017b124dd73d9a1dafb34562
SHA256e8cf125a3a139c43e15a13ece36b469d21d9bd1d295158879ae6ad737b950173
SHA51268a3bb1e131f7d4f4124342a90057a17c541f21bd61596fcd4dd8e31bd31d06005da4091b5c4e1c9755d6024072b3bc1d7fecdb5389ef7cf9f36ef25be8a6c0d
-
Filesize
340KB
MD5247d6159101b101678ae29e38ccde984
SHA12f0fb6ab91ec4376017b124dd73d9a1dafb34562
SHA256e8cf125a3a139c43e15a13ece36b469d21d9bd1d295158879ae6ad737b950173
SHA51268a3bb1e131f7d4f4124342a90057a17c541f21bd61596fcd4dd8e31bd31d06005da4091b5c4e1c9755d6024072b3bc1d7fecdb5389ef7cf9f36ef25be8a6c0d
-
Filesize
340KB
MD5247d6159101b101678ae29e38ccde984
SHA12f0fb6ab91ec4376017b124dd73d9a1dafb34562
SHA256e8cf125a3a139c43e15a13ece36b469d21d9bd1d295158879ae6ad737b950173
SHA51268a3bb1e131f7d4f4124342a90057a17c541f21bd61596fcd4dd8e31bd31d06005da4091b5c4e1c9755d6024072b3bc1d7fecdb5389ef7cf9f36ef25be8a6c0d
-
Filesize
541KB
MD55f302a905ad6c203be441900700bed8a
SHA1ecd30b46c8e78e5bd83ee05afef66889503c1a50
SHA256f130e6f386d68f1628da8d9c3884368cd29a313a393a885059e57f38e7909b03
SHA512488163d5b62d7beea1b328f722dae392885c982fecc1fb54c738616167c768300b783d3dc826365c6f038940ffcbe51437c2879282321c5822013cdf9f2e3adc
-
Filesize
541KB
MD55f302a905ad6c203be441900700bed8a
SHA1ecd30b46c8e78e5bd83ee05afef66889503c1a50
SHA256f130e6f386d68f1628da8d9c3884368cd29a313a393a885059e57f38e7909b03
SHA512488163d5b62d7beea1b328f722dae392885c982fecc1fb54c738616167c768300b783d3dc826365c6f038940ffcbe51437c2879282321c5822013cdf9f2e3adc
-
Filesize
257KB
MD5574765ed04857c761aeaf22bbffe5417
SHA19c03529e4b04a129dc4a0863833128b4535ecb34
SHA25649a4a71636e177b809ad7fa28afea553ee6008bf5bf4dd8d6b284e39f61db46a
SHA5120abbf9c422f721b0c0be7c696375ada542d84f3bd996cdae16723e521b5c55e5a7383cfc103d5869ea8730a0de7b37f1467de0fda846cdacf251022a32aa7657
-
Filesize
257KB
MD5574765ed04857c761aeaf22bbffe5417
SHA19c03529e4b04a129dc4a0863833128b4535ecb34
SHA25649a4a71636e177b809ad7fa28afea553ee6008bf5bf4dd8d6b284e39f61db46a
SHA5120abbf9c422f721b0c0be7c696375ada542d84f3bd996cdae16723e521b5c55e5a7383cfc103d5869ea8730a0de7b37f1467de0fda846cdacf251022a32aa7657
-
Filesize
257KB
MD5574765ed04857c761aeaf22bbffe5417
SHA19c03529e4b04a129dc4a0863833128b4535ecb34
SHA25649a4a71636e177b809ad7fa28afea553ee6008bf5bf4dd8d6b284e39f61db46a
SHA5120abbf9c422f721b0c0be7c696375ada542d84f3bd996cdae16723e521b5c55e5a7383cfc103d5869ea8730a0de7b37f1467de0fda846cdacf251022a32aa7657
-
Filesize
340KB
MD5247d6159101b101678ae29e38ccde984
SHA12f0fb6ab91ec4376017b124dd73d9a1dafb34562
SHA256e8cf125a3a139c43e15a13ece36b469d21d9bd1d295158879ae6ad737b950173
SHA51268a3bb1e131f7d4f4124342a90057a17c541f21bd61596fcd4dd8e31bd31d06005da4091b5c4e1c9755d6024072b3bc1d7fecdb5389ef7cf9f36ef25be8a6c0d
-
Filesize
340KB
MD5247d6159101b101678ae29e38ccde984
SHA12f0fb6ab91ec4376017b124dd73d9a1dafb34562
SHA256e8cf125a3a139c43e15a13ece36b469d21d9bd1d295158879ae6ad737b950173
SHA51268a3bb1e131f7d4f4124342a90057a17c541f21bd61596fcd4dd8e31bd31d06005da4091b5c4e1c9755d6024072b3bc1d7fecdb5389ef7cf9f36ef25be8a6c0d
-
Filesize
340KB
MD5247d6159101b101678ae29e38ccde984
SHA12f0fb6ab91ec4376017b124dd73d9a1dafb34562
SHA256e8cf125a3a139c43e15a13ece36b469d21d9bd1d295158879ae6ad737b950173
SHA51268a3bb1e131f7d4f4124342a90057a17c541f21bd61596fcd4dd8e31bd31d06005da4091b5c4e1c9755d6024072b3bc1d7fecdb5389ef7cf9f36ef25be8a6c0d