Analysis
-
max time kernel
157s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe
Resource
win10v2004-20230221-en
General
-
Target
fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe
-
Size
644KB
-
MD5
add745b6e38654a1d0ee8566fc29d363
-
SHA1
7719eae533b94ad44c26cb84daecad37b0a65f5d
-
SHA256
fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940
-
SHA512
dfe898d59ed0284c665f056fab6aa289de82bdb2cf975a2b716abe20f2628662ff78ddc696ee8fe5f5cc15cca643dee49d6269847d10b51cf3d64f65fbaa71be
-
SSDEEP
12288:2y9078xzKp3xtWSKGNZqWt6QuV7lrqQPZRlu8qx0iSPe7XfyXZND:2y1xzKmikK2pWwj0uve7XqND
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 18326323.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 18326323.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 18326323.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 18326323.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 18326323.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 18326323.exe -
Executes dropped EXE 3 IoCs
pid Process 2008 st618533.exe 684 18326323.exe 1044 kp433506.exe -
Loads dropped DLL 7 IoCs
pid Process 2032 fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe 2008 st618533.exe 2008 st618533.exe 684 18326323.exe 2008 st618533.exe 2008 st618533.exe 1044 kp433506.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 18326323.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 18326323.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st618533.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st618533.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 684 18326323.exe 684 18326323.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 684 18326323.exe Token: SeDebugPrivilege 1044 kp433506.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2008 2032 fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe 26 PID 2032 wrote to memory of 2008 2032 fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe 26 PID 2032 wrote to memory of 2008 2032 fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe 26 PID 2032 wrote to memory of 2008 2032 fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe 26 PID 2032 wrote to memory of 2008 2032 fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe 26 PID 2032 wrote to memory of 2008 2032 fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe 26 PID 2032 wrote to memory of 2008 2032 fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe 26 PID 2008 wrote to memory of 684 2008 st618533.exe 27 PID 2008 wrote to memory of 684 2008 st618533.exe 27 PID 2008 wrote to memory of 684 2008 st618533.exe 27 PID 2008 wrote to memory of 684 2008 st618533.exe 27 PID 2008 wrote to memory of 684 2008 st618533.exe 27 PID 2008 wrote to memory of 684 2008 st618533.exe 27 PID 2008 wrote to memory of 684 2008 st618533.exe 27 PID 2008 wrote to memory of 1044 2008 st618533.exe 28 PID 2008 wrote to memory of 1044 2008 st618533.exe 28 PID 2008 wrote to memory of 1044 2008 st618533.exe 28 PID 2008 wrote to memory of 1044 2008 st618533.exe 28 PID 2008 wrote to memory of 1044 2008 st618533.exe 28 PID 2008 wrote to memory of 1044 2008 st618533.exe 28 PID 2008 wrote to memory of 1044 2008 st618533.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe"C:\Users\Admin\AppData\Local\Temp\fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st618533.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st618533.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18326323.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18326323.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp433506.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp433506.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
489KB
MD579cff599fcc2b79dd55645595fd36963
SHA1993f5ba1be7d12150246ed191093687c5d8c6eee
SHA2562a95c9b1701b5549eddddc93c93e7f113dabffb6f762c271c0a8075001243e62
SHA512b2f4ef976eece8b6dee53f5c4236c2c18623b43a5f87f1a3fe4e894b52cf5b2dd865edc37c822f9100f6ccc383dbc92a68e6202cf5ce679524a7bb2aa0ea5005
-
Filesize
489KB
MD579cff599fcc2b79dd55645595fd36963
SHA1993f5ba1be7d12150246ed191093687c5d8c6eee
SHA2562a95c9b1701b5549eddddc93c93e7f113dabffb6f762c271c0a8075001243e62
SHA512b2f4ef976eece8b6dee53f5c4236c2c18623b43a5f87f1a3fe4e894b52cf5b2dd865edc37c822f9100f6ccc383dbc92a68e6202cf5ce679524a7bb2aa0ea5005
-
Filesize
175KB
MD53d10b67208452d7a91d7bd7066067676
SHA1e6c3ab7b6da65c8cc7dd95351f118caf3a50248d
SHA2565c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302
SHA512b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df
-
Filesize
175KB
MD53d10b67208452d7a91d7bd7066067676
SHA1e6c3ab7b6da65c8cc7dd95351f118caf3a50248d
SHA2565c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302
SHA512b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df
-
Filesize
348KB
MD51b6b914aec47b0255742b156456229f0
SHA10fb2ad395dfda1227922af244c2323dced6f25fc
SHA2562bbc822303bd5a1f6a4b00ccd5c9f82d3ed7cb931d973d27bf1f9ac14efd9ed7
SHA512d00d9675d54627e3fedc457b902dd4edeb73144f14b3202c775c5ebba6a1c027f0675126e35d0129b5ccf866f09ce354a1499848a8e6ae8392b23c62ff49156e
-
Filesize
348KB
MD51b6b914aec47b0255742b156456229f0
SHA10fb2ad395dfda1227922af244c2323dced6f25fc
SHA2562bbc822303bd5a1f6a4b00ccd5c9f82d3ed7cb931d973d27bf1f9ac14efd9ed7
SHA512d00d9675d54627e3fedc457b902dd4edeb73144f14b3202c775c5ebba6a1c027f0675126e35d0129b5ccf866f09ce354a1499848a8e6ae8392b23c62ff49156e
-
Filesize
348KB
MD51b6b914aec47b0255742b156456229f0
SHA10fb2ad395dfda1227922af244c2323dced6f25fc
SHA2562bbc822303bd5a1f6a4b00ccd5c9f82d3ed7cb931d973d27bf1f9ac14efd9ed7
SHA512d00d9675d54627e3fedc457b902dd4edeb73144f14b3202c775c5ebba6a1c027f0675126e35d0129b5ccf866f09ce354a1499848a8e6ae8392b23c62ff49156e
-
Filesize
489KB
MD579cff599fcc2b79dd55645595fd36963
SHA1993f5ba1be7d12150246ed191093687c5d8c6eee
SHA2562a95c9b1701b5549eddddc93c93e7f113dabffb6f762c271c0a8075001243e62
SHA512b2f4ef976eece8b6dee53f5c4236c2c18623b43a5f87f1a3fe4e894b52cf5b2dd865edc37c822f9100f6ccc383dbc92a68e6202cf5ce679524a7bb2aa0ea5005
-
Filesize
489KB
MD579cff599fcc2b79dd55645595fd36963
SHA1993f5ba1be7d12150246ed191093687c5d8c6eee
SHA2562a95c9b1701b5549eddddc93c93e7f113dabffb6f762c271c0a8075001243e62
SHA512b2f4ef976eece8b6dee53f5c4236c2c18623b43a5f87f1a3fe4e894b52cf5b2dd865edc37c822f9100f6ccc383dbc92a68e6202cf5ce679524a7bb2aa0ea5005
-
Filesize
175KB
MD53d10b67208452d7a91d7bd7066067676
SHA1e6c3ab7b6da65c8cc7dd95351f118caf3a50248d
SHA2565c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302
SHA512b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df
-
Filesize
175KB
MD53d10b67208452d7a91d7bd7066067676
SHA1e6c3ab7b6da65c8cc7dd95351f118caf3a50248d
SHA2565c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302
SHA512b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df
-
Filesize
348KB
MD51b6b914aec47b0255742b156456229f0
SHA10fb2ad395dfda1227922af244c2323dced6f25fc
SHA2562bbc822303bd5a1f6a4b00ccd5c9f82d3ed7cb931d973d27bf1f9ac14efd9ed7
SHA512d00d9675d54627e3fedc457b902dd4edeb73144f14b3202c775c5ebba6a1c027f0675126e35d0129b5ccf866f09ce354a1499848a8e6ae8392b23c62ff49156e
-
Filesize
348KB
MD51b6b914aec47b0255742b156456229f0
SHA10fb2ad395dfda1227922af244c2323dced6f25fc
SHA2562bbc822303bd5a1f6a4b00ccd5c9f82d3ed7cb931d973d27bf1f9ac14efd9ed7
SHA512d00d9675d54627e3fedc457b902dd4edeb73144f14b3202c775c5ebba6a1c027f0675126e35d0129b5ccf866f09ce354a1499848a8e6ae8392b23c62ff49156e
-
Filesize
348KB
MD51b6b914aec47b0255742b156456229f0
SHA10fb2ad395dfda1227922af244c2323dced6f25fc
SHA2562bbc822303bd5a1f6a4b00ccd5c9f82d3ed7cb931d973d27bf1f9ac14efd9ed7
SHA512d00d9675d54627e3fedc457b902dd4edeb73144f14b3202c775c5ebba6a1c027f0675126e35d0129b5ccf866f09ce354a1499848a8e6ae8392b23c62ff49156e