Analysis
-
max time kernel
154s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe
Resource
win10v2004-20230220-en
General
-
Target
bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe
-
Size
694KB
-
MD5
dd2d202badee775ea9c9771189f215e3
-
SHA1
62dd322096d3aff4a4d40bbf290bd59e28fa12f0
-
SHA256
bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143
-
SHA512
e9a04bcaa4387e8797e7baee6d0ccb4be6a7a739dc798dcee791357e6ce26284b74c37af22ee73983e8f4dc362be6dd844faada310e036cdd70220d53cbcb5de
-
SSDEEP
12288:xy908CEt57Vv8Grha375FJ60qlniSVdUN0cRxbPDUBTOYGQBqm9T:xy+e7V0Gda37HJZqlVdUeEb1Y5q8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 12438575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 12438575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 12438575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 12438575.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 12438575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 12438575.exe -
Executes dropped EXE 3 IoCs
pid Process 920 un972163.exe 676 12438575.exe 1628 rk483991.exe -
Loads dropped DLL 8 IoCs
pid Process 1436 bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe 920 un972163.exe 920 un972163.exe 920 un972163.exe 676 12438575.exe 920 un972163.exe 920 un972163.exe 1628 rk483991.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 12438575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 12438575.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un972163.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un972163.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 676 12438575.exe 676 12438575.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 676 12438575.exe Token: SeDebugPrivilege 1628 rk483991.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1436 wrote to memory of 920 1436 bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe 28 PID 1436 wrote to memory of 920 1436 bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe 28 PID 1436 wrote to memory of 920 1436 bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe 28 PID 1436 wrote to memory of 920 1436 bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe 28 PID 1436 wrote to memory of 920 1436 bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe 28 PID 1436 wrote to memory of 920 1436 bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe 28 PID 1436 wrote to memory of 920 1436 bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe 28 PID 920 wrote to memory of 676 920 un972163.exe 29 PID 920 wrote to memory of 676 920 un972163.exe 29 PID 920 wrote to memory of 676 920 un972163.exe 29 PID 920 wrote to memory of 676 920 un972163.exe 29 PID 920 wrote to memory of 676 920 un972163.exe 29 PID 920 wrote to memory of 676 920 un972163.exe 29 PID 920 wrote to memory of 676 920 un972163.exe 29 PID 920 wrote to memory of 1628 920 un972163.exe 30 PID 920 wrote to memory of 1628 920 un972163.exe 30 PID 920 wrote to memory of 1628 920 un972163.exe 30 PID 920 wrote to memory of 1628 920 un972163.exe 30 PID 920 wrote to memory of 1628 920 un972163.exe 30 PID 920 wrote to memory of 1628 920 un972163.exe 30 PID 920 wrote to memory of 1628 920 un972163.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe"C:\Users\Admin\AppData\Local\Temp\bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5ef29a63423d3871a7796ead771fa4557
SHA1949fb565e75663fef5470926003390be46055a03
SHA2564fd1dbf5fa7440889733db01ea650a29e000e0f4cd878e58cfa9a6dd94e10a66
SHA5129ddb1d4b9cf3502a7d95bd5caa63d9e667cb30e3902bd9a237ce1825a2eaaf14bbe354b5693d1d89d56e8e435a746f5fb9e7c9e5c21ab9368787fab85b41d91d
-
Filesize
540KB
MD5ef29a63423d3871a7796ead771fa4557
SHA1949fb565e75663fef5470926003390be46055a03
SHA2564fd1dbf5fa7440889733db01ea650a29e000e0f4cd878e58cfa9a6dd94e10a66
SHA5129ddb1d4b9cf3502a7d95bd5caa63d9e667cb30e3902bd9a237ce1825a2eaaf14bbe354b5693d1d89d56e8e435a746f5fb9e7c9e5c21ab9368787fab85b41d91d
-
Filesize
258KB
MD5bc4ee02854bd043f990dab2d8ad92db3
SHA160e767841bbf1617040953ef1579ddbb6a0a4566
SHA2560431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07
SHA51217e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b
-
Filesize
258KB
MD5bc4ee02854bd043f990dab2d8ad92db3
SHA160e767841bbf1617040953ef1579ddbb6a0a4566
SHA2560431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07
SHA51217e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b
-
Filesize
258KB
MD5bc4ee02854bd043f990dab2d8ad92db3
SHA160e767841bbf1617040953ef1579ddbb6a0a4566
SHA2560431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07
SHA51217e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b
-
Filesize
341KB
MD53a4a31e28202034c475024725a90472b
SHA18ff7a828dcaa0e7acc9cca46f36fb560e999bdda
SHA256fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3
SHA512c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a
-
Filesize
341KB
MD53a4a31e28202034c475024725a90472b
SHA18ff7a828dcaa0e7acc9cca46f36fb560e999bdda
SHA256fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3
SHA512c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a
-
Filesize
341KB
MD53a4a31e28202034c475024725a90472b
SHA18ff7a828dcaa0e7acc9cca46f36fb560e999bdda
SHA256fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3
SHA512c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a
-
Filesize
540KB
MD5ef29a63423d3871a7796ead771fa4557
SHA1949fb565e75663fef5470926003390be46055a03
SHA2564fd1dbf5fa7440889733db01ea650a29e000e0f4cd878e58cfa9a6dd94e10a66
SHA5129ddb1d4b9cf3502a7d95bd5caa63d9e667cb30e3902bd9a237ce1825a2eaaf14bbe354b5693d1d89d56e8e435a746f5fb9e7c9e5c21ab9368787fab85b41d91d
-
Filesize
540KB
MD5ef29a63423d3871a7796ead771fa4557
SHA1949fb565e75663fef5470926003390be46055a03
SHA2564fd1dbf5fa7440889733db01ea650a29e000e0f4cd878e58cfa9a6dd94e10a66
SHA5129ddb1d4b9cf3502a7d95bd5caa63d9e667cb30e3902bd9a237ce1825a2eaaf14bbe354b5693d1d89d56e8e435a746f5fb9e7c9e5c21ab9368787fab85b41d91d
-
Filesize
258KB
MD5bc4ee02854bd043f990dab2d8ad92db3
SHA160e767841bbf1617040953ef1579ddbb6a0a4566
SHA2560431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07
SHA51217e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b
-
Filesize
258KB
MD5bc4ee02854bd043f990dab2d8ad92db3
SHA160e767841bbf1617040953ef1579ddbb6a0a4566
SHA2560431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07
SHA51217e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b
-
Filesize
258KB
MD5bc4ee02854bd043f990dab2d8ad92db3
SHA160e767841bbf1617040953ef1579ddbb6a0a4566
SHA2560431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07
SHA51217e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b
-
Filesize
341KB
MD53a4a31e28202034c475024725a90472b
SHA18ff7a828dcaa0e7acc9cca46f36fb560e999bdda
SHA256fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3
SHA512c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a
-
Filesize
341KB
MD53a4a31e28202034c475024725a90472b
SHA18ff7a828dcaa0e7acc9cca46f36fb560e999bdda
SHA256fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3
SHA512c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a
-
Filesize
341KB
MD53a4a31e28202034c475024725a90472b
SHA18ff7a828dcaa0e7acc9cca46f36fb560e999bdda
SHA256fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3
SHA512c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a