Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe
Resource
win10v2004-20230220-en
General
-
Target
c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe
-
Size
618KB
-
MD5
fbbfc72515bcc374e573cf83dda6aead
-
SHA1
8b508f14f9771ff3d3e6061de71e4232990cd2cf
-
SHA256
c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e
-
SHA512
266ecf90d81776e94f6f6871347442c94e40d515024ac607b901b56f1314446a2e1a8a8170e7d930a02b15a8f00973ca913c8bc696acfb4e10d9b78af101dc5b
-
SSDEEP
12288:Gy90Prxou5coojwCcbUe4PfeIKeRHcUNPLgy+YvI7UwcB:Gy6xou5coywJU3PGb0kY6cB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 63916605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 63916605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 63916605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 63916605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 63916605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 63916605.exe -
Executes dropped EXE 3 IoCs
pid Process 1240 st835578.exe 704 63916605.exe 368 kp919382.exe -
Loads dropped DLL 6 IoCs
pid Process 2024 c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe 1240 st835578.exe 1240 st835578.exe 1240 st835578.exe 1240 st835578.exe 368 kp919382.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 63916605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 63916605.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st835578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st835578.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 704 63916605.exe 704 63916605.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 704 63916605.exe Token: SeDebugPrivilege 368 kp919382.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1240 2024 c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe 27 PID 2024 wrote to memory of 1240 2024 c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe 27 PID 2024 wrote to memory of 1240 2024 c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe 27 PID 2024 wrote to memory of 1240 2024 c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe 27 PID 2024 wrote to memory of 1240 2024 c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe 27 PID 2024 wrote to memory of 1240 2024 c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe 27 PID 2024 wrote to memory of 1240 2024 c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe 27 PID 1240 wrote to memory of 704 1240 st835578.exe 28 PID 1240 wrote to memory of 704 1240 st835578.exe 28 PID 1240 wrote to memory of 704 1240 st835578.exe 28 PID 1240 wrote to memory of 704 1240 st835578.exe 28 PID 1240 wrote to memory of 704 1240 st835578.exe 28 PID 1240 wrote to memory of 704 1240 st835578.exe 28 PID 1240 wrote to memory of 704 1240 st835578.exe 28 PID 1240 wrote to memory of 368 1240 st835578.exe 29 PID 1240 wrote to memory of 368 1240 st835578.exe 29 PID 1240 wrote to memory of 368 1240 st835578.exe 29 PID 1240 wrote to memory of 368 1240 st835578.exe 29 PID 1240 wrote to memory of 368 1240 st835578.exe 29 PID 1240 wrote to memory of 368 1240 st835578.exe 29 PID 1240 wrote to memory of 368 1240 st835578.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe"C:\Users\Admin\AppData\Local\Temp\c17502393a9f5f77b008ca7b77d46eb889b0b01ffbc8368419f67b0fbc01345e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st835578.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st835578.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\63916605.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\63916605.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:704
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp919382.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp919382.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
463KB
MD5bf9df9321f7875df2b617e89ab00b363
SHA1203756db6672475c91bdf641ed5093de45ff880d
SHA256ab44dd5b2bdc2abb6ebf8bfbf32ca9607c4295fd909fe72078471aa8ad67e04f
SHA512a81403dd6fa50c4152e7bb0592454e716c7d3b11121cf4c2893269b36d7e466a7189b12392ec2bdf2eafdd2328dbb59cbab44676718bf7b4452bec5b9f7a21db
-
Filesize
463KB
MD5bf9df9321f7875df2b617e89ab00b363
SHA1203756db6672475c91bdf641ed5093de45ff880d
SHA256ab44dd5b2bdc2abb6ebf8bfbf32ca9607c4295fd909fe72078471aa8ad67e04f
SHA512a81403dd6fa50c4152e7bb0592454e716c7d3b11121cf4c2893269b36d7e466a7189b12392ec2bdf2eafdd2328dbb59cbab44676718bf7b4452bec5b9f7a21db
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
478KB
MD58065dd22ab3862ca99117f6e62238c2d
SHA1cecf50ee792ac18a9a47708d4add45ebbdab1b78
SHA2566b57274ccfec10a4a7f74abefe9b04ff68bf06767c7fe025fa9d731dd7de8f27
SHA51247fbf4c366617a6fda8ffbc5261cb0bacf2e4d45882893b98e0fae307b2dbbcbe684481022e02f7ccf65f42d77d514f95db77e6f073efaf5dbc096f1105c7999
-
Filesize
478KB
MD58065dd22ab3862ca99117f6e62238c2d
SHA1cecf50ee792ac18a9a47708d4add45ebbdab1b78
SHA2566b57274ccfec10a4a7f74abefe9b04ff68bf06767c7fe025fa9d731dd7de8f27
SHA51247fbf4c366617a6fda8ffbc5261cb0bacf2e4d45882893b98e0fae307b2dbbcbe684481022e02f7ccf65f42d77d514f95db77e6f073efaf5dbc096f1105c7999
-
Filesize
478KB
MD58065dd22ab3862ca99117f6e62238c2d
SHA1cecf50ee792ac18a9a47708d4add45ebbdab1b78
SHA2566b57274ccfec10a4a7f74abefe9b04ff68bf06767c7fe025fa9d731dd7de8f27
SHA51247fbf4c366617a6fda8ffbc5261cb0bacf2e4d45882893b98e0fae307b2dbbcbe684481022e02f7ccf65f42d77d514f95db77e6f073efaf5dbc096f1105c7999
-
Filesize
463KB
MD5bf9df9321f7875df2b617e89ab00b363
SHA1203756db6672475c91bdf641ed5093de45ff880d
SHA256ab44dd5b2bdc2abb6ebf8bfbf32ca9607c4295fd909fe72078471aa8ad67e04f
SHA512a81403dd6fa50c4152e7bb0592454e716c7d3b11121cf4c2893269b36d7e466a7189b12392ec2bdf2eafdd2328dbb59cbab44676718bf7b4452bec5b9f7a21db
-
Filesize
463KB
MD5bf9df9321f7875df2b617e89ab00b363
SHA1203756db6672475c91bdf641ed5093de45ff880d
SHA256ab44dd5b2bdc2abb6ebf8bfbf32ca9607c4295fd909fe72078471aa8ad67e04f
SHA512a81403dd6fa50c4152e7bb0592454e716c7d3b11121cf4c2893269b36d7e466a7189b12392ec2bdf2eafdd2328dbb59cbab44676718bf7b4452bec5b9f7a21db
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
478KB
MD58065dd22ab3862ca99117f6e62238c2d
SHA1cecf50ee792ac18a9a47708d4add45ebbdab1b78
SHA2566b57274ccfec10a4a7f74abefe9b04ff68bf06767c7fe025fa9d731dd7de8f27
SHA51247fbf4c366617a6fda8ffbc5261cb0bacf2e4d45882893b98e0fae307b2dbbcbe684481022e02f7ccf65f42d77d514f95db77e6f073efaf5dbc096f1105c7999
-
Filesize
478KB
MD58065dd22ab3862ca99117f6e62238c2d
SHA1cecf50ee792ac18a9a47708d4add45ebbdab1b78
SHA2566b57274ccfec10a4a7f74abefe9b04ff68bf06767c7fe025fa9d731dd7de8f27
SHA51247fbf4c366617a6fda8ffbc5261cb0bacf2e4d45882893b98e0fae307b2dbbcbe684481022e02f7ccf65f42d77d514f95db77e6f073efaf5dbc096f1105c7999
-
Filesize
478KB
MD58065dd22ab3862ca99117f6e62238c2d
SHA1cecf50ee792ac18a9a47708d4add45ebbdab1b78
SHA2566b57274ccfec10a4a7f74abefe9b04ff68bf06767c7fe025fa9d731dd7de8f27
SHA51247fbf4c366617a6fda8ffbc5261cb0bacf2e4d45882893b98e0fae307b2dbbcbe684481022e02f7ccf65f42d77d514f95db77e6f073efaf5dbc096f1105c7999