Analysis
-
max time kernel
145s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe
Resource
win10v2004-20230220-en
General
-
Target
9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe
-
Size
746KB
-
MD5
bbe1c1257cc7316e6e23fde5468bad00
-
SHA1
628898017ba3388252126a997946542f0510505b
-
SHA256
9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06
-
SHA512
6cdaf7f429a2026adf187e1417915d57ebbf287b7e1660f4b1737c7d1a430ebf9990f62a0c6b91f8e58d17722dcd1b4cae8a9012531be23481b6e9b1d0ebe96e
-
SSDEEP
12288:sy90fWlnXnWbNsAUjy8urZWk6Nd7ZbNjCS0vz3j2d:syFl32zUGQk6/5D0vXE
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 95743207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 95743207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 95743207.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 95743207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 95743207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 95743207.exe -
Executes dropped EXE 3 IoCs
pid Process 1612 un780050.exe 1488 95743207.exe 1780 rk425581.exe -
Loads dropped DLL 8 IoCs
pid Process 1688 9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe 1612 un780050.exe 1612 un780050.exe 1612 un780050.exe 1488 95743207.exe 1612 un780050.exe 1612 un780050.exe 1780 rk425581.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 95743207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 95743207.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un780050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un780050.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1488 95743207.exe 1488 95743207.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1488 95743207.exe Token: SeDebugPrivilege 1780 rk425581.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1612 1688 9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe 28 PID 1688 wrote to memory of 1612 1688 9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe 28 PID 1688 wrote to memory of 1612 1688 9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe 28 PID 1688 wrote to memory of 1612 1688 9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe 28 PID 1688 wrote to memory of 1612 1688 9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe 28 PID 1688 wrote to memory of 1612 1688 9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe 28 PID 1688 wrote to memory of 1612 1688 9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe 28 PID 1612 wrote to memory of 1488 1612 un780050.exe 29 PID 1612 wrote to memory of 1488 1612 un780050.exe 29 PID 1612 wrote to memory of 1488 1612 un780050.exe 29 PID 1612 wrote to memory of 1488 1612 un780050.exe 29 PID 1612 wrote to memory of 1488 1612 un780050.exe 29 PID 1612 wrote to memory of 1488 1612 un780050.exe 29 PID 1612 wrote to memory of 1488 1612 un780050.exe 29 PID 1612 wrote to memory of 1780 1612 un780050.exe 30 PID 1612 wrote to memory of 1780 1612 un780050.exe 30 PID 1612 wrote to memory of 1780 1612 un780050.exe 30 PID 1612 wrote to memory of 1780 1612 un780050.exe 30 PID 1612 wrote to memory of 1780 1612 un780050.exe 30 PID 1612 wrote to memory of 1780 1612 un780050.exe 30 PID 1612 wrote to memory of 1780 1612 un780050.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe"C:\Users\Admin\AppData\Local\Temp\9e1c743047a62b39fd6d472a8645acab94988fd35bb39ea400e1aeee55166a06.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un780050.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un780050.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95743207.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95743207.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk425581.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk425581.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD5a1ffb23e5ae45acc2e9b61507cb9f3ec
SHA128f01e8aa57b4bdba0cd7da07e14faff907001e2
SHA25604a7384b01030ca4ce6fb8389547e28abbfffd18789fd64c1db95b80c55fd42d
SHA51222e3cea395efa5b43479525ce3ad78249830b395ddd7e559206f5752f6a8811c4794139e84c7087f0c3bd64cdead171f2280efb23b0c50fc9ce2c6efdf721033
-
Filesize
592KB
MD5a1ffb23e5ae45acc2e9b61507cb9f3ec
SHA128f01e8aa57b4bdba0cd7da07e14faff907001e2
SHA25604a7384b01030ca4ce6fb8389547e28abbfffd18789fd64c1db95b80c55fd42d
SHA51222e3cea395efa5b43479525ce3ad78249830b395ddd7e559206f5752f6a8811c4794139e84c7087f0c3bd64cdead171f2280efb23b0c50fc9ce2c6efdf721033
-
Filesize
377KB
MD52545f3035b04a471d5508bd7d3f875ff
SHA1bbe474633db11099906cb30da1deb7f0198fc9a7
SHA256c6ae3ae2700b82645b79292fdc54920c6a41f5764d7337604c0138ba7220b73f
SHA51271d943ff86a4d7b6e1a14d8b685f916e3e373e3c26baf7509cd812c2559d8d9629d4e5b456755727ba397b60c650a5c20c2a80bb283f77d29b52ecef84075dfe
-
Filesize
377KB
MD52545f3035b04a471d5508bd7d3f875ff
SHA1bbe474633db11099906cb30da1deb7f0198fc9a7
SHA256c6ae3ae2700b82645b79292fdc54920c6a41f5764d7337604c0138ba7220b73f
SHA51271d943ff86a4d7b6e1a14d8b685f916e3e373e3c26baf7509cd812c2559d8d9629d4e5b456755727ba397b60c650a5c20c2a80bb283f77d29b52ecef84075dfe
-
Filesize
377KB
MD52545f3035b04a471d5508bd7d3f875ff
SHA1bbe474633db11099906cb30da1deb7f0198fc9a7
SHA256c6ae3ae2700b82645b79292fdc54920c6a41f5764d7337604c0138ba7220b73f
SHA51271d943ff86a4d7b6e1a14d8b685f916e3e373e3c26baf7509cd812c2559d8d9629d4e5b456755727ba397b60c650a5c20c2a80bb283f77d29b52ecef84075dfe
-
Filesize
459KB
MD5bbd6e42f1864837931f0b59b2ed6798f
SHA1611192a9cd94393387a8cfae23629e6824fe5428
SHA256ac7dccb4df5cf1658e1b74257cb7aeae245bf1e63ef2b1cca4adb680895444bf
SHA5126b711e93c05437f1d1c4bcff9bcca728b2fa786d4bf816679d23b652b1da29219f2d0a1de3f21cf1790ea0e578007b2e12e86641c826960d5c8b3bdf744fad61
-
Filesize
459KB
MD5bbd6e42f1864837931f0b59b2ed6798f
SHA1611192a9cd94393387a8cfae23629e6824fe5428
SHA256ac7dccb4df5cf1658e1b74257cb7aeae245bf1e63ef2b1cca4adb680895444bf
SHA5126b711e93c05437f1d1c4bcff9bcca728b2fa786d4bf816679d23b652b1da29219f2d0a1de3f21cf1790ea0e578007b2e12e86641c826960d5c8b3bdf744fad61
-
Filesize
459KB
MD5bbd6e42f1864837931f0b59b2ed6798f
SHA1611192a9cd94393387a8cfae23629e6824fe5428
SHA256ac7dccb4df5cf1658e1b74257cb7aeae245bf1e63ef2b1cca4adb680895444bf
SHA5126b711e93c05437f1d1c4bcff9bcca728b2fa786d4bf816679d23b652b1da29219f2d0a1de3f21cf1790ea0e578007b2e12e86641c826960d5c8b3bdf744fad61
-
Filesize
592KB
MD5a1ffb23e5ae45acc2e9b61507cb9f3ec
SHA128f01e8aa57b4bdba0cd7da07e14faff907001e2
SHA25604a7384b01030ca4ce6fb8389547e28abbfffd18789fd64c1db95b80c55fd42d
SHA51222e3cea395efa5b43479525ce3ad78249830b395ddd7e559206f5752f6a8811c4794139e84c7087f0c3bd64cdead171f2280efb23b0c50fc9ce2c6efdf721033
-
Filesize
592KB
MD5a1ffb23e5ae45acc2e9b61507cb9f3ec
SHA128f01e8aa57b4bdba0cd7da07e14faff907001e2
SHA25604a7384b01030ca4ce6fb8389547e28abbfffd18789fd64c1db95b80c55fd42d
SHA51222e3cea395efa5b43479525ce3ad78249830b395ddd7e559206f5752f6a8811c4794139e84c7087f0c3bd64cdead171f2280efb23b0c50fc9ce2c6efdf721033
-
Filesize
377KB
MD52545f3035b04a471d5508bd7d3f875ff
SHA1bbe474633db11099906cb30da1deb7f0198fc9a7
SHA256c6ae3ae2700b82645b79292fdc54920c6a41f5764d7337604c0138ba7220b73f
SHA51271d943ff86a4d7b6e1a14d8b685f916e3e373e3c26baf7509cd812c2559d8d9629d4e5b456755727ba397b60c650a5c20c2a80bb283f77d29b52ecef84075dfe
-
Filesize
377KB
MD52545f3035b04a471d5508bd7d3f875ff
SHA1bbe474633db11099906cb30da1deb7f0198fc9a7
SHA256c6ae3ae2700b82645b79292fdc54920c6a41f5764d7337604c0138ba7220b73f
SHA51271d943ff86a4d7b6e1a14d8b685f916e3e373e3c26baf7509cd812c2559d8d9629d4e5b456755727ba397b60c650a5c20c2a80bb283f77d29b52ecef84075dfe
-
Filesize
377KB
MD52545f3035b04a471d5508bd7d3f875ff
SHA1bbe474633db11099906cb30da1deb7f0198fc9a7
SHA256c6ae3ae2700b82645b79292fdc54920c6a41f5764d7337604c0138ba7220b73f
SHA51271d943ff86a4d7b6e1a14d8b685f916e3e373e3c26baf7509cd812c2559d8d9629d4e5b456755727ba397b60c650a5c20c2a80bb283f77d29b52ecef84075dfe
-
Filesize
459KB
MD5bbd6e42f1864837931f0b59b2ed6798f
SHA1611192a9cd94393387a8cfae23629e6824fe5428
SHA256ac7dccb4df5cf1658e1b74257cb7aeae245bf1e63ef2b1cca4adb680895444bf
SHA5126b711e93c05437f1d1c4bcff9bcca728b2fa786d4bf816679d23b652b1da29219f2d0a1de3f21cf1790ea0e578007b2e12e86641c826960d5c8b3bdf744fad61
-
Filesize
459KB
MD5bbd6e42f1864837931f0b59b2ed6798f
SHA1611192a9cd94393387a8cfae23629e6824fe5428
SHA256ac7dccb4df5cf1658e1b74257cb7aeae245bf1e63ef2b1cca4adb680895444bf
SHA5126b711e93c05437f1d1c4bcff9bcca728b2fa786d4bf816679d23b652b1da29219f2d0a1de3f21cf1790ea0e578007b2e12e86641c826960d5c8b3bdf744fad61
-
Filesize
459KB
MD5bbd6e42f1864837931f0b59b2ed6798f
SHA1611192a9cd94393387a8cfae23629e6824fe5428
SHA256ac7dccb4df5cf1658e1b74257cb7aeae245bf1e63ef2b1cca4adb680895444bf
SHA5126b711e93c05437f1d1c4bcff9bcca728b2fa786d4bf816679d23b652b1da29219f2d0a1de3f21cf1790ea0e578007b2e12e86641c826960d5c8b3bdf744fad61