Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe
Resource
win10v2004-20230220-en
General
-
Target
b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe
-
Size
696KB
-
MD5
46c5d415ae900547c67e46d2c5b10e99
-
SHA1
4265c640004d22544e23733190a47f20c424af64
-
SHA256
b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75
-
SHA512
329fff8777f25c0cf604b80859f93afa1ba2deb422cb7d8f3df1a8ba3c6c6ec9fb7978f1f0d5dc85720d4e26e7e0e53a2f04901cbaac7363b140e6164ec2014d
-
SSDEEP
12288:y/y90HghzsWWrh0ArHiRKksjQFxr8UFdMM9e6Z52PBb0c/:gyNhwWWrZ4KoFxYUFHougPBYc/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 61497159.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 61497159.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 61497159.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 61497159.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 61497159.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 61497159.exe -
Executes dropped EXE 3 IoCs
pid Process 1092 un882836.exe 1184 61497159.exe 1384 rk460060.exe -
Loads dropped DLL 8 IoCs
pid Process 816 b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe 1092 un882836.exe 1092 un882836.exe 1092 un882836.exe 1184 61497159.exe 1092 un882836.exe 1092 un882836.exe 1384 rk460060.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 61497159.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 61497159.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un882836.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un882836.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1184 61497159.exe 1184 61497159.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1184 61497159.exe Token: SeDebugPrivilege 1384 rk460060.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 816 wrote to memory of 1092 816 b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe 27 PID 816 wrote to memory of 1092 816 b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe 27 PID 816 wrote to memory of 1092 816 b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe 27 PID 816 wrote to memory of 1092 816 b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe 27 PID 816 wrote to memory of 1092 816 b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe 27 PID 816 wrote to memory of 1092 816 b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe 27 PID 816 wrote to memory of 1092 816 b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe 27 PID 1092 wrote to memory of 1184 1092 un882836.exe 28 PID 1092 wrote to memory of 1184 1092 un882836.exe 28 PID 1092 wrote to memory of 1184 1092 un882836.exe 28 PID 1092 wrote to memory of 1184 1092 un882836.exe 28 PID 1092 wrote to memory of 1184 1092 un882836.exe 28 PID 1092 wrote to memory of 1184 1092 un882836.exe 28 PID 1092 wrote to memory of 1184 1092 un882836.exe 28 PID 1092 wrote to memory of 1384 1092 un882836.exe 29 PID 1092 wrote to memory of 1384 1092 un882836.exe 29 PID 1092 wrote to memory of 1384 1092 un882836.exe 29 PID 1092 wrote to memory of 1384 1092 un882836.exe 29 PID 1092 wrote to memory of 1384 1092 un882836.exe 29 PID 1092 wrote to memory of 1384 1092 un882836.exe 29 PID 1092 wrote to memory of 1384 1092 un882836.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe"C:\Users\Admin\AppData\Local\Temp\b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un882836.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un882836.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\61497159.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\61497159.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk460060.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk460060.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
542KB
MD5acd518c7fc1539c9e2ab7d9222a0317a
SHA1bd305922855413ce3a5bcf66976c1fed64f94b08
SHA256dfdf3a0d0f49b07349ae9ac748d44682875a2bca57bc75b4efa47d0d0de6367f
SHA5129e22d67a59912fea9b4a9e237653c3605fb39cd74a53e474607e0a559b87006b51c1511235e78f5e34dddcba618c1083259a57330388cc86160fb2df5e4b70f0
-
Filesize
542KB
MD5acd518c7fc1539c9e2ab7d9222a0317a
SHA1bd305922855413ce3a5bcf66976c1fed64f94b08
SHA256dfdf3a0d0f49b07349ae9ac748d44682875a2bca57bc75b4efa47d0d0de6367f
SHA5129e22d67a59912fea9b4a9e237653c3605fb39cd74a53e474607e0a559b87006b51c1511235e78f5e34dddcba618c1083259a57330388cc86160fb2df5e4b70f0
-
Filesize
263KB
MD58aa0057da72dbc4de69388395d30f7bf
SHA150d2b3aee624feaab7b78831291e695416b88fc6
SHA256aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049
SHA512b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e
-
Filesize
263KB
MD58aa0057da72dbc4de69388395d30f7bf
SHA150d2b3aee624feaab7b78831291e695416b88fc6
SHA256aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049
SHA512b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e
-
Filesize
263KB
MD58aa0057da72dbc4de69388395d30f7bf
SHA150d2b3aee624feaab7b78831291e695416b88fc6
SHA256aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049
SHA512b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e
-
Filesize
328KB
MD54badfb5e978c89ea1d82ee094ed1925c
SHA1bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff
SHA2568f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff
SHA51267731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a
-
Filesize
328KB
MD54badfb5e978c89ea1d82ee094ed1925c
SHA1bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff
SHA2568f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff
SHA51267731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a
-
Filesize
328KB
MD54badfb5e978c89ea1d82ee094ed1925c
SHA1bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff
SHA2568f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff
SHA51267731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a
-
Filesize
542KB
MD5acd518c7fc1539c9e2ab7d9222a0317a
SHA1bd305922855413ce3a5bcf66976c1fed64f94b08
SHA256dfdf3a0d0f49b07349ae9ac748d44682875a2bca57bc75b4efa47d0d0de6367f
SHA5129e22d67a59912fea9b4a9e237653c3605fb39cd74a53e474607e0a559b87006b51c1511235e78f5e34dddcba618c1083259a57330388cc86160fb2df5e4b70f0
-
Filesize
542KB
MD5acd518c7fc1539c9e2ab7d9222a0317a
SHA1bd305922855413ce3a5bcf66976c1fed64f94b08
SHA256dfdf3a0d0f49b07349ae9ac748d44682875a2bca57bc75b4efa47d0d0de6367f
SHA5129e22d67a59912fea9b4a9e237653c3605fb39cd74a53e474607e0a559b87006b51c1511235e78f5e34dddcba618c1083259a57330388cc86160fb2df5e4b70f0
-
Filesize
263KB
MD58aa0057da72dbc4de69388395d30f7bf
SHA150d2b3aee624feaab7b78831291e695416b88fc6
SHA256aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049
SHA512b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e
-
Filesize
263KB
MD58aa0057da72dbc4de69388395d30f7bf
SHA150d2b3aee624feaab7b78831291e695416b88fc6
SHA256aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049
SHA512b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e
-
Filesize
263KB
MD58aa0057da72dbc4de69388395d30f7bf
SHA150d2b3aee624feaab7b78831291e695416b88fc6
SHA256aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049
SHA512b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e
-
Filesize
328KB
MD54badfb5e978c89ea1d82ee094ed1925c
SHA1bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff
SHA2568f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff
SHA51267731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a
-
Filesize
328KB
MD54badfb5e978c89ea1d82ee094ed1925c
SHA1bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff
SHA2568f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff
SHA51267731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a
-
Filesize
328KB
MD54badfb5e978c89ea1d82ee094ed1925c
SHA1bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff
SHA2568f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff
SHA51267731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a