Analysis
-
max time kernel
149s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe
Resource
win10v2004-20230220-en
General
-
Target
b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe
-
Size
694KB
-
MD5
c60c4a001ba4efc0aa692545796f8a6b
-
SHA1
c9f03196f34962d25fe257fee95b91b4c2d32cc1
-
SHA256
b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae
-
SHA512
50109304b71eef128ea4e2ae8d03e23e782c060daf7623051336ace713b5054d8300ab4847022dafee65269567cb5ad850bdce02ab358c69eeb98fb243a1cb4e
-
SSDEEP
12288:Oy905DsvczTwF8wlDUiz9DtLvF2Hjx+cqRaEIA9CEW+Y0gf4ZRr4oG42bF3:OymF/28iBDT2DkcqLjCEC0i4ZRr4R421
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 07477955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 07477955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 07477955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 07477955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 07477955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 07477955.exe -
Executes dropped EXE 3 IoCs
pid Process 1368 un930583.exe 984 07477955.exe 780 rk462201.exe -
Loads dropped DLL 8 IoCs
pid Process 1752 b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe 1368 un930583.exe 1368 un930583.exe 1368 un930583.exe 984 07477955.exe 1368 un930583.exe 1368 un930583.exe 780 rk462201.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 07477955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 07477955.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un930583.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un930583.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 984 07477955.exe 984 07477955.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 984 07477955.exe Token: SeDebugPrivilege 780 rk462201.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1368 1752 b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe 28 PID 1752 wrote to memory of 1368 1752 b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe 28 PID 1752 wrote to memory of 1368 1752 b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe 28 PID 1752 wrote to memory of 1368 1752 b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe 28 PID 1752 wrote to memory of 1368 1752 b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe 28 PID 1752 wrote to memory of 1368 1752 b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe 28 PID 1752 wrote to memory of 1368 1752 b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe 28 PID 1368 wrote to memory of 984 1368 un930583.exe 29 PID 1368 wrote to memory of 984 1368 un930583.exe 29 PID 1368 wrote to memory of 984 1368 un930583.exe 29 PID 1368 wrote to memory of 984 1368 un930583.exe 29 PID 1368 wrote to memory of 984 1368 un930583.exe 29 PID 1368 wrote to memory of 984 1368 un930583.exe 29 PID 1368 wrote to memory of 984 1368 un930583.exe 29 PID 1368 wrote to memory of 780 1368 un930583.exe 30 PID 1368 wrote to memory of 780 1368 un930583.exe 30 PID 1368 wrote to memory of 780 1368 un930583.exe 30 PID 1368 wrote to memory of 780 1368 un930583.exe 30 PID 1368 wrote to memory of 780 1368 un930583.exe 30 PID 1368 wrote to memory of 780 1368 un930583.exe 30 PID 1368 wrote to memory of 780 1368 un930583.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe"C:\Users\Admin\AppData\Local\Temp\b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un930583.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un930583.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\07477955.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\07477955.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk462201.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk462201.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD53cffb8f6c3980cae0101e1d8a2c6afcc
SHA12076ed903cd3644b96112790dd83dac874617615
SHA2562b698ab8c23c0719f0c2210d55dccb2ff62a97c9fa71029865f99c6eb52a9c71
SHA51291dc3b9665732ec532720b8292c62f99ed4146318edf8d1a429f0ddcc84c5cdcc52a36f43bfef0b2ce3daada76cad17f5c7d35dc82ed5d2998d1b8058a595f80
-
Filesize
540KB
MD53cffb8f6c3980cae0101e1d8a2c6afcc
SHA12076ed903cd3644b96112790dd83dac874617615
SHA2562b698ab8c23c0719f0c2210d55dccb2ff62a97c9fa71029865f99c6eb52a9c71
SHA51291dc3b9665732ec532720b8292c62f99ed4146318edf8d1a429f0ddcc84c5cdcc52a36f43bfef0b2ce3daada76cad17f5c7d35dc82ed5d2998d1b8058a595f80
-
Filesize
258KB
MD51e1457e485c744c5dd87670b455fbf26
SHA18adf8f94c3bf2eaa4936b27b5bc1bc032cb32414
SHA2568d4c82b5d6dd0efbc325ebb2f85b03b973ebcd936dc716fa8fd4c2ac8fdf1e26
SHA512df7ce2d41db0ff4773013136168b3e3cdaa9040286b8a5118eb45a116b11924d7bdc7366f51416ee2635339c1b6b30f0b6df1d0fe512a731f846e4ff61dabee4
-
Filesize
258KB
MD51e1457e485c744c5dd87670b455fbf26
SHA18adf8f94c3bf2eaa4936b27b5bc1bc032cb32414
SHA2568d4c82b5d6dd0efbc325ebb2f85b03b973ebcd936dc716fa8fd4c2ac8fdf1e26
SHA512df7ce2d41db0ff4773013136168b3e3cdaa9040286b8a5118eb45a116b11924d7bdc7366f51416ee2635339c1b6b30f0b6df1d0fe512a731f846e4ff61dabee4
-
Filesize
258KB
MD51e1457e485c744c5dd87670b455fbf26
SHA18adf8f94c3bf2eaa4936b27b5bc1bc032cb32414
SHA2568d4c82b5d6dd0efbc325ebb2f85b03b973ebcd936dc716fa8fd4c2ac8fdf1e26
SHA512df7ce2d41db0ff4773013136168b3e3cdaa9040286b8a5118eb45a116b11924d7bdc7366f51416ee2635339c1b6b30f0b6df1d0fe512a731f846e4ff61dabee4
-
Filesize
341KB
MD5c86bf5aa6613ead87fc3ddc69445de6d
SHA1f31f971df8ff70e4a6f02d573fe302b3fd73fbb3
SHA25605c74c05b42bc775eb69ce955acf3a99a2b82d78f52df01a9f36ce1f0ff5bcd7
SHA512c9555ca4cf3d541838bb37026ef7f7f4bd7fddb917eb3f64e623298044520b81cb292a4777ab580d12bcdfd927d91dd0bd463707a6a01db6ca221a5c6b2044b8
-
Filesize
341KB
MD5c86bf5aa6613ead87fc3ddc69445de6d
SHA1f31f971df8ff70e4a6f02d573fe302b3fd73fbb3
SHA25605c74c05b42bc775eb69ce955acf3a99a2b82d78f52df01a9f36ce1f0ff5bcd7
SHA512c9555ca4cf3d541838bb37026ef7f7f4bd7fddb917eb3f64e623298044520b81cb292a4777ab580d12bcdfd927d91dd0bd463707a6a01db6ca221a5c6b2044b8
-
Filesize
341KB
MD5c86bf5aa6613ead87fc3ddc69445de6d
SHA1f31f971df8ff70e4a6f02d573fe302b3fd73fbb3
SHA25605c74c05b42bc775eb69ce955acf3a99a2b82d78f52df01a9f36ce1f0ff5bcd7
SHA512c9555ca4cf3d541838bb37026ef7f7f4bd7fddb917eb3f64e623298044520b81cb292a4777ab580d12bcdfd927d91dd0bd463707a6a01db6ca221a5c6b2044b8
-
Filesize
540KB
MD53cffb8f6c3980cae0101e1d8a2c6afcc
SHA12076ed903cd3644b96112790dd83dac874617615
SHA2562b698ab8c23c0719f0c2210d55dccb2ff62a97c9fa71029865f99c6eb52a9c71
SHA51291dc3b9665732ec532720b8292c62f99ed4146318edf8d1a429f0ddcc84c5cdcc52a36f43bfef0b2ce3daada76cad17f5c7d35dc82ed5d2998d1b8058a595f80
-
Filesize
540KB
MD53cffb8f6c3980cae0101e1d8a2c6afcc
SHA12076ed903cd3644b96112790dd83dac874617615
SHA2562b698ab8c23c0719f0c2210d55dccb2ff62a97c9fa71029865f99c6eb52a9c71
SHA51291dc3b9665732ec532720b8292c62f99ed4146318edf8d1a429f0ddcc84c5cdcc52a36f43bfef0b2ce3daada76cad17f5c7d35dc82ed5d2998d1b8058a595f80
-
Filesize
258KB
MD51e1457e485c744c5dd87670b455fbf26
SHA18adf8f94c3bf2eaa4936b27b5bc1bc032cb32414
SHA2568d4c82b5d6dd0efbc325ebb2f85b03b973ebcd936dc716fa8fd4c2ac8fdf1e26
SHA512df7ce2d41db0ff4773013136168b3e3cdaa9040286b8a5118eb45a116b11924d7bdc7366f51416ee2635339c1b6b30f0b6df1d0fe512a731f846e4ff61dabee4
-
Filesize
258KB
MD51e1457e485c744c5dd87670b455fbf26
SHA18adf8f94c3bf2eaa4936b27b5bc1bc032cb32414
SHA2568d4c82b5d6dd0efbc325ebb2f85b03b973ebcd936dc716fa8fd4c2ac8fdf1e26
SHA512df7ce2d41db0ff4773013136168b3e3cdaa9040286b8a5118eb45a116b11924d7bdc7366f51416ee2635339c1b6b30f0b6df1d0fe512a731f846e4ff61dabee4
-
Filesize
258KB
MD51e1457e485c744c5dd87670b455fbf26
SHA18adf8f94c3bf2eaa4936b27b5bc1bc032cb32414
SHA2568d4c82b5d6dd0efbc325ebb2f85b03b973ebcd936dc716fa8fd4c2ac8fdf1e26
SHA512df7ce2d41db0ff4773013136168b3e3cdaa9040286b8a5118eb45a116b11924d7bdc7366f51416ee2635339c1b6b30f0b6df1d0fe512a731f846e4ff61dabee4
-
Filesize
341KB
MD5c86bf5aa6613ead87fc3ddc69445de6d
SHA1f31f971df8ff70e4a6f02d573fe302b3fd73fbb3
SHA25605c74c05b42bc775eb69ce955acf3a99a2b82d78f52df01a9f36ce1f0ff5bcd7
SHA512c9555ca4cf3d541838bb37026ef7f7f4bd7fddb917eb3f64e623298044520b81cb292a4777ab580d12bcdfd927d91dd0bd463707a6a01db6ca221a5c6b2044b8
-
Filesize
341KB
MD5c86bf5aa6613ead87fc3ddc69445de6d
SHA1f31f971df8ff70e4a6f02d573fe302b3fd73fbb3
SHA25605c74c05b42bc775eb69ce955acf3a99a2b82d78f52df01a9f36ce1f0ff5bcd7
SHA512c9555ca4cf3d541838bb37026ef7f7f4bd7fddb917eb3f64e623298044520b81cb292a4777ab580d12bcdfd927d91dd0bd463707a6a01db6ca221a5c6b2044b8
-
Filesize
341KB
MD5c86bf5aa6613ead87fc3ddc69445de6d
SHA1f31f971df8ff70e4a6f02d573fe302b3fd73fbb3
SHA25605c74c05b42bc775eb69ce955acf3a99a2b82d78f52df01a9f36ce1f0ff5bcd7
SHA512c9555ca4cf3d541838bb37026ef7f7f4bd7fddb917eb3f64e623298044520b81cb292a4777ab580d12bcdfd927d91dd0bd463707a6a01db6ca221a5c6b2044b8