Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe
Resource
win10v2004-20230220-en
General
-
Target
b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe
-
Size
690KB
-
MD5
f3d76114bb3d37f07092c2065af67b9e
-
SHA1
8bfe88e9f2a49d883b43b62930bd64fd7291eec0
-
SHA256
b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8
-
SHA512
4cd3f7e315d677390d35dd2fe9da721db87853abbd0a911d97070519eb9b285b72ff622da27b4ec939b4b6bfd059546c3dd2ea8d156f0ec6230ad5415cf32211
-
SSDEEP
12288:2y90MFhE0jMyvXQHOUaYGw4r3DExQByzZIJbQBXaq41EMbrLyrNb6RfTYCWygxx:2yPBMEQbay4bDEhzZqgaQMb3yrNb6RTm
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 47738677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 47738677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 47738677.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 47738677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 47738677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 47738677.exe -
Executes dropped EXE 3 IoCs
pid Process 1956 un303104.exe 296 47738677.exe 1080 rk667911.exe -
Loads dropped DLL 8 IoCs
pid Process 2004 b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe 1956 un303104.exe 1956 un303104.exe 1956 un303104.exe 296 47738677.exe 1956 un303104.exe 1956 un303104.exe 1080 rk667911.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 47738677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 47738677.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un303104.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un303104.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 296 47738677.exe 296 47738677.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 296 47738677.exe Token: SeDebugPrivilege 1080 rk667911.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1956 2004 b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe 28 PID 2004 wrote to memory of 1956 2004 b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe 28 PID 2004 wrote to memory of 1956 2004 b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe 28 PID 2004 wrote to memory of 1956 2004 b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe 28 PID 2004 wrote to memory of 1956 2004 b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe 28 PID 2004 wrote to memory of 1956 2004 b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe 28 PID 2004 wrote to memory of 1956 2004 b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe 28 PID 1956 wrote to memory of 296 1956 un303104.exe 29 PID 1956 wrote to memory of 296 1956 un303104.exe 29 PID 1956 wrote to memory of 296 1956 un303104.exe 29 PID 1956 wrote to memory of 296 1956 un303104.exe 29 PID 1956 wrote to memory of 296 1956 un303104.exe 29 PID 1956 wrote to memory of 296 1956 un303104.exe 29 PID 1956 wrote to memory of 296 1956 un303104.exe 29 PID 1956 wrote to memory of 1080 1956 un303104.exe 30 PID 1956 wrote to memory of 1080 1956 un303104.exe 30 PID 1956 wrote to memory of 1080 1956 un303104.exe 30 PID 1956 wrote to memory of 1080 1956 un303104.exe 30 PID 1956 wrote to memory of 1080 1956 un303104.exe 30 PID 1956 wrote to memory of 1080 1956 un303104.exe 30 PID 1956 wrote to memory of 1080 1956 un303104.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe"C:\Users\Admin\AppData\Local\Temp\b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un303104.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un303104.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\47738677.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\47738677.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:296
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk667911.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk667911.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5d67b01a4f6a9f71498dea3f4cb75af96
SHA1aca861f0945ff570a36266c8a273c4d2e2cdc7be
SHA256686bc71c4f6934ef3e485d4b159ecb219188e001fdd49b2799845b23ed762d8b
SHA5120436fd680fd39549a8ee0341a6aee7a1adca382a6596978421bab10d1131996e04a8b2c4858cab353b8407974ffaefceb344e98d36cdc1a7ab823d572253da15
-
Filesize
536KB
MD5d67b01a4f6a9f71498dea3f4cb75af96
SHA1aca861f0945ff570a36266c8a273c4d2e2cdc7be
SHA256686bc71c4f6934ef3e485d4b159ecb219188e001fdd49b2799845b23ed762d8b
SHA5120436fd680fd39549a8ee0341a6aee7a1adca382a6596978421bab10d1131996e04a8b2c4858cab353b8407974ffaefceb344e98d36cdc1a7ab823d572253da15
-
Filesize
259KB
MD5a6b1b652fa34cd189d4703f3f45287ac
SHA11face5536f7834054e0d79a276d1e24e95fba4fd
SHA2563c7da38d33869080b83fdf5a49edbfd031034da8848242c8b8dfd0dcdf3ff910
SHA5124e326c4531abffbfaa32e8686579246fd07bef1faa253ea29d18f85d932745c94a7e03e0acfb523cb018f74bf23a6e93d3696b82e7203e1eac5383b42caa25e8
-
Filesize
259KB
MD5a6b1b652fa34cd189d4703f3f45287ac
SHA11face5536f7834054e0d79a276d1e24e95fba4fd
SHA2563c7da38d33869080b83fdf5a49edbfd031034da8848242c8b8dfd0dcdf3ff910
SHA5124e326c4531abffbfaa32e8686579246fd07bef1faa253ea29d18f85d932745c94a7e03e0acfb523cb018f74bf23a6e93d3696b82e7203e1eac5383b42caa25e8
-
Filesize
259KB
MD5a6b1b652fa34cd189d4703f3f45287ac
SHA11face5536f7834054e0d79a276d1e24e95fba4fd
SHA2563c7da38d33869080b83fdf5a49edbfd031034da8848242c8b8dfd0dcdf3ff910
SHA5124e326c4531abffbfaa32e8686579246fd07bef1faa253ea29d18f85d932745c94a7e03e0acfb523cb018f74bf23a6e93d3696b82e7203e1eac5383b42caa25e8
-
Filesize
341KB
MD576331c95647aefe4de939f6c7fc1de13
SHA15496a07d4c48414c8f0c3d9256967178f0f0a203
SHA256f858f6e16f3ef0caf2102404e02f0573809b0385fe13fd903bd54de3cbd03022
SHA5120012bd11c847a84466e09cff190c380fe22fafc09333223ec976a355f931192acac00e80fe01995679bc87346202d6efcfd4b130b2ac7517649e8502fc0fe506
-
Filesize
341KB
MD576331c95647aefe4de939f6c7fc1de13
SHA15496a07d4c48414c8f0c3d9256967178f0f0a203
SHA256f858f6e16f3ef0caf2102404e02f0573809b0385fe13fd903bd54de3cbd03022
SHA5120012bd11c847a84466e09cff190c380fe22fafc09333223ec976a355f931192acac00e80fe01995679bc87346202d6efcfd4b130b2ac7517649e8502fc0fe506
-
Filesize
341KB
MD576331c95647aefe4de939f6c7fc1de13
SHA15496a07d4c48414c8f0c3d9256967178f0f0a203
SHA256f858f6e16f3ef0caf2102404e02f0573809b0385fe13fd903bd54de3cbd03022
SHA5120012bd11c847a84466e09cff190c380fe22fafc09333223ec976a355f931192acac00e80fe01995679bc87346202d6efcfd4b130b2ac7517649e8502fc0fe506
-
Filesize
536KB
MD5d67b01a4f6a9f71498dea3f4cb75af96
SHA1aca861f0945ff570a36266c8a273c4d2e2cdc7be
SHA256686bc71c4f6934ef3e485d4b159ecb219188e001fdd49b2799845b23ed762d8b
SHA5120436fd680fd39549a8ee0341a6aee7a1adca382a6596978421bab10d1131996e04a8b2c4858cab353b8407974ffaefceb344e98d36cdc1a7ab823d572253da15
-
Filesize
536KB
MD5d67b01a4f6a9f71498dea3f4cb75af96
SHA1aca861f0945ff570a36266c8a273c4d2e2cdc7be
SHA256686bc71c4f6934ef3e485d4b159ecb219188e001fdd49b2799845b23ed762d8b
SHA5120436fd680fd39549a8ee0341a6aee7a1adca382a6596978421bab10d1131996e04a8b2c4858cab353b8407974ffaefceb344e98d36cdc1a7ab823d572253da15
-
Filesize
259KB
MD5a6b1b652fa34cd189d4703f3f45287ac
SHA11face5536f7834054e0d79a276d1e24e95fba4fd
SHA2563c7da38d33869080b83fdf5a49edbfd031034da8848242c8b8dfd0dcdf3ff910
SHA5124e326c4531abffbfaa32e8686579246fd07bef1faa253ea29d18f85d932745c94a7e03e0acfb523cb018f74bf23a6e93d3696b82e7203e1eac5383b42caa25e8
-
Filesize
259KB
MD5a6b1b652fa34cd189d4703f3f45287ac
SHA11face5536f7834054e0d79a276d1e24e95fba4fd
SHA2563c7da38d33869080b83fdf5a49edbfd031034da8848242c8b8dfd0dcdf3ff910
SHA5124e326c4531abffbfaa32e8686579246fd07bef1faa253ea29d18f85d932745c94a7e03e0acfb523cb018f74bf23a6e93d3696b82e7203e1eac5383b42caa25e8
-
Filesize
259KB
MD5a6b1b652fa34cd189d4703f3f45287ac
SHA11face5536f7834054e0d79a276d1e24e95fba4fd
SHA2563c7da38d33869080b83fdf5a49edbfd031034da8848242c8b8dfd0dcdf3ff910
SHA5124e326c4531abffbfaa32e8686579246fd07bef1faa253ea29d18f85d932745c94a7e03e0acfb523cb018f74bf23a6e93d3696b82e7203e1eac5383b42caa25e8
-
Filesize
341KB
MD576331c95647aefe4de939f6c7fc1de13
SHA15496a07d4c48414c8f0c3d9256967178f0f0a203
SHA256f858f6e16f3ef0caf2102404e02f0573809b0385fe13fd903bd54de3cbd03022
SHA5120012bd11c847a84466e09cff190c380fe22fafc09333223ec976a355f931192acac00e80fe01995679bc87346202d6efcfd4b130b2ac7517649e8502fc0fe506
-
Filesize
341KB
MD576331c95647aefe4de939f6c7fc1de13
SHA15496a07d4c48414c8f0c3d9256967178f0f0a203
SHA256f858f6e16f3ef0caf2102404e02f0573809b0385fe13fd903bd54de3cbd03022
SHA5120012bd11c847a84466e09cff190c380fe22fafc09333223ec976a355f931192acac00e80fe01995679bc87346202d6efcfd4b130b2ac7517649e8502fc0fe506
-
Filesize
341KB
MD576331c95647aefe4de939f6c7fc1de13
SHA15496a07d4c48414c8f0c3d9256967178f0f0a203
SHA256f858f6e16f3ef0caf2102404e02f0573809b0385fe13fd903bd54de3cbd03022
SHA5120012bd11c847a84466e09cff190c380fe22fafc09333223ec976a355f931192acac00e80fe01995679bc87346202d6efcfd4b130b2ac7517649e8502fc0fe506