Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe
Resource
win10v2004-20230220-en
General
-
Target
f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe
-
Size
990KB
-
MD5
0267641397e27b03d8844956ab5a4595
-
SHA1
02ce5f9b99b9c3406f356d08bb3736c1976b51c2
-
SHA256
f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013
-
SHA512
86b075ac5dcc007be5878d0fa98a85adeac897e4162c96bce9256bab01ab861c4be9092c94c6b00e48eaa623a95d29d86e6f3222af08b5cb989ef4001540b55d
-
SSDEEP
24576:unUoY7pfy8Yg7Q7TsRZcKeD2Mzlnk+IY8Mlf:B7By87STskKefd5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 156413437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 156413437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 156413437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 156413437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 156413437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 156413437.exe -
Executes dropped EXE 4 IoCs
pid Process 1772 ws707062.exe 1056 UP235332.exe 1260 156413437.exe 1624 210661960.exe -
Loads dropped DLL 10 IoCs
pid Process 1336 f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe 1772 ws707062.exe 1772 ws707062.exe 1056 UP235332.exe 1056 UP235332.exe 1056 UP235332.exe 1260 156413437.exe 1056 UP235332.exe 1056 UP235332.exe 1624 210661960.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 156413437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 156413437.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ws707062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ws707062.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce UP235332.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" UP235332.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1260 156413437.exe 1260 156413437.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1260 156413437.exe Token: SeDebugPrivilege 1624 210661960.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1772 1336 f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe 28 PID 1336 wrote to memory of 1772 1336 f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe 28 PID 1336 wrote to memory of 1772 1336 f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe 28 PID 1336 wrote to memory of 1772 1336 f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe 28 PID 1336 wrote to memory of 1772 1336 f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe 28 PID 1336 wrote to memory of 1772 1336 f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe 28 PID 1336 wrote to memory of 1772 1336 f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe 28 PID 1772 wrote to memory of 1056 1772 ws707062.exe 29 PID 1772 wrote to memory of 1056 1772 ws707062.exe 29 PID 1772 wrote to memory of 1056 1772 ws707062.exe 29 PID 1772 wrote to memory of 1056 1772 ws707062.exe 29 PID 1772 wrote to memory of 1056 1772 ws707062.exe 29 PID 1772 wrote to memory of 1056 1772 ws707062.exe 29 PID 1772 wrote to memory of 1056 1772 ws707062.exe 29 PID 1056 wrote to memory of 1260 1056 UP235332.exe 30 PID 1056 wrote to memory of 1260 1056 UP235332.exe 30 PID 1056 wrote to memory of 1260 1056 UP235332.exe 30 PID 1056 wrote to memory of 1260 1056 UP235332.exe 30 PID 1056 wrote to memory of 1260 1056 UP235332.exe 30 PID 1056 wrote to memory of 1260 1056 UP235332.exe 30 PID 1056 wrote to memory of 1260 1056 UP235332.exe 30 PID 1056 wrote to memory of 1624 1056 UP235332.exe 31 PID 1056 wrote to memory of 1624 1056 UP235332.exe 31 PID 1056 wrote to memory of 1624 1056 UP235332.exe 31 PID 1056 wrote to memory of 1624 1056 UP235332.exe 31 PID 1056 wrote to memory of 1624 1056 UP235332.exe 31 PID 1056 wrote to memory of 1624 1056 UP235332.exe 31 PID 1056 wrote to memory of 1624 1056 UP235332.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe"C:\Users\Admin\AppData\Local\Temp\f1dd5438eb617f3260423ba84f6114d6ba9212d8c9eab9b56e50751a6ea79013.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ws707062.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ws707062.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UP235332.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UP235332.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\156413437.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\156413437.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\210661960.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\210661960.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717KB
MD5fa00be7caa8c76ecf693086a43a6fa72
SHA15a824c7908f9a759b12be9aa2c5d758e003f36eb
SHA25647ad2bf46a37ecfa35b25a2a5e59bda6d82e8768361fc9726e2a84d84a85a4b1
SHA512cd1f0cc4dfa573648f8979cdc448f45b4ab07ae5e760541725d6a0dba1fa398208b534bb224e5fff79c9953a3ac89bcd3e5aca2c518143bce9dc68a55e4c62ea
-
Filesize
717KB
MD5fa00be7caa8c76ecf693086a43a6fa72
SHA15a824c7908f9a759b12be9aa2c5d758e003f36eb
SHA25647ad2bf46a37ecfa35b25a2a5e59bda6d82e8768361fc9726e2a84d84a85a4b1
SHA512cd1f0cc4dfa573648f8979cdc448f45b4ab07ae5e760541725d6a0dba1fa398208b534bb224e5fff79c9953a3ac89bcd3e5aca2c518143bce9dc68a55e4c62ea
-
Filesize
545KB
MD5200afa6d30b530e30060f4732a7d7ad8
SHA1cada950005d7c663e2076e0d8a8147e49b9fbdd2
SHA256d4a96660a52626abf454197b499e0c0ab26ed25462b08bbd8b0c14cca16620be
SHA512d91886c594ff70176cd81f319f63092058729fba82789bae3173f711d32eac6ae189d8b930178338dfac441ec2e8b5d28f18e20f3d58e4f1a26ca86fd49eae2d
-
Filesize
545KB
MD5200afa6d30b530e30060f4732a7d7ad8
SHA1cada950005d7c663e2076e0d8a8147e49b9fbdd2
SHA256d4a96660a52626abf454197b499e0c0ab26ed25462b08bbd8b0c14cca16620be
SHA512d91886c594ff70176cd81f319f63092058729fba82789bae3173f711d32eac6ae189d8b930178338dfac441ec2e8b5d28f18e20f3d58e4f1a26ca86fd49eae2d
-
Filesize
269KB
MD54d86b1f078cf5b393a3c4c1977338041
SHA108ffce6e13ae74e83023e643ea97b0d9960e6e24
SHA256a27c02ac2161eee8c4887a42c42af559a1be457c6b46d368c46eafeb3b878e1b
SHA512f1a4aa45b0a55467d479dc23502556c8766a7551ad3f688fd3092c713f41775373d1a7d3e5c3193ee4d0d8c786bad6dfd0aa20a8702460632612dd992e4e07b0
-
Filesize
269KB
MD54d86b1f078cf5b393a3c4c1977338041
SHA108ffce6e13ae74e83023e643ea97b0d9960e6e24
SHA256a27c02ac2161eee8c4887a42c42af559a1be457c6b46d368c46eafeb3b878e1b
SHA512f1a4aa45b0a55467d479dc23502556c8766a7551ad3f688fd3092c713f41775373d1a7d3e5c3193ee4d0d8c786bad6dfd0aa20a8702460632612dd992e4e07b0
-
Filesize
269KB
MD54d86b1f078cf5b393a3c4c1977338041
SHA108ffce6e13ae74e83023e643ea97b0d9960e6e24
SHA256a27c02ac2161eee8c4887a42c42af559a1be457c6b46d368c46eafeb3b878e1b
SHA512f1a4aa45b0a55467d479dc23502556c8766a7551ad3f688fd3092c713f41775373d1a7d3e5c3193ee4d0d8c786bad6dfd0aa20a8702460632612dd992e4e07b0
-
Filesize
353KB
MD5a57403199ddf1fad6096938e90ccc21e
SHA145bcfc93e33259f76bfb8a68b19b4b43dd28678e
SHA256eb0fb8fabb95798d507af3ed1999ab280efb55d61f62222aad3fc59be9551c3e
SHA512eeeba09adb6171e9a56481e4b68b53359a0d94c16716e0783d7cfd69d61c923f627d41c1e47f0164a705445bf182cbf912347577bb45418fbe44c242bdba4bb7
-
Filesize
353KB
MD5a57403199ddf1fad6096938e90ccc21e
SHA145bcfc93e33259f76bfb8a68b19b4b43dd28678e
SHA256eb0fb8fabb95798d507af3ed1999ab280efb55d61f62222aad3fc59be9551c3e
SHA512eeeba09adb6171e9a56481e4b68b53359a0d94c16716e0783d7cfd69d61c923f627d41c1e47f0164a705445bf182cbf912347577bb45418fbe44c242bdba4bb7
-
Filesize
353KB
MD5a57403199ddf1fad6096938e90ccc21e
SHA145bcfc93e33259f76bfb8a68b19b4b43dd28678e
SHA256eb0fb8fabb95798d507af3ed1999ab280efb55d61f62222aad3fc59be9551c3e
SHA512eeeba09adb6171e9a56481e4b68b53359a0d94c16716e0783d7cfd69d61c923f627d41c1e47f0164a705445bf182cbf912347577bb45418fbe44c242bdba4bb7
-
Filesize
717KB
MD5fa00be7caa8c76ecf693086a43a6fa72
SHA15a824c7908f9a759b12be9aa2c5d758e003f36eb
SHA25647ad2bf46a37ecfa35b25a2a5e59bda6d82e8768361fc9726e2a84d84a85a4b1
SHA512cd1f0cc4dfa573648f8979cdc448f45b4ab07ae5e760541725d6a0dba1fa398208b534bb224e5fff79c9953a3ac89bcd3e5aca2c518143bce9dc68a55e4c62ea
-
Filesize
717KB
MD5fa00be7caa8c76ecf693086a43a6fa72
SHA15a824c7908f9a759b12be9aa2c5d758e003f36eb
SHA25647ad2bf46a37ecfa35b25a2a5e59bda6d82e8768361fc9726e2a84d84a85a4b1
SHA512cd1f0cc4dfa573648f8979cdc448f45b4ab07ae5e760541725d6a0dba1fa398208b534bb224e5fff79c9953a3ac89bcd3e5aca2c518143bce9dc68a55e4c62ea
-
Filesize
545KB
MD5200afa6d30b530e30060f4732a7d7ad8
SHA1cada950005d7c663e2076e0d8a8147e49b9fbdd2
SHA256d4a96660a52626abf454197b499e0c0ab26ed25462b08bbd8b0c14cca16620be
SHA512d91886c594ff70176cd81f319f63092058729fba82789bae3173f711d32eac6ae189d8b930178338dfac441ec2e8b5d28f18e20f3d58e4f1a26ca86fd49eae2d
-
Filesize
545KB
MD5200afa6d30b530e30060f4732a7d7ad8
SHA1cada950005d7c663e2076e0d8a8147e49b9fbdd2
SHA256d4a96660a52626abf454197b499e0c0ab26ed25462b08bbd8b0c14cca16620be
SHA512d91886c594ff70176cd81f319f63092058729fba82789bae3173f711d32eac6ae189d8b930178338dfac441ec2e8b5d28f18e20f3d58e4f1a26ca86fd49eae2d
-
Filesize
269KB
MD54d86b1f078cf5b393a3c4c1977338041
SHA108ffce6e13ae74e83023e643ea97b0d9960e6e24
SHA256a27c02ac2161eee8c4887a42c42af559a1be457c6b46d368c46eafeb3b878e1b
SHA512f1a4aa45b0a55467d479dc23502556c8766a7551ad3f688fd3092c713f41775373d1a7d3e5c3193ee4d0d8c786bad6dfd0aa20a8702460632612dd992e4e07b0
-
Filesize
269KB
MD54d86b1f078cf5b393a3c4c1977338041
SHA108ffce6e13ae74e83023e643ea97b0d9960e6e24
SHA256a27c02ac2161eee8c4887a42c42af559a1be457c6b46d368c46eafeb3b878e1b
SHA512f1a4aa45b0a55467d479dc23502556c8766a7551ad3f688fd3092c713f41775373d1a7d3e5c3193ee4d0d8c786bad6dfd0aa20a8702460632612dd992e4e07b0
-
Filesize
269KB
MD54d86b1f078cf5b393a3c4c1977338041
SHA108ffce6e13ae74e83023e643ea97b0d9960e6e24
SHA256a27c02ac2161eee8c4887a42c42af559a1be457c6b46d368c46eafeb3b878e1b
SHA512f1a4aa45b0a55467d479dc23502556c8766a7551ad3f688fd3092c713f41775373d1a7d3e5c3193ee4d0d8c786bad6dfd0aa20a8702460632612dd992e4e07b0
-
Filesize
353KB
MD5a57403199ddf1fad6096938e90ccc21e
SHA145bcfc93e33259f76bfb8a68b19b4b43dd28678e
SHA256eb0fb8fabb95798d507af3ed1999ab280efb55d61f62222aad3fc59be9551c3e
SHA512eeeba09adb6171e9a56481e4b68b53359a0d94c16716e0783d7cfd69d61c923f627d41c1e47f0164a705445bf182cbf912347577bb45418fbe44c242bdba4bb7
-
Filesize
353KB
MD5a57403199ddf1fad6096938e90ccc21e
SHA145bcfc93e33259f76bfb8a68b19b4b43dd28678e
SHA256eb0fb8fabb95798d507af3ed1999ab280efb55d61f62222aad3fc59be9551c3e
SHA512eeeba09adb6171e9a56481e4b68b53359a0d94c16716e0783d7cfd69d61c923f627d41c1e47f0164a705445bf182cbf912347577bb45418fbe44c242bdba4bb7
-
Filesize
353KB
MD5a57403199ddf1fad6096938e90ccc21e
SHA145bcfc93e33259f76bfb8a68b19b4b43dd28678e
SHA256eb0fb8fabb95798d507af3ed1999ab280efb55d61f62222aad3fc59be9551c3e
SHA512eeeba09adb6171e9a56481e4b68b53359a0d94c16716e0783d7cfd69d61c923f627d41c1e47f0164a705445bf182cbf912347577bb45418fbe44c242bdba4bb7