Analysis
-
max time kernel
188s -
max time network
206s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 19:35
Static task
static1
Behavioral task
behavioral1
Sample
ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe
Resource
win10v2004-20230220-en
General
-
Target
ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe
-
Size
643KB
-
MD5
070eb319ae588d62a47bb7937cdcd99c
-
SHA1
46f41d8aa31a8e96e0ab36ef52d33d2715607911
-
SHA256
ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63
-
SHA512
43180d97510c26bc144868c4a65a69cf33170659feced6efd2e37fcadb2cd0a6308abee64f13de840e45bf3b6fef9e11209091c6d21376daa0e2778e66fae2f3
-
SSDEEP
12288:ay90vRktWugmtsdpqe6krKGr76c/Un5ANUw5vPeu21jCMPVNi9EN:ayYRMlzKLHr17h/K5ANUiW19PVNfN
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 56332445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 56332445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 56332445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 56332445.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 56332445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 56332445.exe -
Executes dropped EXE 3 IoCs
pid Process 268 st068855.exe 440 56332445.exe 1216 kp641669.exe -
Loads dropped DLL 7 IoCs
pid Process 1404 ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe 268 st068855.exe 268 st068855.exe 440 56332445.exe 268 st068855.exe 268 st068855.exe 1216 kp641669.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 56332445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 56332445.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st068855.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st068855.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 440 56332445.exe 440 56332445.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 440 56332445.exe Token: SeDebugPrivilege 1216 kp641669.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1404 wrote to memory of 268 1404 ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe 28 PID 1404 wrote to memory of 268 1404 ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe 28 PID 1404 wrote to memory of 268 1404 ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe 28 PID 1404 wrote to memory of 268 1404 ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe 28 PID 1404 wrote to memory of 268 1404 ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe 28 PID 1404 wrote to memory of 268 1404 ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe 28 PID 1404 wrote to memory of 268 1404 ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe 28 PID 268 wrote to memory of 440 268 st068855.exe 29 PID 268 wrote to memory of 440 268 st068855.exe 29 PID 268 wrote to memory of 440 268 st068855.exe 29 PID 268 wrote to memory of 440 268 st068855.exe 29 PID 268 wrote to memory of 440 268 st068855.exe 29 PID 268 wrote to memory of 440 268 st068855.exe 29 PID 268 wrote to memory of 440 268 st068855.exe 29 PID 268 wrote to memory of 1216 268 st068855.exe 30 PID 268 wrote to memory of 1216 268 st068855.exe 30 PID 268 wrote to memory of 1216 268 st068855.exe 30 PID 268 wrote to memory of 1216 268 st068855.exe 30 PID 268 wrote to memory of 1216 268 st068855.exe 30 PID 268 wrote to memory of 1216 268 st068855.exe 30 PID 268 wrote to memory of 1216 268 st068855.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe"C:\Users\Admin\AppData\Local\Temp\ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st068855.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st068855.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56332445.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56332445.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp641669.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp641669.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD526a413fc6c0bc262967c4683046c8fbb
SHA1942e19171ad3e9f91e45b2c8a351b817f6711518
SHA256ab7b4b09e9bf7fa980ae39e0809088bc16062afe7011bfc05521d9152f370867
SHA512171aa70463c9fbaaa16fe148db7ff628bb6de7dc08c5d08edc36d7d980b7b1a3a2eb22d1e6331cc26515f280d194de928f4ae7e8f9e87965fb51631f1664da7b
-
Filesize
488KB
MD526a413fc6c0bc262967c4683046c8fbb
SHA1942e19171ad3e9f91e45b2c8a351b817f6711518
SHA256ab7b4b09e9bf7fa980ae39e0809088bc16062afe7011bfc05521d9152f370867
SHA512171aa70463c9fbaaa16fe148db7ff628bb6de7dc08c5d08edc36d7d980b7b1a3a2eb22d1e6331cc26515f280d194de928f4ae7e8f9e87965fb51631f1664da7b
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
340KB
MD557cb1aacc4cd60cf9948a54b6af5ab4e
SHA1d38b344cb0b2f586a5641f291cba4053b63e1de1
SHA2566a563ce07d35c123bf0cfd585942b37fe2f15d25357df04823e9b6d5e243fa14
SHA512f635668b7cca0daaa3b1cebf5b08c462fb6d7a95acb12672b5f11a459c77937dbf711325bbe0c0f6a2f25719bb9c3f3e98bb9313f0c447ed96f499fbf56590e7
-
Filesize
340KB
MD557cb1aacc4cd60cf9948a54b6af5ab4e
SHA1d38b344cb0b2f586a5641f291cba4053b63e1de1
SHA2566a563ce07d35c123bf0cfd585942b37fe2f15d25357df04823e9b6d5e243fa14
SHA512f635668b7cca0daaa3b1cebf5b08c462fb6d7a95acb12672b5f11a459c77937dbf711325bbe0c0f6a2f25719bb9c3f3e98bb9313f0c447ed96f499fbf56590e7
-
Filesize
340KB
MD557cb1aacc4cd60cf9948a54b6af5ab4e
SHA1d38b344cb0b2f586a5641f291cba4053b63e1de1
SHA2566a563ce07d35c123bf0cfd585942b37fe2f15d25357df04823e9b6d5e243fa14
SHA512f635668b7cca0daaa3b1cebf5b08c462fb6d7a95acb12672b5f11a459c77937dbf711325bbe0c0f6a2f25719bb9c3f3e98bb9313f0c447ed96f499fbf56590e7
-
Filesize
488KB
MD526a413fc6c0bc262967c4683046c8fbb
SHA1942e19171ad3e9f91e45b2c8a351b817f6711518
SHA256ab7b4b09e9bf7fa980ae39e0809088bc16062afe7011bfc05521d9152f370867
SHA512171aa70463c9fbaaa16fe148db7ff628bb6de7dc08c5d08edc36d7d980b7b1a3a2eb22d1e6331cc26515f280d194de928f4ae7e8f9e87965fb51631f1664da7b
-
Filesize
488KB
MD526a413fc6c0bc262967c4683046c8fbb
SHA1942e19171ad3e9f91e45b2c8a351b817f6711518
SHA256ab7b4b09e9bf7fa980ae39e0809088bc16062afe7011bfc05521d9152f370867
SHA512171aa70463c9fbaaa16fe148db7ff628bb6de7dc08c5d08edc36d7d980b7b1a3a2eb22d1e6331cc26515f280d194de928f4ae7e8f9e87965fb51631f1664da7b
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
340KB
MD557cb1aacc4cd60cf9948a54b6af5ab4e
SHA1d38b344cb0b2f586a5641f291cba4053b63e1de1
SHA2566a563ce07d35c123bf0cfd585942b37fe2f15d25357df04823e9b6d5e243fa14
SHA512f635668b7cca0daaa3b1cebf5b08c462fb6d7a95acb12672b5f11a459c77937dbf711325bbe0c0f6a2f25719bb9c3f3e98bb9313f0c447ed96f499fbf56590e7
-
Filesize
340KB
MD557cb1aacc4cd60cf9948a54b6af5ab4e
SHA1d38b344cb0b2f586a5641f291cba4053b63e1de1
SHA2566a563ce07d35c123bf0cfd585942b37fe2f15d25357df04823e9b6d5e243fa14
SHA512f635668b7cca0daaa3b1cebf5b08c462fb6d7a95acb12672b5f11a459c77937dbf711325bbe0c0f6a2f25719bb9c3f3e98bb9313f0c447ed96f499fbf56590e7
-
Filesize
340KB
MD557cb1aacc4cd60cf9948a54b6af5ab4e
SHA1d38b344cb0b2f586a5641f291cba4053b63e1de1
SHA2566a563ce07d35c123bf0cfd585942b37fe2f15d25357df04823e9b6d5e243fa14
SHA512f635668b7cca0daaa3b1cebf5b08c462fb6d7a95acb12672b5f11a459c77937dbf711325bbe0c0f6a2f25719bb9c3f3e98bb9313f0c447ed96f499fbf56590e7