Analysis
-
max time kernel
148s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe
Resource
win10v2004-20230220-en
General
-
Target
cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe
-
Size
707KB
-
MD5
be984f5a48f5d1a41d0642589ce66a74
-
SHA1
adce4929ec3feb33d98577c22f8fb7e640a69115
-
SHA256
cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a
-
SHA512
f8a0e5725d0ebc720f0f867857f0e7fff10e410a9822a75ebee193e74f494341a32b40925cafa2273586591c2f58804982ec2b51d6be8c5ea0c1801b4f8f90ad
-
SSDEEP
12288:oy90RN1qsMOdo1MNFFaaPlcZgbTgQ/TTdnRUmJiSxAJmTfctYS4GQ:oyO1qsx0MRf9cZgbTLhRx92tYOQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 14336960.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 14336960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 14336960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 14336960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 14336960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 14336960.exe -
Executes dropped EXE 3 IoCs
pid Process 912 un233350.exe 576 14336960.exe 1752 rk579539.exe -
Loads dropped DLL 8 IoCs
pid Process 2024 cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe 912 un233350.exe 912 un233350.exe 912 un233350.exe 576 14336960.exe 912 un233350.exe 912 un233350.exe 1752 rk579539.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 14336960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 14336960.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un233350.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un233350.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 576 14336960.exe 576 14336960.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 576 14336960.exe Token: SeDebugPrivilege 1752 rk579539.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2024 wrote to memory of 912 2024 cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe 28 PID 2024 wrote to memory of 912 2024 cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe 28 PID 2024 wrote to memory of 912 2024 cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe 28 PID 2024 wrote to memory of 912 2024 cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe 28 PID 2024 wrote to memory of 912 2024 cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe 28 PID 2024 wrote to memory of 912 2024 cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe 28 PID 2024 wrote to memory of 912 2024 cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe 28 PID 912 wrote to memory of 576 912 un233350.exe 29 PID 912 wrote to memory of 576 912 un233350.exe 29 PID 912 wrote to memory of 576 912 un233350.exe 29 PID 912 wrote to memory of 576 912 un233350.exe 29 PID 912 wrote to memory of 576 912 un233350.exe 29 PID 912 wrote to memory of 576 912 un233350.exe 29 PID 912 wrote to memory of 576 912 un233350.exe 29 PID 912 wrote to memory of 1752 912 un233350.exe 30 PID 912 wrote to memory of 1752 912 un233350.exe 30 PID 912 wrote to memory of 1752 912 un233350.exe 30 PID 912 wrote to memory of 1752 912 un233350.exe 30 PID 912 wrote to memory of 1752 912 un233350.exe 30 PID 912 wrote to memory of 1752 912 un233350.exe 30 PID 912 wrote to memory of 1752 912 un233350.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe"C:\Users\Admin\AppData\Local\Temp\cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un233350.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un233350.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14336960.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14336960.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk579539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk579539.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD50bb9522c5c378737556d286e7df4778b
SHA102ac5517766abac08c06209d5db58ebfaf0ef950
SHA256f6b1bd64207786c36be158098b1bf2bc31a95c8b3e514ef1f40fa404408ef536
SHA5120be6de8fa40f88b1b9e9ab56e9153b7d6a09833b1769e601c8e6b5443981e42591e5aad37b9cef67e60f2c93570446a071d672d7cb14b71a13ffeef690e27b63
-
Filesize
553KB
MD50bb9522c5c378737556d286e7df4778b
SHA102ac5517766abac08c06209d5db58ebfaf0ef950
SHA256f6b1bd64207786c36be158098b1bf2bc31a95c8b3e514ef1f40fa404408ef536
SHA5120be6de8fa40f88b1b9e9ab56e9153b7d6a09833b1769e601c8e6b5443981e42591e5aad37b9cef67e60f2c93570446a071d672d7cb14b71a13ffeef690e27b63
-
Filesize
258KB
MD58ff41f40c7c8b23d5dd0ecb9a888a48c
SHA1c28f0da22bbee700d4b5e23c123e1935a7b52b68
SHA256eec0a44ea91176c893226eda20dd643afc88cd9d08406f206191bfdb71f36714
SHA512f673555d4ecd11662e26912114f70dd4b90012b6d51e6130a13607106b63ca044ca23daf51221db49072d7ba5e5bf9bf3cdac85a25b801cce4f867709889eabe
-
Filesize
258KB
MD58ff41f40c7c8b23d5dd0ecb9a888a48c
SHA1c28f0da22bbee700d4b5e23c123e1935a7b52b68
SHA256eec0a44ea91176c893226eda20dd643afc88cd9d08406f206191bfdb71f36714
SHA512f673555d4ecd11662e26912114f70dd4b90012b6d51e6130a13607106b63ca044ca23daf51221db49072d7ba5e5bf9bf3cdac85a25b801cce4f867709889eabe
-
Filesize
258KB
MD58ff41f40c7c8b23d5dd0ecb9a888a48c
SHA1c28f0da22bbee700d4b5e23c123e1935a7b52b68
SHA256eec0a44ea91176c893226eda20dd643afc88cd9d08406f206191bfdb71f36714
SHA512f673555d4ecd11662e26912114f70dd4b90012b6d51e6130a13607106b63ca044ca23daf51221db49072d7ba5e5bf9bf3cdac85a25b801cce4f867709889eabe
-
Filesize
353KB
MD571a3bff7c6570a9d5003296521bc993b
SHA1a11b67ef1aa624797c57b9b5b16f044658a849a0
SHA256111a9e80a575667842d690bd56dae1b8e76d7cc37855722f229d26d6db154cbf
SHA512869447569cf1ae863645d44c83660003f851b2388f0e58eda861f49b4ee3d172f32536a0bfb077f802915ae47c43a10730ca03b4e17d938714f75190c2474f13
-
Filesize
353KB
MD571a3bff7c6570a9d5003296521bc993b
SHA1a11b67ef1aa624797c57b9b5b16f044658a849a0
SHA256111a9e80a575667842d690bd56dae1b8e76d7cc37855722f229d26d6db154cbf
SHA512869447569cf1ae863645d44c83660003f851b2388f0e58eda861f49b4ee3d172f32536a0bfb077f802915ae47c43a10730ca03b4e17d938714f75190c2474f13
-
Filesize
353KB
MD571a3bff7c6570a9d5003296521bc993b
SHA1a11b67ef1aa624797c57b9b5b16f044658a849a0
SHA256111a9e80a575667842d690bd56dae1b8e76d7cc37855722f229d26d6db154cbf
SHA512869447569cf1ae863645d44c83660003f851b2388f0e58eda861f49b4ee3d172f32536a0bfb077f802915ae47c43a10730ca03b4e17d938714f75190c2474f13
-
Filesize
553KB
MD50bb9522c5c378737556d286e7df4778b
SHA102ac5517766abac08c06209d5db58ebfaf0ef950
SHA256f6b1bd64207786c36be158098b1bf2bc31a95c8b3e514ef1f40fa404408ef536
SHA5120be6de8fa40f88b1b9e9ab56e9153b7d6a09833b1769e601c8e6b5443981e42591e5aad37b9cef67e60f2c93570446a071d672d7cb14b71a13ffeef690e27b63
-
Filesize
553KB
MD50bb9522c5c378737556d286e7df4778b
SHA102ac5517766abac08c06209d5db58ebfaf0ef950
SHA256f6b1bd64207786c36be158098b1bf2bc31a95c8b3e514ef1f40fa404408ef536
SHA5120be6de8fa40f88b1b9e9ab56e9153b7d6a09833b1769e601c8e6b5443981e42591e5aad37b9cef67e60f2c93570446a071d672d7cb14b71a13ffeef690e27b63
-
Filesize
258KB
MD58ff41f40c7c8b23d5dd0ecb9a888a48c
SHA1c28f0da22bbee700d4b5e23c123e1935a7b52b68
SHA256eec0a44ea91176c893226eda20dd643afc88cd9d08406f206191bfdb71f36714
SHA512f673555d4ecd11662e26912114f70dd4b90012b6d51e6130a13607106b63ca044ca23daf51221db49072d7ba5e5bf9bf3cdac85a25b801cce4f867709889eabe
-
Filesize
258KB
MD58ff41f40c7c8b23d5dd0ecb9a888a48c
SHA1c28f0da22bbee700d4b5e23c123e1935a7b52b68
SHA256eec0a44ea91176c893226eda20dd643afc88cd9d08406f206191bfdb71f36714
SHA512f673555d4ecd11662e26912114f70dd4b90012b6d51e6130a13607106b63ca044ca23daf51221db49072d7ba5e5bf9bf3cdac85a25b801cce4f867709889eabe
-
Filesize
258KB
MD58ff41f40c7c8b23d5dd0ecb9a888a48c
SHA1c28f0da22bbee700d4b5e23c123e1935a7b52b68
SHA256eec0a44ea91176c893226eda20dd643afc88cd9d08406f206191bfdb71f36714
SHA512f673555d4ecd11662e26912114f70dd4b90012b6d51e6130a13607106b63ca044ca23daf51221db49072d7ba5e5bf9bf3cdac85a25b801cce4f867709889eabe
-
Filesize
353KB
MD571a3bff7c6570a9d5003296521bc993b
SHA1a11b67ef1aa624797c57b9b5b16f044658a849a0
SHA256111a9e80a575667842d690bd56dae1b8e76d7cc37855722f229d26d6db154cbf
SHA512869447569cf1ae863645d44c83660003f851b2388f0e58eda861f49b4ee3d172f32536a0bfb077f802915ae47c43a10730ca03b4e17d938714f75190c2474f13
-
Filesize
353KB
MD571a3bff7c6570a9d5003296521bc993b
SHA1a11b67ef1aa624797c57b9b5b16f044658a849a0
SHA256111a9e80a575667842d690bd56dae1b8e76d7cc37855722f229d26d6db154cbf
SHA512869447569cf1ae863645d44c83660003f851b2388f0e58eda861f49b4ee3d172f32536a0bfb077f802915ae47c43a10730ca03b4e17d938714f75190c2474f13
-
Filesize
353KB
MD571a3bff7c6570a9d5003296521bc993b
SHA1a11b67ef1aa624797c57b9b5b16f044658a849a0
SHA256111a9e80a575667842d690bd56dae1b8e76d7cc37855722f229d26d6db154cbf
SHA512869447569cf1ae863645d44c83660003f851b2388f0e58eda861f49b4ee3d172f32536a0bfb077f802915ae47c43a10730ca03b4e17d938714f75190c2474f13