Analysis
-
max time kernel
408s -
max time network
476s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9.exe
Resource
win10v2004-20230221-en
General
-
Target
cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9.exe
-
Size
1.5MB
-
MD5
b0cc5316c4796d64dd84e557d2caaa3e
-
SHA1
bfae5803b10f6d4b35928e06561bffdd73c211d8
-
SHA256
cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9
-
SHA512
696185294f94b916c551908d3bfc95e8dbec50e158f8d70e30effa550549a7939ef80ff9b6e393969087bd8bc10c3a34a3b07a9c3a27771b0a46a3a00f2ecffc
-
SSDEEP
24576:hyhbx1EWlTJkjDD6F+c0UFabZAqGaFYhRSy7cr05Uo67hNmeHKy2/8jVw299QP:UhbPJkjDDm+HiKYGy74yyYk2EhwB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 62236771.exe -
Executes dropped EXE 6 IoCs
pid Process 2908 za646197.exe 3804 za864273.exe 3292 za543096.exe 1332 62236771.exe 4720 1.exe 2316 u58519083.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za646197.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za646197.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za864273.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za864273.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za543096.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" za543096.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4720 1.exe 4720 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1332 62236771.exe Token: SeDebugPrivilege 2316 u58519083.exe Token: SeDebugPrivilege 4720 1.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4276 wrote to memory of 2908 4276 cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9.exe 76 PID 4276 wrote to memory of 2908 4276 cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9.exe 76 PID 4276 wrote to memory of 2908 4276 cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9.exe 76 PID 2908 wrote to memory of 3804 2908 za646197.exe 77 PID 2908 wrote to memory of 3804 2908 za646197.exe 77 PID 2908 wrote to memory of 3804 2908 za646197.exe 77 PID 3804 wrote to memory of 3292 3804 za864273.exe 78 PID 3804 wrote to memory of 3292 3804 za864273.exe 78 PID 3804 wrote to memory of 3292 3804 za864273.exe 78 PID 3292 wrote to memory of 1332 3292 za543096.exe 79 PID 3292 wrote to memory of 1332 3292 za543096.exe 79 PID 3292 wrote to memory of 1332 3292 za543096.exe 79 PID 1332 wrote to memory of 4720 1332 62236771.exe 81 PID 1332 wrote to memory of 4720 1332 62236771.exe 81 PID 3292 wrote to memory of 2316 3292 za543096.exe 82 PID 3292 wrote to memory of 2316 3292 za543096.exe 82 PID 3292 wrote to memory of 2316 3292 za543096.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9.exe"C:\Users\Admin\AppData\Local\Temp\cecb2ee3c83046edd188eaa14560d4ca7cec0a7be383fd3cb7fda6fea46d84f9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za646197.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za646197.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za864273.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za864273.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za543096.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za543096.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\62236771.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\62236771.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u58519083.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u58519083.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5ea530a7bb1a954c13a62e5a61aad7c0f
SHA129d9ee80d16fa59927d45f83b2eabf90a42c6f0f
SHA256421c57a0979d24f14e4c6e054445c66cc0e5a7c34625c2edf28d606ad7d9adcd
SHA5128debbea35b218588370007e2d9f6c56e5bb175aa5fdab371db96df517ab60bbe7b7c969b6e9ad447fb8c209034b7eabfd8051c1d00a6e0ebb1b82658caadbe70
-
Filesize
1.3MB
MD5ea530a7bb1a954c13a62e5a61aad7c0f
SHA129d9ee80d16fa59927d45f83b2eabf90a42c6f0f
SHA256421c57a0979d24f14e4c6e054445c66cc0e5a7c34625c2edf28d606ad7d9adcd
SHA5128debbea35b218588370007e2d9f6c56e5bb175aa5fdab371db96df517ab60bbe7b7c969b6e9ad447fb8c209034b7eabfd8051c1d00a6e0ebb1b82658caadbe70
-
Filesize
862KB
MD59e40f6f89bbb6db225a00603e36f36bf
SHA197846f93171b7cd0e557870ef7f81df29feec497
SHA2560a2d81db9e0cf909683949bcf32d59d3576ed439bc3c774aea665b77b965be21
SHA51292b961ee9db6b4ca2a208e12d4a1ec61b102a2c3df3b0ddc06b8543707113b86dcd1f5d0a0c671b4965d7e4a6dd6b8292936fbefa3dccb1da46d192ecaa18a54
-
Filesize
862KB
MD59e40f6f89bbb6db225a00603e36f36bf
SHA197846f93171b7cd0e557870ef7f81df29feec497
SHA2560a2d81db9e0cf909683949bcf32d59d3576ed439bc3c774aea665b77b965be21
SHA51292b961ee9db6b4ca2a208e12d4a1ec61b102a2c3df3b0ddc06b8543707113b86dcd1f5d0a0c671b4965d7e4a6dd6b8292936fbefa3dccb1da46d192ecaa18a54
-
Filesize
680KB
MD551347b77c412ddea77374a2ae493d772
SHA1a7a412620309a392228b3b00e4477de8bfee6420
SHA256cd55b83d88b694cb0e67313e1f16dbeed8ee5263af7f9c08e0c471b6f468da85
SHA512185194302ebad53714863ded076175d80f830934c3c1851d3316ec4daa3ddbe3e89f18fafb6cea96fcc69afedb0341d46d570d78a3652a927baac1988561e202
-
Filesize
680KB
MD551347b77c412ddea77374a2ae493d772
SHA1a7a412620309a392228b3b00e4477de8bfee6420
SHA256cd55b83d88b694cb0e67313e1f16dbeed8ee5263af7f9c08e0c471b6f468da85
SHA512185194302ebad53714863ded076175d80f830934c3c1851d3316ec4daa3ddbe3e89f18fafb6cea96fcc69afedb0341d46d570d78a3652a927baac1988561e202
-
Filesize
302KB
MD5cebb0ee5d72100b82138cfab0f82a355
SHA1c8cff32c73fc58c33dc79773ca1867da7119936d
SHA2566afc41e8d21b0b874eba8db8f069ded7f46531f561dbcf9e97037f82a4370612
SHA51214f32b16f227243da3506eccd9a299092e41b23fa0fb1b2b4471f56276e908b99c28c1b56c4e453a2b1788eb2ccd0174cfca210472381d1e9dcb6d34dfb79cf9
-
Filesize
302KB
MD5cebb0ee5d72100b82138cfab0f82a355
SHA1c8cff32c73fc58c33dc79773ca1867da7119936d
SHA2566afc41e8d21b0b874eba8db8f069ded7f46531f561dbcf9e97037f82a4370612
SHA51214f32b16f227243da3506eccd9a299092e41b23fa0fb1b2b4471f56276e908b99c28c1b56c4e453a2b1788eb2ccd0174cfca210472381d1e9dcb6d34dfb79cf9
-
Filesize
522KB
MD5b755c0e228562779905332169357e939
SHA1309d3b4c272db3ba25e38a096638bcb92709f6c9
SHA256b6e737b86226ec94f2fdd705688b79a7042c534e276e8934ced2e12e29c86d02
SHA5125adba143dbf0ce746a3cd5135b4da50fce9abe80ef5aabf8fc1c00321a87fe9722c83add5fe6a9a0b6d58cabeff1192783d16d76c681d7bc4fcfe0fb0f3ceaaf
-
Filesize
522KB
MD5b755c0e228562779905332169357e939
SHA1309d3b4c272db3ba25e38a096638bcb92709f6c9
SHA256b6e737b86226ec94f2fdd705688b79a7042c534e276e8934ced2e12e29c86d02
SHA5125adba143dbf0ce746a3cd5135b4da50fce9abe80ef5aabf8fc1c00321a87fe9722c83add5fe6a9a0b6d58cabeff1192783d16d76c681d7bc4fcfe0fb0f3ceaaf
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91