Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe
Resource
win10v2004-20230220-en
General
-
Target
cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe
-
Size
746KB
-
MD5
74c61ac5005bcb4c497397f20ecade41
-
SHA1
721476f48ca4d5116f5ec5cd32d09adf515bc7e5
-
SHA256
cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f
-
SHA512
cb93cfee773b2a8092ab52001886f9b117f77eaef89910d4be0e2dfed53656079b2f43d95e8ba9db33cb1cff9b479f8e89b29f372f9cf386c13704742d29e837
-
SSDEEP
12288:Ty90iLXGBt7xB6mpwNTe/KmUO3ofoioANoCKCSx9CqOYg2Fql:TyjaD7xN0UKmUro7x93OYg2ol
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 07342631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 07342631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 07342631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 07342631.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 07342631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 07342631.exe -
Executes dropped EXE 3 IoCs
pid Process 2028 un679371.exe 2012 07342631.exe 1984 rk482940.exe -
Loads dropped DLL 8 IoCs
pid Process 1116 cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe 2028 un679371.exe 2028 un679371.exe 2028 un679371.exe 2012 07342631.exe 2028 un679371.exe 2028 un679371.exe 1984 rk482940.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 07342631.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 07342631.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un679371.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un679371.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2012 07342631.exe 2012 07342631.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2012 07342631.exe Token: SeDebugPrivilege 1984 rk482940.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1116 wrote to memory of 2028 1116 cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe 26 PID 1116 wrote to memory of 2028 1116 cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe 26 PID 1116 wrote to memory of 2028 1116 cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe 26 PID 1116 wrote to memory of 2028 1116 cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe 26 PID 1116 wrote to memory of 2028 1116 cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe 26 PID 1116 wrote to memory of 2028 1116 cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe 26 PID 1116 wrote to memory of 2028 1116 cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe 26 PID 2028 wrote to memory of 2012 2028 un679371.exe 27 PID 2028 wrote to memory of 2012 2028 un679371.exe 27 PID 2028 wrote to memory of 2012 2028 un679371.exe 27 PID 2028 wrote to memory of 2012 2028 un679371.exe 27 PID 2028 wrote to memory of 2012 2028 un679371.exe 27 PID 2028 wrote to memory of 2012 2028 un679371.exe 27 PID 2028 wrote to memory of 2012 2028 un679371.exe 27 PID 2028 wrote to memory of 1984 2028 un679371.exe 28 PID 2028 wrote to memory of 1984 2028 un679371.exe 28 PID 2028 wrote to memory of 1984 2028 un679371.exe 28 PID 2028 wrote to memory of 1984 2028 un679371.exe 28 PID 2028 wrote to memory of 1984 2028 un679371.exe 28 PID 2028 wrote to memory of 1984 2028 un679371.exe 28 PID 2028 wrote to memory of 1984 2028 un679371.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe"C:\Users\Admin\AppData\Local\Temp\cf813ae98126430a2dd9d3454eb6054b7cdca328216024b591a7aaf5911cf27f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un679371.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un679371.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\07342631.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\07342631.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk482940.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk482940.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD5205a0c856df970ecf2ea9a9c0c489bdd
SHA1ec250a3a259e4a22edf0496b61c85c3845799ef5
SHA256a760c63645e5a762ec5e3d8eb259a27742b2531e1364feb81ae4c6ef9e72f688
SHA51217708eebd4a721b87a03a245c8916d8e6c69a8244830cdfc512f5e96630045a7c9d2d94300fb7b45f1a8e898a71d0735c5eb4feac55a554ef0907853dcfc3105
-
Filesize
592KB
MD5205a0c856df970ecf2ea9a9c0c489bdd
SHA1ec250a3a259e4a22edf0496b61c85c3845799ef5
SHA256a760c63645e5a762ec5e3d8eb259a27742b2531e1364feb81ae4c6ef9e72f688
SHA51217708eebd4a721b87a03a245c8916d8e6c69a8244830cdfc512f5e96630045a7c9d2d94300fb7b45f1a8e898a71d0735c5eb4feac55a554ef0907853dcfc3105
-
Filesize
377KB
MD561e94129e08d547a1e7571adda58582c
SHA1a0e9018b2aa635724d9351281be631897d40d2b1
SHA25670eb178156697695b8d6ddbb64c772ac34f166a5de5b6b5d262f1e9f022d5666
SHA5125b7036739cc714139baa22620a8e49ff743742bb065293ac9e5a0a88c447efa7c9bccd8d092d35663af1f5246e485be0e4398d4adbc153066f307e866b534864
-
Filesize
377KB
MD561e94129e08d547a1e7571adda58582c
SHA1a0e9018b2aa635724d9351281be631897d40d2b1
SHA25670eb178156697695b8d6ddbb64c772ac34f166a5de5b6b5d262f1e9f022d5666
SHA5125b7036739cc714139baa22620a8e49ff743742bb065293ac9e5a0a88c447efa7c9bccd8d092d35663af1f5246e485be0e4398d4adbc153066f307e866b534864
-
Filesize
377KB
MD561e94129e08d547a1e7571adda58582c
SHA1a0e9018b2aa635724d9351281be631897d40d2b1
SHA25670eb178156697695b8d6ddbb64c772ac34f166a5de5b6b5d262f1e9f022d5666
SHA5125b7036739cc714139baa22620a8e49ff743742bb065293ac9e5a0a88c447efa7c9bccd8d092d35663af1f5246e485be0e4398d4adbc153066f307e866b534864
-
Filesize
459KB
MD50fc898238d5a4c1697233b8cdb0253a1
SHA1c24f971a60616807d84bdff67d3239f2ac3e38d4
SHA256c0b89f5d3cb4e60a098894ed1693d12c219c320d184a01d40c2e0f8889045f7e
SHA5125816b66169f064acd0381b814dda8b332acfaa3f71b372277926de1de98e542e6bb8eab458dc2aa00cbf12585d67a188e8c8f1fb3a1da82d4218581f1702743e
-
Filesize
459KB
MD50fc898238d5a4c1697233b8cdb0253a1
SHA1c24f971a60616807d84bdff67d3239f2ac3e38d4
SHA256c0b89f5d3cb4e60a098894ed1693d12c219c320d184a01d40c2e0f8889045f7e
SHA5125816b66169f064acd0381b814dda8b332acfaa3f71b372277926de1de98e542e6bb8eab458dc2aa00cbf12585d67a188e8c8f1fb3a1da82d4218581f1702743e
-
Filesize
459KB
MD50fc898238d5a4c1697233b8cdb0253a1
SHA1c24f971a60616807d84bdff67d3239f2ac3e38d4
SHA256c0b89f5d3cb4e60a098894ed1693d12c219c320d184a01d40c2e0f8889045f7e
SHA5125816b66169f064acd0381b814dda8b332acfaa3f71b372277926de1de98e542e6bb8eab458dc2aa00cbf12585d67a188e8c8f1fb3a1da82d4218581f1702743e
-
Filesize
592KB
MD5205a0c856df970ecf2ea9a9c0c489bdd
SHA1ec250a3a259e4a22edf0496b61c85c3845799ef5
SHA256a760c63645e5a762ec5e3d8eb259a27742b2531e1364feb81ae4c6ef9e72f688
SHA51217708eebd4a721b87a03a245c8916d8e6c69a8244830cdfc512f5e96630045a7c9d2d94300fb7b45f1a8e898a71d0735c5eb4feac55a554ef0907853dcfc3105
-
Filesize
592KB
MD5205a0c856df970ecf2ea9a9c0c489bdd
SHA1ec250a3a259e4a22edf0496b61c85c3845799ef5
SHA256a760c63645e5a762ec5e3d8eb259a27742b2531e1364feb81ae4c6ef9e72f688
SHA51217708eebd4a721b87a03a245c8916d8e6c69a8244830cdfc512f5e96630045a7c9d2d94300fb7b45f1a8e898a71d0735c5eb4feac55a554ef0907853dcfc3105
-
Filesize
377KB
MD561e94129e08d547a1e7571adda58582c
SHA1a0e9018b2aa635724d9351281be631897d40d2b1
SHA25670eb178156697695b8d6ddbb64c772ac34f166a5de5b6b5d262f1e9f022d5666
SHA5125b7036739cc714139baa22620a8e49ff743742bb065293ac9e5a0a88c447efa7c9bccd8d092d35663af1f5246e485be0e4398d4adbc153066f307e866b534864
-
Filesize
377KB
MD561e94129e08d547a1e7571adda58582c
SHA1a0e9018b2aa635724d9351281be631897d40d2b1
SHA25670eb178156697695b8d6ddbb64c772ac34f166a5de5b6b5d262f1e9f022d5666
SHA5125b7036739cc714139baa22620a8e49ff743742bb065293ac9e5a0a88c447efa7c9bccd8d092d35663af1f5246e485be0e4398d4adbc153066f307e866b534864
-
Filesize
377KB
MD561e94129e08d547a1e7571adda58582c
SHA1a0e9018b2aa635724d9351281be631897d40d2b1
SHA25670eb178156697695b8d6ddbb64c772ac34f166a5de5b6b5d262f1e9f022d5666
SHA5125b7036739cc714139baa22620a8e49ff743742bb065293ac9e5a0a88c447efa7c9bccd8d092d35663af1f5246e485be0e4398d4adbc153066f307e866b534864
-
Filesize
459KB
MD50fc898238d5a4c1697233b8cdb0253a1
SHA1c24f971a60616807d84bdff67d3239f2ac3e38d4
SHA256c0b89f5d3cb4e60a098894ed1693d12c219c320d184a01d40c2e0f8889045f7e
SHA5125816b66169f064acd0381b814dda8b332acfaa3f71b372277926de1de98e542e6bb8eab458dc2aa00cbf12585d67a188e8c8f1fb3a1da82d4218581f1702743e
-
Filesize
459KB
MD50fc898238d5a4c1697233b8cdb0253a1
SHA1c24f971a60616807d84bdff67d3239f2ac3e38d4
SHA256c0b89f5d3cb4e60a098894ed1693d12c219c320d184a01d40c2e0f8889045f7e
SHA5125816b66169f064acd0381b814dda8b332acfaa3f71b372277926de1de98e542e6bb8eab458dc2aa00cbf12585d67a188e8c8f1fb3a1da82d4218581f1702743e
-
Filesize
459KB
MD50fc898238d5a4c1697233b8cdb0253a1
SHA1c24f971a60616807d84bdff67d3239f2ac3e38d4
SHA256c0b89f5d3cb4e60a098894ed1693d12c219c320d184a01d40c2e0f8889045f7e
SHA5125816b66169f064acd0381b814dda8b332acfaa3f71b372277926de1de98e542e6bb8eab458dc2aa00cbf12585d67a188e8c8f1fb3a1da82d4218581f1702743e