Analysis
-
max time kernel
183s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe
Resource
win10v2004-20230220-en
General
-
Target
d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe
-
Size
651KB
-
MD5
057b70af8da7492eb2c36f19ab68f99e
-
SHA1
b9ac51c4f5f4b57f91d41edab1f5057965636328
-
SHA256
d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15
-
SHA512
8d396a44d7ee3d374afe39d962f25c5f95e1b305ca64b94aea47e6203b9b03c7d624511cd89192c9974942f48b9a913194dbef9991b7d462ff549b81da341d92
-
SSDEEP
12288:6y90BLYEQyE+DLVDrFPBaTgJPOEDf0ZBD2VmQ3nfTHfRZ57r:6y6YETlLBFPBZXUx2V53nfdL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 78350286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 78350286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 78350286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 78350286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 78350286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 78350286.exe -
Executes dropped EXE 3 IoCs
pid Process 380 st171843.exe 1492 78350286.exe 1556 kp964940.exe -
Loads dropped DLL 7 IoCs
pid Process 1324 d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe 380 st171843.exe 380 st171843.exe 1492 78350286.exe 380 st171843.exe 380 st171843.exe 1556 kp964940.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 78350286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 78350286.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st171843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st171843.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1492 78350286.exe 1492 78350286.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1492 78350286.exe Token: SeDebugPrivilege 1556 kp964940.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1324 wrote to memory of 380 1324 d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe 28 PID 1324 wrote to memory of 380 1324 d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe 28 PID 1324 wrote to memory of 380 1324 d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe 28 PID 1324 wrote to memory of 380 1324 d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe 28 PID 1324 wrote to memory of 380 1324 d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe 28 PID 1324 wrote to memory of 380 1324 d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe 28 PID 1324 wrote to memory of 380 1324 d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe 28 PID 380 wrote to memory of 1492 380 st171843.exe 29 PID 380 wrote to memory of 1492 380 st171843.exe 29 PID 380 wrote to memory of 1492 380 st171843.exe 29 PID 380 wrote to memory of 1492 380 st171843.exe 29 PID 380 wrote to memory of 1492 380 st171843.exe 29 PID 380 wrote to memory of 1492 380 st171843.exe 29 PID 380 wrote to memory of 1492 380 st171843.exe 29 PID 380 wrote to memory of 1556 380 st171843.exe 30 PID 380 wrote to memory of 1556 380 st171843.exe 30 PID 380 wrote to memory of 1556 380 st171843.exe 30 PID 380 wrote to memory of 1556 380 st171843.exe 30 PID 380 wrote to memory of 1556 380 st171843.exe 30 PID 380 wrote to memory of 1556 380 st171843.exe 30 PID 380 wrote to memory of 1556 380 st171843.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe"C:\Users\Admin\AppData\Local\Temp\d50b4befe429eb010064c39ee5927919d36e53b3bce99b955d6e8fed09276e15.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st171843.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st171843.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78350286.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78350286.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp964940.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp964940.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD53dc9c28d9ea34e5759939986b4b1f5fa
SHA15cc3004398bcaeb7379f161774ff284f70eeb050
SHA2567688fee246e732db9a24db6e9f205076c699801cac33f1e46c1250182892f1e9
SHA512423d56f5d4a812f45252ecbf4e7ef85283cbaff92c079f9cc35b1e305c79fdc60dfeb77adbfa2b778784036f6ede9e111731740970ed413ad0fd1cca6379ef94
-
Filesize
497KB
MD53dc9c28d9ea34e5759939986b4b1f5fa
SHA15cc3004398bcaeb7379f161774ff284f70eeb050
SHA2567688fee246e732db9a24db6e9f205076c699801cac33f1e46c1250182892f1e9
SHA512423d56f5d4a812f45252ecbf4e7ef85283cbaff92c079f9cc35b1e305c79fdc60dfeb77adbfa2b778784036f6ede9e111731740970ed413ad0fd1cca6379ef94
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
341KB
MD5d24aeb48aed062684a59ad2074813fb5
SHA10f7ed8d02af2331c239918c5adab6eb1f9498df3
SHA2567f3f2a16b80b228437c6cbed543ebeba2d94c693df428a417aae6dfacfbec886
SHA5129390451698e4bd703c780d37916429998670447a02be343d8efcd2a16e7847181a238e0591f61d25eb0e7fb99a89da814d5ac38e96aaed7c22cd9e0a85083739
-
Filesize
341KB
MD5d24aeb48aed062684a59ad2074813fb5
SHA10f7ed8d02af2331c239918c5adab6eb1f9498df3
SHA2567f3f2a16b80b228437c6cbed543ebeba2d94c693df428a417aae6dfacfbec886
SHA5129390451698e4bd703c780d37916429998670447a02be343d8efcd2a16e7847181a238e0591f61d25eb0e7fb99a89da814d5ac38e96aaed7c22cd9e0a85083739
-
Filesize
341KB
MD5d24aeb48aed062684a59ad2074813fb5
SHA10f7ed8d02af2331c239918c5adab6eb1f9498df3
SHA2567f3f2a16b80b228437c6cbed543ebeba2d94c693df428a417aae6dfacfbec886
SHA5129390451698e4bd703c780d37916429998670447a02be343d8efcd2a16e7847181a238e0591f61d25eb0e7fb99a89da814d5ac38e96aaed7c22cd9e0a85083739
-
Filesize
497KB
MD53dc9c28d9ea34e5759939986b4b1f5fa
SHA15cc3004398bcaeb7379f161774ff284f70eeb050
SHA2567688fee246e732db9a24db6e9f205076c699801cac33f1e46c1250182892f1e9
SHA512423d56f5d4a812f45252ecbf4e7ef85283cbaff92c079f9cc35b1e305c79fdc60dfeb77adbfa2b778784036f6ede9e111731740970ed413ad0fd1cca6379ef94
-
Filesize
497KB
MD53dc9c28d9ea34e5759939986b4b1f5fa
SHA15cc3004398bcaeb7379f161774ff284f70eeb050
SHA2567688fee246e732db9a24db6e9f205076c699801cac33f1e46c1250182892f1e9
SHA512423d56f5d4a812f45252ecbf4e7ef85283cbaff92c079f9cc35b1e305c79fdc60dfeb77adbfa2b778784036f6ede9e111731740970ed413ad0fd1cca6379ef94
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
341KB
MD5d24aeb48aed062684a59ad2074813fb5
SHA10f7ed8d02af2331c239918c5adab6eb1f9498df3
SHA2567f3f2a16b80b228437c6cbed543ebeba2d94c693df428a417aae6dfacfbec886
SHA5129390451698e4bd703c780d37916429998670447a02be343d8efcd2a16e7847181a238e0591f61d25eb0e7fb99a89da814d5ac38e96aaed7c22cd9e0a85083739
-
Filesize
341KB
MD5d24aeb48aed062684a59ad2074813fb5
SHA10f7ed8d02af2331c239918c5adab6eb1f9498df3
SHA2567f3f2a16b80b228437c6cbed543ebeba2d94c693df428a417aae6dfacfbec886
SHA5129390451698e4bd703c780d37916429998670447a02be343d8efcd2a16e7847181a238e0591f61d25eb0e7fb99a89da814d5ac38e96aaed7c22cd9e0a85083739
-
Filesize
341KB
MD5d24aeb48aed062684a59ad2074813fb5
SHA10f7ed8d02af2331c239918c5adab6eb1f9498df3
SHA2567f3f2a16b80b228437c6cbed543ebeba2d94c693df428a417aae6dfacfbec886
SHA5129390451698e4bd703c780d37916429998670447a02be343d8efcd2a16e7847181a238e0591f61d25eb0e7fb99a89da814d5ac38e96aaed7c22cd9e0a85083739