Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe
Resource
win10v2004-20230220-en
General
-
Target
d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe
-
Size
694KB
-
MD5
8a8122ccfbbe6b84993eacc02f2e869a
-
SHA1
22caaac571fc26bc41aa3c67b7cde40c3b5b7f8a
-
SHA256
d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967
-
SHA512
e0a395b0c952888a19e6fd097e8dbad095afff943f75a66d25509e2eb2bd0160fee6ddfc9d10d54775dd5791f9ecad185fdc5b035da5fcbbf3598913a387092f
-
SSDEEP
12288:Zy90NHV/IWmkIROabfLMv28gHN1sCfqQP1UR5vleu2Kn32sboip:ZywJHAOabjMvDgHNeQP1URWKnpbn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 76303925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 76303925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 76303925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 76303925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 76303925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 76303925.exe -
Executes dropped EXE 3 IoCs
pid Process 1224 un041867.exe 1844 76303925.exe 1744 rk402584.exe -
Loads dropped DLL 8 IoCs
pid Process 1660 d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe 1224 un041867.exe 1224 un041867.exe 1224 un041867.exe 1844 76303925.exe 1224 un041867.exe 1224 un041867.exe 1744 rk402584.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 76303925.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 76303925.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un041867.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un041867.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1844 76303925.exe 1844 76303925.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1844 76303925.exe Token: SeDebugPrivilege 1744 rk402584.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1224 1660 d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe 27 PID 1660 wrote to memory of 1224 1660 d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe 27 PID 1660 wrote to memory of 1224 1660 d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe 27 PID 1660 wrote to memory of 1224 1660 d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe 27 PID 1660 wrote to memory of 1224 1660 d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe 27 PID 1660 wrote to memory of 1224 1660 d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe 27 PID 1660 wrote to memory of 1224 1660 d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe 27 PID 1224 wrote to memory of 1844 1224 un041867.exe 28 PID 1224 wrote to memory of 1844 1224 un041867.exe 28 PID 1224 wrote to memory of 1844 1224 un041867.exe 28 PID 1224 wrote to memory of 1844 1224 un041867.exe 28 PID 1224 wrote to memory of 1844 1224 un041867.exe 28 PID 1224 wrote to memory of 1844 1224 un041867.exe 28 PID 1224 wrote to memory of 1844 1224 un041867.exe 28 PID 1224 wrote to memory of 1744 1224 un041867.exe 29 PID 1224 wrote to memory of 1744 1224 un041867.exe 29 PID 1224 wrote to memory of 1744 1224 un041867.exe 29 PID 1224 wrote to memory of 1744 1224 un041867.exe 29 PID 1224 wrote to memory of 1744 1224 un041867.exe 29 PID 1224 wrote to memory of 1744 1224 un041867.exe 29 PID 1224 wrote to memory of 1744 1224 un041867.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe"C:\Users\Admin\AppData\Local\Temp\d879c5b03589adc71ba517fc5a7c7d2aeee2c841a32ef09c9ae9e7ab7e755967.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un041867.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un041867.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\76303925.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\76303925.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk402584.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk402584.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD5e7b44ce7b6deae8f1c540d7e4c04a810
SHA1a511872ca478cd855b1c0194fc65f51228f790f7
SHA2563caafc7cb121d2f4a6aab3fb0a48496fdda7cee05c744c724974f66466e6a62b
SHA512d391246bf2fd7621cbaf886dc09f9343f4fde71064d5de66d6d608da7765161af5af4803782909b226679f6936e62f5375d61e2a623c557f132f6c91d027593e
-
Filesize
541KB
MD5e7b44ce7b6deae8f1c540d7e4c04a810
SHA1a511872ca478cd855b1c0194fc65f51228f790f7
SHA2563caafc7cb121d2f4a6aab3fb0a48496fdda7cee05c744c724974f66466e6a62b
SHA512d391246bf2fd7621cbaf886dc09f9343f4fde71064d5de66d6d608da7765161af5af4803782909b226679f6936e62f5375d61e2a623c557f132f6c91d027593e
-
Filesize
257KB
MD55e78272f648054f2dc61e06b3b295b48
SHA13d602357159dc2ff1c16d10d2464ba5a3cd1a8c9
SHA256b6169040f38b7c49c63f68e994ef7c656a0b9684468561338484a059293c74c8
SHA51250f1aa3eafcf6f7f4ed541c6542feef4046a8de6451e96083151cb25c831914a5f046ad350e9c40ca4d5556919ad36211d53c545daa8a7e640f3acbb5d8f1f97
-
Filesize
257KB
MD55e78272f648054f2dc61e06b3b295b48
SHA13d602357159dc2ff1c16d10d2464ba5a3cd1a8c9
SHA256b6169040f38b7c49c63f68e994ef7c656a0b9684468561338484a059293c74c8
SHA51250f1aa3eafcf6f7f4ed541c6542feef4046a8de6451e96083151cb25c831914a5f046ad350e9c40ca4d5556919ad36211d53c545daa8a7e640f3acbb5d8f1f97
-
Filesize
257KB
MD55e78272f648054f2dc61e06b3b295b48
SHA13d602357159dc2ff1c16d10d2464ba5a3cd1a8c9
SHA256b6169040f38b7c49c63f68e994ef7c656a0b9684468561338484a059293c74c8
SHA51250f1aa3eafcf6f7f4ed541c6542feef4046a8de6451e96083151cb25c831914a5f046ad350e9c40ca4d5556919ad36211d53c545daa8a7e640f3acbb5d8f1f97
-
Filesize
340KB
MD52de61161cfc62dd49049deac443338d6
SHA12de88e3c6857c9f8c08dba3c3bd06135069de087
SHA256820e43a5879a2b02c3ac5c6f65f2b7b37d78e8e13ad1a5c0d31162f56731d6aa
SHA512d95163930e3938c2b72d9f51de2f5a8de2a9490edc3b46a096e3535a845df47e92dc76b8ec856c14137492a5b8b177ce2e615a461b8f517b1e312b93806e8d18
-
Filesize
340KB
MD52de61161cfc62dd49049deac443338d6
SHA12de88e3c6857c9f8c08dba3c3bd06135069de087
SHA256820e43a5879a2b02c3ac5c6f65f2b7b37d78e8e13ad1a5c0d31162f56731d6aa
SHA512d95163930e3938c2b72d9f51de2f5a8de2a9490edc3b46a096e3535a845df47e92dc76b8ec856c14137492a5b8b177ce2e615a461b8f517b1e312b93806e8d18
-
Filesize
340KB
MD52de61161cfc62dd49049deac443338d6
SHA12de88e3c6857c9f8c08dba3c3bd06135069de087
SHA256820e43a5879a2b02c3ac5c6f65f2b7b37d78e8e13ad1a5c0d31162f56731d6aa
SHA512d95163930e3938c2b72d9f51de2f5a8de2a9490edc3b46a096e3535a845df47e92dc76b8ec856c14137492a5b8b177ce2e615a461b8f517b1e312b93806e8d18
-
Filesize
541KB
MD5e7b44ce7b6deae8f1c540d7e4c04a810
SHA1a511872ca478cd855b1c0194fc65f51228f790f7
SHA2563caafc7cb121d2f4a6aab3fb0a48496fdda7cee05c744c724974f66466e6a62b
SHA512d391246bf2fd7621cbaf886dc09f9343f4fde71064d5de66d6d608da7765161af5af4803782909b226679f6936e62f5375d61e2a623c557f132f6c91d027593e
-
Filesize
541KB
MD5e7b44ce7b6deae8f1c540d7e4c04a810
SHA1a511872ca478cd855b1c0194fc65f51228f790f7
SHA2563caafc7cb121d2f4a6aab3fb0a48496fdda7cee05c744c724974f66466e6a62b
SHA512d391246bf2fd7621cbaf886dc09f9343f4fde71064d5de66d6d608da7765161af5af4803782909b226679f6936e62f5375d61e2a623c557f132f6c91d027593e
-
Filesize
257KB
MD55e78272f648054f2dc61e06b3b295b48
SHA13d602357159dc2ff1c16d10d2464ba5a3cd1a8c9
SHA256b6169040f38b7c49c63f68e994ef7c656a0b9684468561338484a059293c74c8
SHA51250f1aa3eafcf6f7f4ed541c6542feef4046a8de6451e96083151cb25c831914a5f046ad350e9c40ca4d5556919ad36211d53c545daa8a7e640f3acbb5d8f1f97
-
Filesize
257KB
MD55e78272f648054f2dc61e06b3b295b48
SHA13d602357159dc2ff1c16d10d2464ba5a3cd1a8c9
SHA256b6169040f38b7c49c63f68e994ef7c656a0b9684468561338484a059293c74c8
SHA51250f1aa3eafcf6f7f4ed541c6542feef4046a8de6451e96083151cb25c831914a5f046ad350e9c40ca4d5556919ad36211d53c545daa8a7e640f3acbb5d8f1f97
-
Filesize
257KB
MD55e78272f648054f2dc61e06b3b295b48
SHA13d602357159dc2ff1c16d10d2464ba5a3cd1a8c9
SHA256b6169040f38b7c49c63f68e994ef7c656a0b9684468561338484a059293c74c8
SHA51250f1aa3eafcf6f7f4ed541c6542feef4046a8de6451e96083151cb25c831914a5f046ad350e9c40ca4d5556919ad36211d53c545daa8a7e640f3acbb5d8f1f97
-
Filesize
340KB
MD52de61161cfc62dd49049deac443338d6
SHA12de88e3c6857c9f8c08dba3c3bd06135069de087
SHA256820e43a5879a2b02c3ac5c6f65f2b7b37d78e8e13ad1a5c0d31162f56731d6aa
SHA512d95163930e3938c2b72d9f51de2f5a8de2a9490edc3b46a096e3535a845df47e92dc76b8ec856c14137492a5b8b177ce2e615a461b8f517b1e312b93806e8d18
-
Filesize
340KB
MD52de61161cfc62dd49049deac443338d6
SHA12de88e3c6857c9f8c08dba3c3bd06135069de087
SHA256820e43a5879a2b02c3ac5c6f65f2b7b37d78e8e13ad1a5c0d31162f56731d6aa
SHA512d95163930e3938c2b72d9f51de2f5a8de2a9490edc3b46a096e3535a845df47e92dc76b8ec856c14137492a5b8b177ce2e615a461b8f517b1e312b93806e8d18
-
Filesize
340KB
MD52de61161cfc62dd49049deac443338d6
SHA12de88e3c6857c9f8c08dba3c3bd06135069de087
SHA256820e43a5879a2b02c3ac5c6f65f2b7b37d78e8e13ad1a5c0d31162f56731d6aa
SHA512d95163930e3938c2b72d9f51de2f5a8de2a9490edc3b46a096e3535a845df47e92dc76b8ec856c14137492a5b8b177ce2e615a461b8f517b1e312b93806e8d18