Analysis
-
max time kernel
235s -
max time network
313s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe
Resource
win10v2004-20230220-en
General
-
Target
db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe
-
Size
564KB
-
MD5
722c2de706adc6d989dbe09982c3f62a
-
SHA1
92400654831d2d9ade105faa4585d72679b04edd
-
SHA256
db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825
-
SHA512
c3566f838a147b6077f2eeab97844bce98a28a79f21dfe4c1bfd740b044315ca11dc293e2b8cf47f8b5bba8fbef74dd15abf75ce9e60d1b5ea0d33ec9fc00ab6
-
SSDEEP
12288:Ry9042hevNAz5WwuAX8cpyDXbccrzjIlBzr01qJnMLG84yFmV:RyQwvOzuAXBMDLcSepI1qNQzsV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it171528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it171528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it171528.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it171528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it171528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it171528.exe -
Executes dropped EXE 3 IoCs
pid Process 1144 ziTj4619.exe 2020 it171528.exe 632 kp410977.exe -
Loads dropped DLL 6 IoCs
pid Process 892 db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe 1144 ziTj4619.exe 1144 ziTj4619.exe 1144 ziTj4619.exe 1144 ziTj4619.exe 632 kp410977.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features it171528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it171528.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziTj4619.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziTj4619.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2020 it171528.exe 2020 it171528.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2020 it171528.exe Token: SeDebugPrivilege 632 kp410977.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 892 wrote to memory of 1144 892 db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe 28 PID 892 wrote to memory of 1144 892 db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe 28 PID 892 wrote to memory of 1144 892 db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe 28 PID 892 wrote to memory of 1144 892 db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe 28 PID 892 wrote to memory of 1144 892 db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe 28 PID 892 wrote to memory of 1144 892 db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe 28 PID 892 wrote to memory of 1144 892 db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe 28 PID 1144 wrote to memory of 2020 1144 ziTj4619.exe 29 PID 1144 wrote to memory of 2020 1144 ziTj4619.exe 29 PID 1144 wrote to memory of 2020 1144 ziTj4619.exe 29 PID 1144 wrote to memory of 2020 1144 ziTj4619.exe 29 PID 1144 wrote to memory of 2020 1144 ziTj4619.exe 29 PID 1144 wrote to memory of 2020 1144 ziTj4619.exe 29 PID 1144 wrote to memory of 2020 1144 ziTj4619.exe 29 PID 1144 wrote to memory of 632 1144 ziTj4619.exe 30 PID 1144 wrote to memory of 632 1144 ziTj4619.exe 30 PID 1144 wrote to memory of 632 1144 ziTj4619.exe 30 PID 1144 wrote to memory of 632 1144 ziTj4619.exe 30 PID 1144 wrote to memory of 632 1144 ziTj4619.exe 30 PID 1144 wrote to memory of 632 1144 ziTj4619.exe 30 PID 1144 wrote to memory of 632 1144 ziTj4619.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe"C:\Users\Admin\AppData\Local\Temp\db74d6349395de3cbecd04292b7a9e136d1158981a8e472b13c9154612eac825.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTj4619.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTj4619.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it171528.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it171528.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp410977.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp410977.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD53839da63ac4b90fda3cf052820cdf8e0
SHA13d184f8162aa0888ca789eec33fcaf8f7078b0dc
SHA2563100e2c4dd85e0743a332cca5e24a61d204469d97aca1a83e9e6c2204e82535f
SHA5124e5b2931a92b4f6025173332be82b850955d836dbe84782f36ff98ece289018a0674f9b428f4caf719989854f5a102df2d1c1601b3014c1b014d0c50e2446fb3
-
Filesize
409KB
MD53839da63ac4b90fda3cf052820cdf8e0
SHA13d184f8162aa0888ca789eec33fcaf8f7078b0dc
SHA2563100e2c4dd85e0743a332cca5e24a61d204469d97aca1a83e9e6c2204e82535f
SHA5124e5b2931a92b4f6025173332be82b850955d836dbe84782f36ff98ece289018a0674f9b428f4caf719989854f5a102df2d1c1601b3014c1b014d0c50e2446fb3
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
361KB
MD5e68bec8c968c4abaf5a2dd336e1b6959
SHA1879223f26fed38fa354b7478f3dcb7b93f05753a
SHA25688c47d67c08bc655ad9a371ce8cdfdd848f1a3225d9cc479440d3d4e7cbe20be
SHA512efd5a2e26b5ef1ed7e0ea2fbd7246ed97c23d5c7eacd16adfbea37bf6e43ed53e72af45adfb538200e2a7bb84ea0d58ddd564f0240254adb1038263db890e99f
-
Filesize
361KB
MD5e68bec8c968c4abaf5a2dd336e1b6959
SHA1879223f26fed38fa354b7478f3dcb7b93f05753a
SHA25688c47d67c08bc655ad9a371ce8cdfdd848f1a3225d9cc479440d3d4e7cbe20be
SHA512efd5a2e26b5ef1ed7e0ea2fbd7246ed97c23d5c7eacd16adfbea37bf6e43ed53e72af45adfb538200e2a7bb84ea0d58ddd564f0240254adb1038263db890e99f
-
Filesize
361KB
MD5e68bec8c968c4abaf5a2dd336e1b6959
SHA1879223f26fed38fa354b7478f3dcb7b93f05753a
SHA25688c47d67c08bc655ad9a371ce8cdfdd848f1a3225d9cc479440d3d4e7cbe20be
SHA512efd5a2e26b5ef1ed7e0ea2fbd7246ed97c23d5c7eacd16adfbea37bf6e43ed53e72af45adfb538200e2a7bb84ea0d58ddd564f0240254adb1038263db890e99f
-
Filesize
409KB
MD53839da63ac4b90fda3cf052820cdf8e0
SHA13d184f8162aa0888ca789eec33fcaf8f7078b0dc
SHA2563100e2c4dd85e0743a332cca5e24a61d204469d97aca1a83e9e6c2204e82535f
SHA5124e5b2931a92b4f6025173332be82b850955d836dbe84782f36ff98ece289018a0674f9b428f4caf719989854f5a102df2d1c1601b3014c1b014d0c50e2446fb3
-
Filesize
409KB
MD53839da63ac4b90fda3cf052820cdf8e0
SHA13d184f8162aa0888ca789eec33fcaf8f7078b0dc
SHA2563100e2c4dd85e0743a332cca5e24a61d204469d97aca1a83e9e6c2204e82535f
SHA5124e5b2931a92b4f6025173332be82b850955d836dbe84782f36ff98ece289018a0674f9b428f4caf719989854f5a102df2d1c1601b3014c1b014d0c50e2446fb3
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
361KB
MD5e68bec8c968c4abaf5a2dd336e1b6959
SHA1879223f26fed38fa354b7478f3dcb7b93f05753a
SHA25688c47d67c08bc655ad9a371ce8cdfdd848f1a3225d9cc479440d3d4e7cbe20be
SHA512efd5a2e26b5ef1ed7e0ea2fbd7246ed97c23d5c7eacd16adfbea37bf6e43ed53e72af45adfb538200e2a7bb84ea0d58ddd564f0240254adb1038263db890e99f
-
Filesize
361KB
MD5e68bec8c968c4abaf5a2dd336e1b6959
SHA1879223f26fed38fa354b7478f3dcb7b93f05753a
SHA25688c47d67c08bc655ad9a371ce8cdfdd848f1a3225d9cc479440d3d4e7cbe20be
SHA512efd5a2e26b5ef1ed7e0ea2fbd7246ed97c23d5c7eacd16adfbea37bf6e43ed53e72af45adfb538200e2a7bb84ea0d58ddd564f0240254adb1038263db890e99f
-
Filesize
361KB
MD5e68bec8c968c4abaf5a2dd336e1b6959
SHA1879223f26fed38fa354b7478f3dcb7b93f05753a
SHA25688c47d67c08bc655ad9a371ce8cdfdd848f1a3225d9cc479440d3d4e7cbe20be
SHA512efd5a2e26b5ef1ed7e0ea2fbd7246ed97c23d5c7eacd16adfbea37bf6e43ed53e72af45adfb538200e2a7bb84ea0d58ddd564f0240254adb1038263db890e99f