Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
dd08112ba8942c14db848019368ed40d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dd08112ba8942c14db848019368ed40d.exe
Resource
win10v2004-20230220-en
General
-
Target
dd08112ba8942c14db848019368ed40d.exe
-
Size
696KB
-
MD5
dd08112ba8942c14db848019368ed40d
-
SHA1
2db5fdb287e16201a4d7612e5593acffff0a0848
-
SHA256
101e6d28a5cb1216e2700a4236cb81df4a7e422e404c80bfb86462bdfef78ba9
-
SHA512
7287a333f257190d4b1d1948671fbb3d76051209fce222d46d137bbac38f650ae2251f945415234cd8b1ce64e7f14b3a9529664887ec2c8fa293b60a9337cb6c
-
SSDEEP
12288:ty904sMhGxdVU0uugGGx/qsvi8NU15z/kkxW6Yn0:tyi9wNDBqs68Ni5z/kK/Yn0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 97782074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 97782074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 97782074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 97782074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 97782074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 97782074.exe -
Executes dropped EXE 3 IoCs
pid Process 2020 un737002.exe 1296 97782074.exe 900 rk680629.exe -
Loads dropped DLL 8 IoCs
pid Process 1148 dd08112ba8942c14db848019368ed40d.exe 2020 un737002.exe 2020 un737002.exe 2020 un737002.exe 1296 97782074.exe 2020 un737002.exe 2020 un737002.exe 900 rk680629.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 97782074.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 97782074.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce dd08112ba8942c14db848019368ed40d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dd08112ba8942c14db848019368ed40d.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un737002.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un737002.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1296 97782074.exe 1296 97782074.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1296 97782074.exe Token: SeDebugPrivilege 900 rk680629.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2020 1148 dd08112ba8942c14db848019368ed40d.exe 28 PID 1148 wrote to memory of 2020 1148 dd08112ba8942c14db848019368ed40d.exe 28 PID 1148 wrote to memory of 2020 1148 dd08112ba8942c14db848019368ed40d.exe 28 PID 1148 wrote to memory of 2020 1148 dd08112ba8942c14db848019368ed40d.exe 28 PID 1148 wrote to memory of 2020 1148 dd08112ba8942c14db848019368ed40d.exe 28 PID 1148 wrote to memory of 2020 1148 dd08112ba8942c14db848019368ed40d.exe 28 PID 1148 wrote to memory of 2020 1148 dd08112ba8942c14db848019368ed40d.exe 28 PID 2020 wrote to memory of 1296 2020 un737002.exe 29 PID 2020 wrote to memory of 1296 2020 un737002.exe 29 PID 2020 wrote to memory of 1296 2020 un737002.exe 29 PID 2020 wrote to memory of 1296 2020 un737002.exe 29 PID 2020 wrote to memory of 1296 2020 un737002.exe 29 PID 2020 wrote to memory of 1296 2020 un737002.exe 29 PID 2020 wrote to memory of 1296 2020 un737002.exe 29 PID 2020 wrote to memory of 900 2020 un737002.exe 30 PID 2020 wrote to memory of 900 2020 un737002.exe 30 PID 2020 wrote to memory of 900 2020 un737002.exe 30 PID 2020 wrote to memory of 900 2020 un737002.exe 30 PID 2020 wrote to memory of 900 2020 un737002.exe 30 PID 2020 wrote to memory of 900 2020 un737002.exe 30 PID 2020 wrote to memory of 900 2020 un737002.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd08112ba8942c14db848019368ed40d.exe"C:\Users\Admin\AppData\Local\Temp\dd08112ba8942c14db848019368ed40d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un737002.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un737002.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97782074.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97782074.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680629.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680629.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
542KB
MD533ed1c1c974634369710a79f39fbcf7c
SHA113235a75e2e3c835e37b28d01f675c1f668ae3fc
SHA25603a1d70d56346a9145f854e2a615a0688a110a6aefbf9b907d57890361b73e79
SHA5125f87e96bbc50515dc0f2177d9e400a5f615776b53124666fb43b8715a9b88d7ca1b635b434c5f3d86800702e351f4700b1c87b09535e7507ad385afe24c129d9
-
Filesize
542KB
MD533ed1c1c974634369710a79f39fbcf7c
SHA113235a75e2e3c835e37b28d01f675c1f668ae3fc
SHA25603a1d70d56346a9145f854e2a615a0688a110a6aefbf9b907d57890361b73e79
SHA5125f87e96bbc50515dc0f2177d9e400a5f615776b53124666fb43b8715a9b88d7ca1b635b434c5f3d86800702e351f4700b1c87b09535e7507ad385afe24c129d9
-
Filesize
258KB
MD55c4441fa274f4e1338f5337f5dfe7610
SHA144e7a06668230575ffc14153712df3c341ceafe5
SHA256ad4b12e1eda665409c95a9f9120b5706258cdcb53590ce7e9b1ab6d7702dfc27
SHA512135ea509043f8215050c3d7d96701e85e6740cf697f14f24fbdb2c4309bd917ab930ea137141e0a8d1a14a28cd1fc364adfa7990f8c760c03e7a3e5f42d19481
-
Filesize
258KB
MD55c4441fa274f4e1338f5337f5dfe7610
SHA144e7a06668230575ffc14153712df3c341ceafe5
SHA256ad4b12e1eda665409c95a9f9120b5706258cdcb53590ce7e9b1ab6d7702dfc27
SHA512135ea509043f8215050c3d7d96701e85e6740cf697f14f24fbdb2c4309bd917ab930ea137141e0a8d1a14a28cd1fc364adfa7990f8c760c03e7a3e5f42d19481
-
Filesize
258KB
MD55c4441fa274f4e1338f5337f5dfe7610
SHA144e7a06668230575ffc14153712df3c341ceafe5
SHA256ad4b12e1eda665409c95a9f9120b5706258cdcb53590ce7e9b1ab6d7702dfc27
SHA512135ea509043f8215050c3d7d96701e85e6740cf697f14f24fbdb2c4309bd917ab930ea137141e0a8d1a14a28cd1fc364adfa7990f8c760c03e7a3e5f42d19481
-
Filesize
340KB
MD52755880412919bf5b1bb139a47efb455
SHA199666a60a44c82c33430caaad2507b3d9fd18a27
SHA256c0919163526f44e905a26d8bd85f21d9f7011c77baf5ae7cd2e29af6b12559cf
SHA51255c8fe0c4ab715accf8600374867db6cbf52df01164e86705743687a2b9d90968a0383e501c1650af781d9add039dec9563626d0df4673bd1a5ed3be322832a6
-
Filesize
340KB
MD52755880412919bf5b1bb139a47efb455
SHA199666a60a44c82c33430caaad2507b3d9fd18a27
SHA256c0919163526f44e905a26d8bd85f21d9f7011c77baf5ae7cd2e29af6b12559cf
SHA51255c8fe0c4ab715accf8600374867db6cbf52df01164e86705743687a2b9d90968a0383e501c1650af781d9add039dec9563626d0df4673bd1a5ed3be322832a6
-
Filesize
340KB
MD52755880412919bf5b1bb139a47efb455
SHA199666a60a44c82c33430caaad2507b3d9fd18a27
SHA256c0919163526f44e905a26d8bd85f21d9f7011c77baf5ae7cd2e29af6b12559cf
SHA51255c8fe0c4ab715accf8600374867db6cbf52df01164e86705743687a2b9d90968a0383e501c1650af781d9add039dec9563626d0df4673bd1a5ed3be322832a6
-
Filesize
542KB
MD533ed1c1c974634369710a79f39fbcf7c
SHA113235a75e2e3c835e37b28d01f675c1f668ae3fc
SHA25603a1d70d56346a9145f854e2a615a0688a110a6aefbf9b907d57890361b73e79
SHA5125f87e96bbc50515dc0f2177d9e400a5f615776b53124666fb43b8715a9b88d7ca1b635b434c5f3d86800702e351f4700b1c87b09535e7507ad385afe24c129d9
-
Filesize
542KB
MD533ed1c1c974634369710a79f39fbcf7c
SHA113235a75e2e3c835e37b28d01f675c1f668ae3fc
SHA25603a1d70d56346a9145f854e2a615a0688a110a6aefbf9b907d57890361b73e79
SHA5125f87e96bbc50515dc0f2177d9e400a5f615776b53124666fb43b8715a9b88d7ca1b635b434c5f3d86800702e351f4700b1c87b09535e7507ad385afe24c129d9
-
Filesize
258KB
MD55c4441fa274f4e1338f5337f5dfe7610
SHA144e7a06668230575ffc14153712df3c341ceafe5
SHA256ad4b12e1eda665409c95a9f9120b5706258cdcb53590ce7e9b1ab6d7702dfc27
SHA512135ea509043f8215050c3d7d96701e85e6740cf697f14f24fbdb2c4309bd917ab930ea137141e0a8d1a14a28cd1fc364adfa7990f8c760c03e7a3e5f42d19481
-
Filesize
258KB
MD55c4441fa274f4e1338f5337f5dfe7610
SHA144e7a06668230575ffc14153712df3c341ceafe5
SHA256ad4b12e1eda665409c95a9f9120b5706258cdcb53590ce7e9b1ab6d7702dfc27
SHA512135ea509043f8215050c3d7d96701e85e6740cf697f14f24fbdb2c4309bd917ab930ea137141e0a8d1a14a28cd1fc364adfa7990f8c760c03e7a3e5f42d19481
-
Filesize
258KB
MD55c4441fa274f4e1338f5337f5dfe7610
SHA144e7a06668230575ffc14153712df3c341ceafe5
SHA256ad4b12e1eda665409c95a9f9120b5706258cdcb53590ce7e9b1ab6d7702dfc27
SHA512135ea509043f8215050c3d7d96701e85e6740cf697f14f24fbdb2c4309bd917ab930ea137141e0a8d1a14a28cd1fc364adfa7990f8c760c03e7a3e5f42d19481
-
Filesize
340KB
MD52755880412919bf5b1bb139a47efb455
SHA199666a60a44c82c33430caaad2507b3d9fd18a27
SHA256c0919163526f44e905a26d8bd85f21d9f7011c77baf5ae7cd2e29af6b12559cf
SHA51255c8fe0c4ab715accf8600374867db6cbf52df01164e86705743687a2b9d90968a0383e501c1650af781d9add039dec9563626d0df4673bd1a5ed3be322832a6
-
Filesize
340KB
MD52755880412919bf5b1bb139a47efb455
SHA199666a60a44c82c33430caaad2507b3d9fd18a27
SHA256c0919163526f44e905a26d8bd85f21d9f7011c77baf5ae7cd2e29af6b12559cf
SHA51255c8fe0c4ab715accf8600374867db6cbf52df01164e86705743687a2b9d90968a0383e501c1650af781d9add039dec9563626d0df4673bd1a5ed3be322832a6
-
Filesize
340KB
MD52755880412919bf5b1bb139a47efb455
SHA199666a60a44c82c33430caaad2507b3d9fd18a27
SHA256c0919163526f44e905a26d8bd85f21d9f7011c77baf5ae7cd2e29af6b12559cf
SHA51255c8fe0c4ab715accf8600374867db6cbf52df01164e86705743687a2b9d90968a0383e501c1650af781d9add039dec9563626d0df4673bd1a5ed3be322832a6