Analysis
-
max time kernel
255s -
max time network
368s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe
Resource
win10v2004-20230220-en
General
-
Target
e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe
-
Size
612KB
-
MD5
9413dd2b2313407eedcc42a372119b9c
-
SHA1
14ce13746d1460c983fc553fd720f07b40bba635
-
SHA256
e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a
-
SHA512
f818c336403200b093404dd33dc9529d5e09ecda9d15c97fbabaed4cf382f18082a9db04f7c083272afc3ec27f04511dbe44ff21c51bb2f63107c2cc493d33f0
-
SSDEEP
12288:Ky90Ns/5SIY+gcQB1A97x1ITQ6c5nZGTb+Y9z36IZ2w:KybEJMQBaV8aNZ06Y9jZh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 32875168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 32875168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 32875168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 32875168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 32875168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 32875168.exe -
Executes dropped EXE 3 IoCs
pid Process 1152 st332708.exe 1764 32875168.exe 872 kp917265.exe -
Loads dropped DLL 6 IoCs
pid Process 520 e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe 1152 st332708.exe 1152 st332708.exe 1152 st332708.exe 1152 st332708.exe 872 kp917265.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 32875168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 32875168.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st332708.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st332708.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1764 32875168.exe 1764 32875168.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1764 32875168.exe Token: SeDebugPrivilege 872 kp917265.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 520 wrote to memory of 1152 520 e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe 28 PID 520 wrote to memory of 1152 520 e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe 28 PID 520 wrote to memory of 1152 520 e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe 28 PID 520 wrote to memory of 1152 520 e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe 28 PID 520 wrote to memory of 1152 520 e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe 28 PID 520 wrote to memory of 1152 520 e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe 28 PID 520 wrote to memory of 1152 520 e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe 28 PID 1152 wrote to memory of 1764 1152 st332708.exe 29 PID 1152 wrote to memory of 1764 1152 st332708.exe 29 PID 1152 wrote to memory of 1764 1152 st332708.exe 29 PID 1152 wrote to memory of 1764 1152 st332708.exe 29 PID 1152 wrote to memory of 1764 1152 st332708.exe 29 PID 1152 wrote to memory of 1764 1152 st332708.exe 29 PID 1152 wrote to memory of 1764 1152 st332708.exe 29 PID 1152 wrote to memory of 872 1152 st332708.exe 30 PID 1152 wrote to memory of 872 1152 st332708.exe 30 PID 1152 wrote to memory of 872 1152 st332708.exe 30 PID 1152 wrote to memory of 872 1152 st332708.exe 30 PID 1152 wrote to memory of 872 1152 st332708.exe 30 PID 1152 wrote to memory of 872 1152 st332708.exe 30 PID 1152 wrote to memory of 872 1152 st332708.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe"C:\Users\Admin\AppData\Local\Temp\e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st332708.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st332708.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32875168.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32875168.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp917265.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp917265.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD5da9e845b6d7280e684683514788cf735
SHA1dd1eed4320136e2ab2a1414d57567faabd26efcf
SHA256e37df1b57312cf3197fe9925a16f7efdbb027c26772f3a0ec3644df25dbee5b6
SHA512715194ab831ba7d5b1c41724e11e4dbe323d0d22b5294ab2ced7336bf833861411a028ea766d83fb0a0c10d95b114f9eed456f4fcf298b64373f22713bbf5d9d
-
Filesize
457KB
MD5da9e845b6d7280e684683514788cf735
SHA1dd1eed4320136e2ab2a1414d57567faabd26efcf
SHA256e37df1b57312cf3197fe9925a16f7efdbb027c26772f3a0ec3644df25dbee5b6
SHA512715194ab831ba7d5b1c41724e11e4dbe323d0d22b5294ab2ced7336bf833861411a028ea766d83fb0a0c10d95b114f9eed456f4fcf298b64373f22713bbf5d9d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD5438ffffe82c0fc7df798f227a856f09d
SHA1c9ddbab8a12dd94758186293871c8a96f4ea86cd
SHA25674596788dbe7840ab48714e0ac6cdb34be9b4577808e2f85c213f33d0e93d2bb
SHA512ecabb05652a63b991ec8a85438d356630327f6f09a70340cc6ca27c176cb604830dde79bac978236f4f82b63707cbbbeba268c214ea53e2b1fd24b5170ed3007
-
Filesize
459KB
MD5438ffffe82c0fc7df798f227a856f09d
SHA1c9ddbab8a12dd94758186293871c8a96f4ea86cd
SHA25674596788dbe7840ab48714e0ac6cdb34be9b4577808e2f85c213f33d0e93d2bb
SHA512ecabb05652a63b991ec8a85438d356630327f6f09a70340cc6ca27c176cb604830dde79bac978236f4f82b63707cbbbeba268c214ea53e2b1fd24b5170ed3007
-
Filesize
459KB
MD5438ffffe82c0fc7df798f227a856f09d
SHA1c9ddbab8a12dd94758186293871c8a96f4ea86cd
SHA25674596788dbe7840ab48714e0ac6cdb34be9b4577808e2f85c213f33d0e93d2bb
SHA512ecabb05652a63b991ec8a85438d356630327f6f09a70340cc6ca27c176cb604830dde79bac978236f4f82b63707cbbbeba268c214ea53e2b1fd24b5170ed3007
-
Filesize
457KB
MD5da9e845b6d7280e684683514788cf735
SHA1dd1eed4320136e2ab2a1414d57567faabd26efcf
SHA256e37df1b57312cf3197fe9925a16f7efdbb027c26772f3a0ec3644df25dbee5b6
SHA512715194ab831ba7d5b1c41724e11e4dbe323d0d22b5294ab2ced7336bf833861411a028ea766d83fb0a0c10d95b114f9eed456f4fcf298b64373f22713bbf5d9d
-
Filesize
457KB
MD5da9e845b6d7280e684683514788cf735
SHA1dd1eed4320136e2ab2a1414d57567faabd26efcf
SHA256e37df1b57312cf3197fe9925a16f7efdbb027c26772f3a0ec3644df25dbee5b6
SHA512715194ab831ba7d5b1c41724e11e4dbe323d0d22b5294ab2ced7336bf833861411a028ea766d83fb0a0c10d95b114f9eed456f4fcf298b64373f22713bbf5d9d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD5438ffffe82c0fc7df798f227a856f09d
SHA1c9ddbab8a12dd94758186293871c8a96f4ea86cd
SHA25674596788dbe7840ab48714e0ac6cdb34be9b4577808e2f85c213f33d0e93d2bb
SHA512ecabb05652a63b991ec8a85438d356630327f6f09a70340cc6ca27c176cb604830dde79bac978236f4f82b63707cbbbeba268c214ea53e2b1fd24b5170ed3007
-
Filesize
459KB
MD5438ffffe82c0fc7df798f227a856f09d
SHA1c9ddbab8a12dd94758186293871c8a96f4ea86cd
SHA25674596788dbe7840ab48714e0ac6cdb34be9b4577808e2f85c213f33d0e93d2bb
SHA512ecabb05652a63b991ec8a85438d356630327f6f09a70340cc6ca27c176cb604830dde79bac978236f4f82b63707cbbbeba268c214ea53e2b1fd24b5170ed3007
-
Filesize
459KB
MD5438ffffe82c0fc7df798f227a856f09d
SHA1c9ddbab8a12dd94758186293871c8a96f4ea86cd
SHA25674596788dbe7840ab48714e0ac6cdb34be9b4577808e2f85c213f33d0e93d2bb
SHA512ecabb05652a63b991ec8a85438d356630327f6f09a70340cc6ca27c176cb604830dde79bac978236f4f82b63707cbbbeba268c214ea53e2b1fd24b5170ed3007