Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe
Resource
win10v2004-20230220-en
General
-
Target
6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe
-
Size
479KB
-
MD5
ccfee014ff9b49a62f990f6e2196f9ce
-
SHA1
b4fbaa30a98c272d26d5f1e68e2dd6d99d57c0d0
-
SHA256
6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead
-
SHA512
86c56f71f466eb8f8339a185850d08ba30d9337b54e346ed23e2881777f30682186d624b4fa9f8f8b1a295d56f9c4997b05daa759c6aeebafec37294c6ba7fbf
-
SSDEEP
12288:uMryy90BXy08bpFiXpqvCW2fQbFjTPHzaKt:QycIpWm2w5PTft
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3725173.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k3725173.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3725173.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3725173.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3725173.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3725173.exe -
Executes dropped EXE 3 IoCs
pid Process 928 y2868330.exe 868 k3725173.exe 1280 l5468744.exe -
Loads dropped DLL 6 IoCs
pid Process 748 6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe 928 y2868330.exe 928 y2868330.exe 868 k3725173.exe 928 y2868330.exe 1280 l5468744.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k3725173.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3725173.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2868330.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2868330.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 868 k3725173.exe 868 k3725173.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 868 k3725173.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 748 wrote to memory of 928 748 6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe 26 PID 748 wrote to memory of 928 748 6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe 26 PID 748 wrote to memory of 928 748 6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe 26 PID 748 wrote to memory of 928 748 6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe 26 PID 748 wrote to memory of 928 748 6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe 26 PID 748 wrote to memory of 928 748 6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe 26 PID 748 wrote to memory of 928 748 6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe 26 PID 928 wrote to memory of 868 928 y2868330.exe 27 PID 928 wrote to memory of 868 928 y2868330.exe 27 PID 928 wrote to memory of 868 928 y2868330.exe 27 PID 928 wrote to memory of 868 928 y2868330.exe 27 PID 928 wrote to memory of 868 928 y2868330.exe 27 PID 928 wrote to memory of 868 928 y2868330.exe 27 PID 928 wrote to memory of 868 928 y2868330.exe 27 PID 928 wrote to memory of 1280 928 y2868330.exe 28 PID 928 wrote to memory of 1280 928 y2868330.exe 28 PID 928 wrote to memory of 1280 928 y2868330.exe 28 PID 928 wrote to memory of 1280 928 y2868330.exe 28 PID 928 wrote to memory of 1280 928 y2868330.exe 28 PID 928 wrote to memory of 1280 928 y2868330.exe 28 PID 928 wrote to memory of 1280 928 y2868330.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe"C:\Users\Admin\AppData\Local\Temp\6100e5a3792b1902505e979f6e1da44200f121d330fe6002f32034e68aeb5ead.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2868330.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2868330.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3725173.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3725173.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5468744.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5468744.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1280
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5d5899a8b13ded6a7e0257df840444f69
SHA10d5bfe9edef459f9bc33930c8f9ef130bdefd424
SHA25608695c480bd09de89648ab837f6e6bad34b39565e0d89a659456113db1d148e4
SHA5120f8ecd0bff71aa6d60d7eaed0a103126ca6609548576807867c77806c40837965f53ce0866f1f7c10fd5e1e2104e3c99af5faab8e9d898018f7c8a88c4045be3
-
Filesize
307KB
MD5d5899a8b13ded6a7e0257df840444f69
SHA10d5bfe9edef459f9bc33930c8f9ef130bdefd424
SHA25608695c480bd09de89648ab837f6e6bad34b39565e0d89a659456113db1d148e4
SHA5120f8ecd0bff71aa6d60d7eaed0a103126ca6609548576807867c77806c40837965f53ce0866f1f7c10fd5e1e2104e3c99af5faab8e9d898018f7c8a88c4045be3
-
Filesize
175KB
MD581d8e0822cd84309d6b3233d00730923
SHA14c57c2635e4ddd7b06233b2f82cb5499680d29e8
SHA2567bb994b3762467a81b712a65a62b64329b374d03149a0e65a0228a50021a32f9
SHA5126e1f6633507137b05f0a7e50ae94efc6559c0f516b61f6acb3997de290462685eafcad2d12d95b679f77aadf97bcfe6662339cb5d22266d2ad510e9dd3f8f267
-
Filesize
175KB
MD581d8e0822cd84309d6b3233d00730923
SHA14c57c2635e4ddd7b06233b2f82cb5499680d29e8
SHA2567bb994b3762467a81b712a65a62b64329b374d03149a0e65a0228a50021a32f9
SHA5126e1f6633507137b05f0a7e50ae94efc6559c0f516b61f6acb3997de290462685eafcad2d12d95b679f77aadf97bcfe6662339cb5d22266d2ad510e9dd3f8f267
-
Filesize
136KB
MD539a7bd63ce9b770e395b034ef887b79c
SHA1786767f2254bea4e4c50779dca2e2fe4366208aa
SHA2565f58f58a43da02d7fbbeea6923b5967c0907064391e8f6abcceee4130e39a8ca
SHA512f27e567a451b03fa470a2e4740150d102bc96498cbbff95d84e88b56bc8797c8a40cedf29d174383747e1f91dee8319de517ad7c221209f255f801636a6f2ca4
-
Filesize
136KB
MD539a7bd63ce9b770e395b034ef887b79c
SHA1786767f2254bea4e4c50779dca2e2fe4366208aa
SHA2565f58f58a43da02d7fbbeea6923b5967c0907064391e8f6abcceee4130e39a8ca
SHA512f27e567a451b03fa470a2e4740150d102bc96498cbbff95d84e88b56bc8797c8a40cedf29d174383747e1f91dee8319de517ad7c221209f255f801636a6f2ca4
-
Filesize
307KB
MD5d5899a8b13ded6a7e0257df840444f69
SHA10d5bfe9edef459f9bc33930c8f9ef130bdefd424
SHA25608695c480bd09de89648ab837f6e6bad34b39565e0d89a659456113db1d148e4
SHA5120f8ecd0bff71aa6d60d7eaed0a103126ca6609548576807867c77806c40837965f53ce0866f1f7c10fd5e1e2104e3c99af5faab8e9d898018f7c8a88c4045be3
-
Filesize
307KB
MD5d5899a8b13ded6a7e0257df840444f69
SHA10d5bfe9edef459f9bc33930c8f9ef130bdefd424
SHA25608695c480bd09de89648ab837f6e6bad34b39565e0d89a659456113db1d148e4
SHA5120f8ecd0bff71aa6d60d7eaed0a103126ca6609548576807867c77806c40837965f53ce0866f1f7c10fd5e1e2104e3c99af5faab8e9d898018f7c8a88c4045be3
-
Filesize
175KB
MD581d8e0822cd84309d6b3233d00730923
SHA14c57c2635e4ddd7b06233b2f82cb5499680d29e8
SHA2567bb994b3762467a81b712a65a62b64329b374d03149a0e65a0228a50021a32f9
SHA5126e1f6633507137b05f0a7e50ae94efc6559c0f516b61f6acb3997de290462685eafcad2d12d95b679f77aadf97bcfe6662339cb5d22266d2ad510e9dd3f8f267
-
Filesize
175KB
MD581d8e0822cd84309d6b3233d00730923
SHA14c57c2635e4ddd7b06233b2f82cb5499680d29e8
SHA2567bb994b3762467a81b712a65a62b64329b374d03149a0e65a0228a50021a32f9
SHA5126e1f6633507137b05f0a7e50ae94efc6559c0f516b61f6acb3997de290462685eafcad2d12d95b679f77aadf97bcfe6662339cb5d22266d2ad510e9dd3f8f267
-
Filesize
136KB
MD539a7bd63ce9b770e395b034ef887b79c
SHA1786767f2254bea4e4c50779dca2e2fe4366208aa
SHA2565f58f58a43da02d7fbbeea6923b5967c0907064391e8f6abcceee4130e39a8ca
SHA512f27e567a451b03fa470a2e4740150d102bc96498cbbff95d84e88b56bc8797c8a40cedf29d174383747e1f91dee8319de517ad7c221209f255f801636a6f2ca4
-
Filesize
136KB
MD539a7bd63ce9b770e395b034ef887b79c
SHA1786767f2254bea4e4c50779dca2e2fe4366208aa
SHA2565f58f58a43da02d7fbbeea6923b5967c0907064391e8f6abcceee4130e39a8ca
SHA512f27e567a451b03fa470a2e4740150d102bc96498cbbff95d84e88b56bc8797c8a40cedf29d174383747e1f91dee8319de517ad7c221209f255f801636a6f2ca4