Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe
Resource
win10v2004-20230220-en
General
-
Target
67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe
-
Size
563KB
-
MD5
2a56d4dc574313429b8cc406dfb1738a
-
SHA1
ceee502b7f7d07cbe284af29f42ecfa43cbb04c1
-
SHA256
67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f
-
SHA512
60397aed026b96183ff36fa3440b36af3472552f7354b61e194cd3ac7599f85203fbb95c76909bbd1c7d5212520301274ca3997ee6e06f55dc5c2ee4a0e7403d
-
SSDEEP
12288:ry90pBO5K98HT96/eyZvI0szd0mOz0M3qOW5L6jG:rykBOKLeyJ4WmOg4CAjG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it229709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it229709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it229709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it229709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it229709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it229709.exe -
Executes dropped EXE 3 IoCs
pid Process 1244 ziwV7919.exe 1040 it229709.exe 1488 kp106247.exe -
Loads dropped DLL 6 IoCs
pid Process 1396 67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe 1244 ziwV7919.exe 1244 ziwV7919.exe 1244 ziwV7919.exe 1244 ziwV7919.exe 1488 kp106247.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features it229709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it229709.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziwV7919.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziwV7919.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1040 it229709.exe 1040 it229709.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1040 it229709.exe Token: SeDebugPrivilege 1488 kp106247.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1244 1396 67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe 28 PID 1396 wrote to memory of 1244 1396 67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe 28 PID 1396 wrote to memory of 1244 1396 67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe 28 PID 1396 wrote to memory of 1244 1396 67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe 28 PID 1396 wrote to memory of 1244 1396 67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe 28 PID 1396 wrote to memory of 1244 1396 67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe 28 PID 1396 wrote to memory of 1244 1396 67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe 28 PID 1244 wrote to memory of 1040 1244 ziwV7919.exe 29 PID 1244 wrote to memory of 1040 1244 ziwV7919.exe 29 PID 1244 wrote to memory of 1040 1244 ziwV7919.exe 29 PID 1244 wrote to memory of 1040 1244 ziwV7919.exe 29 PID 1244 wrote to memory of 1040 1244 ziwV7919.exe 29 PID 1244 wrote to memory of 1040 1244 ziwV7919.exe 29 PID 1244 wrote to memory of 1040 1244 ziwV7919.exe 29 PID 1244 wrote to memory of 1488 1244 ziwV7919.exe 30 PID 1244 wrote to memory of 1488 1244 ziwV7919.exe 30 PID 1244 wrote to memory of 1488 1244 ziwV7919.exe 30 PID 1244 wrote to memory of 1488 1244 ziwV7919.exe 30 PID 1244 wrote to memory of 1488 1244 ziwV7919.exe 30 PID 1244 wrote to memory of 1488 1244 ziwV7919.exe 30 PID 1244 wrote to memory of 1488 1244 ziwV7919.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe"C:\Users\Admin\AppData\Local\Temp\67951056421c50d2532dc8a18406dc603a23a2ba6bc52cc1f80400ac1af0615f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV7919.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwV7919.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it229709.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it229709.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp106247.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp106247.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD539a55573830d5a25d55f2c3cfac9a7e3
SHA1ae1c4740ec0506281b4b5a50cdb67e48aa7b2f5c
SHA256bc73a08aa3853d0839c6d8edfa5da4811181911731c8ed1ee4f98ab7a721d6ec
SHA5129fdd4a05f52d8cb03668b122ddb58d1be178f8a0ce387d79a447ab3c8c37c92e37f217bff91ba2ea41a395c69634382a79aceda10bd99735c0a8e88c398535dc
-
Filesize
409KB
MD539a55573830d5a25d55f2c3cfac9a7e3
SHA1ae1c4740ec0506281b4b5a50cdb67e48aa7b2f5c
SHA256bc73a08aa3853d0839c6d8edfa5da4811181911731c8ed1ee4f98ab7a721d6ec
SHA5129fdd4a05f52d8cb03668b122ddb58d1be178f8a0ce387d79a447ab3c8c37c92e37f217bff91ba2ea41a395c69634382a79aceda10bd99735c0a8e88c398535dc
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
361KB
MD5dbc5d834e73322453234c664081b9bca
SHA1c652bf239c5b133dd1c776d95f8c6796db9a1568
SHA25699d2bf6ed597d31cb28de90267d1f9c7b96a90402edccb7bd84a4697eaca8e4b
SHA512b869e8426713de6b4b17cf60b5e9b15c0877efa4acab4d27d754ccb38096eb8a5e84ddcaab085a9d547327bb0f93472ecba622e195650654389294f367cfe0fd
-
Filesize
361KB
MD5dbc5d834e73322453234c664081b9bca
SHA1c652bf239c5b133dd1c776d95f8c6796db9a1568
SHA25699d2bf6ed597d31cb28de90267d1f9c7b96a90402edccb7bd84a4697eaca8e4b
SHA512b869e8426713de6b4b17cf60b5e9b15c0877efa4acab4d27d754ccb38096eb8a5e84ddcaab085a9d547327bb0f93472ecba622e195650654389294f367cfe0fd
-
Filesize
361KB
MD5dbc5d834e73322453234c664081b9bca
SHA1c652bf239c5b133dd1c776d95f8c6796db9a1568
SHA25699d2bf6ed597d31cb28de90267d1f9c7b96a90402edccb7bd84a4697eaca8e4b
SHA512b869e8426713de6b4b17cf60b5e9b15c0877efa4acab4d27d754ccb38096eb8a5e84ddcaab085a9d547327bb0f93472ecba622e195650654389294f367cfe0fd
-
Filesize
409KB
MD539a55573830d5a25d55f2c3cfac9a7e3
SHA1ae1c4740ec0506281b4b5a50cdb67e48aa7b2f5c
SHA256bc73a08aa3853d0839c6d8edfa5da4811181911731c8ed1ee4f98ab7a721d6ec
SHA5129fdd4a05f52d8cb03668b122ddb58d1be178f8a0ce387d79a447ab3c8c37c92e37f217bff91ba2ea41a395c69634382a79aceda10bd99735c0a8e88c398535dc
-
Filesize
409KB
MD539a55573830d5a25d55f2c3cfac9a7e3
SHA1ae1c4740ec0506281b4b5a50cdb67e48aa7b2f5c
SHA256bc73a08aa3853d0839c6d8edfa5da4811181911731c8ed1ee4f98ab7a721d6ec
SHA5129fdd4a05f52d8cb03668b122ddb58d1be178f8a0ce387d79a447ab3c8c37c92e37f217bff91ba2ea41a395c69634382a79aceda10bd99735c0a8e88c398535dc
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
361KB
MD5dbc5d834e73322453234c664081b9bca
SHA1c652bf239c5b133dd1c776d95f8c6796db9a1568
SHA25699d2bf6ed597d31cb28de90267d1f9c7b96a90402edccb7bd84a4697eaca8e4b
SHA512b869e8426713de6b4b17cf60b5e9b15c0877efa4acab4d27d754ccb38096eb8a5e84ddcaab085a9d547327bb0f93472ecba622e195650654389294f367cfe0fd
-
Filesize
361KB
MD5dbc5d834e73322453234c664081b9bca
SHA1c652bf239c5b133dd1c776d95f8c6796db9a1568
SHA25699d2bf6ed597d31cb28de90267d1f9c7b96a90402edccb7bd84a4697eaca8e4b
SHA512b869e8426713de6b4b17cf60b5e9b15c0877efa4acab4d27d754ccb38096eb8a5e84ddcaab085a9d547327bb0f93472ecba622e195650654389294f367cfe0fd
-
Filesize
361KB
MD5dbc5d834e73322453234c664081b9bca
SHA1c652bf239c5b133dd1c776d95f8c6796db9a1568
SHA25699d2bf6ed597d31cb28de90267d1f9c7b96a90402edccb7bd84a4697eaca8e4b
SHA512b869e8426713de6b4b17cf60b5e9b15c0877efa4acab4d27d754ccb38096eb8a5e84ddcaab085a9d547327bb0f93472ecba622e195650654389294f367cfe0fd