Analysis
-
max time kernel
266s -
max time network
358s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe
Resource
win10v2004-20230221-en
General
-
Target
67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe
-
Size
1.5MB
-
MD5
06eb386180d6cc1935db80f136a11f04
-
SHA1
ddac8724a355740963396195a32c5c8d85fb6274
-
SHA256
67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365
-
SHA512
1ccf44ef5f2c07f48c17a9769d9cd72dd8e0b3c25c212ad46ff7ea424749fee8ab7822567a286b72f5bddb87970631dccc1c8846c24fe60935a9833894936d2c
-
SSDEEP
24576:PyrvUijL5YUnpdt0ZNk3t4I2d/ueBN9eiD8hrCQBvMEcReZTF5Gjs3kH4nEOMpQD:arv1jL5YUpTuN+tlOueBNc75vMEcReZl
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 176807278.exe -
Executes dropped EXE 6 IoCs
pid Process 3052 Li824575.exe 3460 pp984960.exe 4724 TR799775.exe 1848 176807278.exe 3192 1.exe 3812 289252017.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Li824575.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Li824575.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pp984960.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pp984960.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce TR799775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" TR799775.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3192 1.exe 3192 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1848 176807278.exe Token: SeDebugPrivilege 3192 1.exe Token: SeDebugPrivilege 3812 289252017.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4192 wrote to memory of 3052 4192 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe 78 PID 4192 wrote to memory of 3052 4192 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe 78 PID 4192 wrote to memory of 3052 4192 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe 78 PID 3052 wrote to memory of 3460 3052 Li824575.exe 79 PID 3052 wrote to memory of 3460 3052 Li824575.exe 79 PID 3052 wrote to memory of 3460 3052 Li824575.exe 79 PID 3460 wrote to memory of 4724 3460 pp984960.exe 80 PID 3460 wrote to memory of 4724 3460 pp984960.exe 80 PID 3460 wrote to memory of 4724 3460 pp984960.exe 80 PID 4724 wrote to memory of 1848 4724 TR799775.exe 81 PID 4724 wrote to memory of 1848 4724 TR799775.exe 81 PID 4724 wrote to memory of 1848 4724 TR799775.exe 81 PID 1848 wrote to memory of 3192 1848 176807278.exe 86 PID 1848 wrote to memory of 3192 1848 176807278.exe 86 PID 4724 wrote to memory of 3812 4724 TR799775.exe 87 PID 4724 wrote to memory of 3812 4724 TR799775.exe 87 PID 4724 wrote to memory of 3812 4724 TR799775.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe"C:\Users\Admin\AppData\Local\Temp\67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Li824575.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Li824575.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pp984960.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pp984960.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TR799775.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TR799775.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\176807278.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\176807278.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\289252017.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\289252017.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58e1907fb69fcd02ecc75561454c485d5
SHA1ca4c280ab8d7f4c9fb099cae650f15c4d868dd3f
SHA256b0aaeb36e8c5a238c5bfe43e1beaa03e3c32b1748a9e63217274dc73ae080ca8
SHA5123961ce1be5c8b83d30860a75bc96409d4f48ab7b637f4c7bb1b0dbe846b7d70aca1b3518143f57fb1889bd00cf051e43d6bc2d395fce0ba696789f0c441309fd
-
Filesize
1.3MB
MD58e1907fb69fcd02ecc75561454c485d5
SHA1ca4c280ab8d7f4c9fb099cae650f15c4d868dd3f
SHA256b0aaeb36e8c5a238c5bfe43e1beaa03e3c32b1748a9e63217274dc73ae080ca8
SHA5123961ce1be5c8b83d30860a75bc96409d4f48ab7b637f4c7bb1b0dbe846b7d70aca1b3518143f57fb1889bd00cf051e43d6bc2d395fce0ba696789f0c441309fd
-
Filesize
871KB
MD5582eb9f88f85b08cd247f31be5eebc6c
SHA1086384151fa4ffb34ec6dfa56165739645e5976c
SHA256e6685e74a022cbb25dd69003e8705cf9fa296d1ca0dfa83dae37d6a3d71c2ee7
SHA5120db78e36d821d77260314abaec6f281b07dd0f35818646978569cadc4ac981c91de89b0e920d4875d53831d8a96005a6717c5cc00cf84eded206225da3077f9b
-
Filesize
871KB
MD5582eb9f88f85b08cd247f31be5eebc6c
SHA1086384151fa4ffb34ec6dfa56165739645e5976c
SHA256e6685e74a022cbb25dd69003e8705cf9fa296d1ca0dfa83dae37d6a3d71c2ee7
SHA5120db78e36d821d77260314abaec6f281b07dd0f35818646978569cadc4ac981c91de89b0e920d4875d53831d8a96005a6717c5cc00cf84eded206225da3077f9b
-
Filesize
700KB
MD540f4a9521d97abc6ff28062a9ec11707
SHA1fb2102fbd15ace3889e559d114e9d18304452aa9
SHA2562961b561e5fc8f51e51a56552173fd6770dc046d93bc48a5c6183b66f6274c65
SHA512d68e72802bbbadc31684bd000d51cf2f9de777f9a82c586dc08a499d46c7d3e2f2d305cf97570839c5423e3c6276c20236efa5c4dd8edd9c07c32e092106f095
-
Filesize
700KB
MD540f4a9521d97abc6ff28062a9ec11707
SHA1fb2102fbd15ace3889e559d114e9d18304452aa9
SHA2562961b561e5fc8f51e51a56552173fd6770dc046d93bc48a5c6183b66f6274c65
SHA512d68e72802bbbadc31684bd000d51cf2f9de777f9a82c586dc08a499d46c7d3e2f2d305cf97570839c5423e3c6276c20236efa5c4dd8edd9c07c32e092106f095
-
Filesize
300KB
MD550e65c6a0da3120534f802d2b2b67b2a
SHA1f168a3991abbd34b6bf87ef29f4e6cb14fa3ec9d
SHA256869604acc5691e0d5e3182d34187b4b948cd9286e5e45ffcedde96fdd5d01b98
SHA512fc32926c8bebcc62d5b38ac933cbad3e40ac76bc319d05fcc08f4f47e987d63a0fa6d43fb02e3e553789b58796a9c537e72068b18457d75b30b658f78415c10f
-
Filesize
300KB
MD550e65c6a0da3120534f802d2b2b67b2a
SHA1f168a3991abbd34b6bf87ef29f4e6cb14fa3ec9d
SHA256869604acc5691e0d5e3182d34187b4b948cd9286e5e45ffcedde96fdd5d01b98
SHA512fc32926c8bebcc62d5b38ac933cbad3e40ac76bc319d05fcc08f4f47e987d63a0fa6d43fb02e3e553789b58796a9c537e72068b18457d75b30b658f78415c10f
-
Filesize
479KB
MD5b65d59c4177622423c250638b87cdc39
SHA1779611b640fb9643520ba8c2a51e6216391c3d36
SHA256e5c6f829a8f9e55ba625eb07be2c2624173b0ffa452b9f8f06e5c7317746f6de
SHA512b648b32f8903b655f102b9084fd02fbc8c609150a097e00e20ce31388b15ffbf79714631ab9c69acff65982e6c18897750f2e82c6a2c9bb8f2ff892043d08400
-
Filesize
479KB
MD5b65d59c4177622423c250638b87cdc39
SHA1779611b640fb9643520ba8c2a51e6216391c3d36
SHA256e5c6f829a8f9e55ba625eb07be2c2624173b0ffa452b9f8f06e5c7317746f6de
SHA512b648b32f8903b655f102b9084fd02fbc8c609150a097e00e20ce31388b15ffbf79714631ab9c69acff65982e6c18897750f2e82c6a2c9bb8f2ff892043d08400
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91