Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 21:32
Static task
static1
Behavioral task
behavioral1
Sample
409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe
Resource
win10v2004-20230220-en
General
-
Target
409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe
-
Size
690KB
-
MD5
bedec3f68e81c94687011bd42826fa30
-
SHA1
d9330ea0651fe8dc507bf875731226e23e20aecd
-
SHA256
409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c
-
SHA512
40c632f546d9d6170cbecbbed902edd499a4629802a6f8bece11c0cdad2abf82882ea57c1a11e9553fbde7d791ab3ae98fb613c410ebaf9cc04425dd28968c63
-
SSDEEP
12288:Py90w95D1XSpkeYUA4LHfMI7Bwh74ZQIJoM00yK12VB9Kl2CiEMjiJEV:Pyx5pckeYUA4LfnKhLPMTyS2+diZ+K
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 14404211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 14404211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 14404211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 14404211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 14404211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 14404211.exe -
Executes dropped EXE 3 IoCs
pid Process 1072 un551109.exe 1948 14404211.exe 1556 rk063711.exe -
Loads dropped DLL 8 IoCs
pid Process 324 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe 1072 un551109.exe 1072 un551109.exe 1072 un551109.exe 1948 14404211.exe 1072 un551109.exe 1072 un551109.exe 1556 rk063711.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 14404211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 14404211.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un551109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un551109.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1948 14404211.exe 1948 14404211.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1948 14404211.exe Token: SeDebugPrivilege 1556 rk063711.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 324 wrote to memory of 1072 324 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe 27 PID 324 wrote to memory of 1072 324 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe 27 PID 324 wrote to memory of 1072 324 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe 27 PID 324 wrote to memory of 1072 324 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe 27 PID 324 wrote to memory of 1072 324 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe 27 PID 324 wrote to memory of 1072 324 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe 27 PID 324 wrote to memory of 1072 324 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe 27 PID 1072 wrote to memory of 1948 1072 un551109.exe 28 PID 1072 wrote to memory of 1948 1072 un551109.exe 28 PID 1072 wrote to memory of 1948 1072 un551109.exe 28 PID 1072 wrote to memory of 1948 1072 un551109.exe 28 PID 1072 wrote to memory of 1948 1072 un551109.exe 28 PID 1072 wrote to memory of 1948 1072 un551109.exe 28 PID 1072 wrote to memory of 1948 1072 un551109.exe 28 PID 1072 wrote to memory of 1556 1072 un551109.exe 29 PID 1072 wrote to memory of 1556 1072 un551109.exe 29 PID 1072 wrote to memory of 1556 1072 un551109.exe 29 PID 1072 wrote to memory of 1556 1072 un551109.exe 29 PID 1072 wrote to memory of 1556 1072 un551109.exe 29 PID 1072 wrote to memory of 1556 1072 un551109.exe 29 PID 1072 wrote to memory of 1556 1072 un551109.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe"C:\Users\Admin\AppData\Local\Temp\409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD591f383cb9a29abec482915613fd6524d
SHA162a3388432be26273ed153f9684d7ecb68b1dd71
SHA2562183963b41cb70e603ee380c0db667ec550769dd92f30ffcce5df5f9fa90cbda
SHA512828363c661c3e8bb6abb210788a9acbde4b733e65947d5d01c96afb951c91ad35d6cb31512eabea4c12a92369ddb494573282ca81324f51809a3e835b1bcaf0c
-
Filesize
536KB
MD591f383cb9a29abec482915613fd6524d
SHA162a3388432be26273ed153f9684d7ecb68b1dd71
SHA2562183963b41cb70e603ee380c0db667ec550769dd92f30ffcce5df5f9fa90cbda
SHA512828363c661c3e8bb6abb210788a9acbde4b733e65947d5d01c96afb951c91ad35d6cb31512eabea4c12a92369ddb494573282ca81324f51809a3e835b1bcaf0c
-
Filesize
259KB
MD528946ab545213bc4d521c744fd29fbf4
SHA1d983b5e4c30b55373df177351d6e2cafb85ed5f3
SHA256f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa
SHA512e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31
-
Filesize
259KB
MD528946ab545213bc4d521c744fd29fbf4
SHA1d983b5e4c30b55373df177351d6e2cafb85ed5f3
SHA256f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa
SHA512e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31
-
Filesize
259KB
MD528946ab545213bc4d521c744fd29fbf4
SHA1d983b5e4c30b55373df177351d6e2cafb85ed5f3
SHA256f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa
SHA512e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31
-
Filesize
341KB
MD5511371d6be0a0826c6e4eed3915d5f3d
SHA1e5d1538059bdd1c3e369dfa7f0f389f45530bf94
SHA256817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a
SHA512961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0
-
Filesize
341KB
MD5511371d6be0a0826c6e4eed3915d5f3d
SHA1e5d1538059bdd1c3e369dfa7f0f389f45530bf94
SHA256817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a
SHA512961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0
-
Filesize
341KB
MD5511371d6be0a0826c6e4eed3915d5f3d
SHA1e5d1538059bdd1c3e369dfa7f0f389f45530bf94
SHA256817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a
SHA512961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0
-
Filesize
536KB
MD591f383cb9a29abec482915613fd6524d
SHA162a3388432be26273ed153f9684d7ecb68b1dd71
SHA2562183963b41cb70e603ee380c0db667ec550769dd92f30ffcce5df5f9fa90cbda
SHA512828363c661c3e8bb6abb210788a9acbde4b733e65947d5d01c96afb951c91ad35d6cb31512eabea4c12a92369ddb494573282ca81324f51809a3e835b1bcaf0c
-
Filesize
536KB
MD591f383cb9a29abec482915613fd6524d
SHA162a3388432be26273ed153f9684d7ecb68b1dd71
SHA2562183963b41cb70e603ee380c0db667ec550769dd92f30ffcce5df5f9fa90cbda
SHA512828363c661c3e8bb6abb210788a9acbde4b733e65947d5d01c96afb951c91ad35d6cb31512eabea4c12a92369ddb494573282ca81324f51809a3e835b1bcaf0c
-
Filesize
259KB
MD528946ab545213bc4d521c744fd29fbf4
SHA1d983b5e4c30b55373df177351d6e2cafb85ed5f3
SHA256f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa
SHA512e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31
-
Filesize
259KB
MD528946ab545213bc4d521c744fd29fbf4
SHA1d983b5e4c30b55373df177351d6e2cafb85ed5f3
SHA256f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa
SHA512e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31
-
Filesize
259KB
MD528946ab545213bc4d521c744fd29fbf4
SHA1d983b5e4c30b55373df177351d6e2cafb85ed5f3
SHA256f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa
SHA512e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31
-
Filesize
341KB
MD5511371d6be0a0826c6e4eed3915d5f3d
SHA1e5d1538059bdd1c3e369dfa7f0f389f45530bf94
SHA256817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a
SHA512961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0
-
Filesize
341KB
MD5511371d6be0a0826c6e4eed3915d5f3d
SHA1e5d1538059bdd1c3e369dfa7f0f389f45530bf94
SHA256817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a
SHA512961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0
-
Filesize
341KB
MD5511371d6be0a0826c6e4eed3915d5f3d
SHA1e5d1538059bdd1c3e369dfa7f0f389f45530bf94
SHA256817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a
SHA512961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0