Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe
Resource
win10v2004-20230220-en
General
-
Target
45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe
-
Size
694KB
-
MD5
fb8288fb85a084106231132ca55452f5
-
SHA1
aa93f4e6b2a9132ec0bfd4005a2cbe30faabdde5
-
SHA256
45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd
-
SHA512
cd412d81663aead40c7a41274c87154f31b95f3e744ba4fadbff1c00352b75653b5a2309ce44eafc568fb7809f44a9c444eded4b605cb0e8c097425472b054e2
-
SSDEEP
12288:jy90/IbtPmN86pw58bRaeqxOCgshsxgpqlni/VdUN0cRvbP56BKvym772KR:jyggM8Yw5yaxwzOsxgpqlKdUeabV1R
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 90836395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 90836395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 90836395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 90836395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 90836395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 90836395.exe -
Executes dropped EXE 3 IoCs
pid Process 1584 un825493.exe 728 90836395.exe 972 rk316318.exe -
Loads dropped DLL 8 IoCs
pid Process 1616 45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe 1584 un825493.exe 1584 un825493.exe 1584 un825493.exe 728 90836395.exe 1584 un825493.exe 1584 un825493.exe 972 rk316318.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 90836395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 90836395.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un825493.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un825493.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 728 90836395.exe 728 90836395.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 728 90836395.exe Token: SeDebugPrivilege 972 rk316318.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1616 wrote to memory of 1584 1616 45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe 27 PID 1616 wrote to memory of 1584 1616 45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe 27 PID 1616 wrote to memory of 1584 1616 45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe 27 PID 1616 wrote to memory of 1584 1616 45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe 27 PID 1616 wrote to memory of 1584 1616 45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe 27 PID 1616 wrote to memory of 1584 1616 45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe 27 PID 1616 wrote to memory of 1584 1616 45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe 27 PID 1584 wrote to memory of 728 1584 un825493.exe 28 PID 1584 wrote to memory of 728 1584 un825493.exe 28 PID 1584 wrote to memory of 728 1584 un825493.exe 28 PID 1584 wrote to memory of 728 1584 un825493.exe 28 PID 1584 wrote to memory of 728 1584 un825493.exe 28 PID 1584 wrote to memory of 728 1584 un825493.exe 28 PID 1584 wrote to memory of 728 1584 un825493.exe 28 PID 1584 wrote to memory of 972 1584 un825493.exe 29 PID 1584 wrote to memory of 972 1584 un825493.exe 29 PID 1584 wrote to memory of 972 1584 un825493.exe 29 PID 1584 wrote to memory of 972 1584 un825493.exe 29 PID 1584 wrote to memory of 972 1584 un825493.exe 29 PID 1584 wrote to memory of 972 1584 un825493.exe 29 PID 1584 wrote to memory of 972 1584 un825493.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe"C:\Users\Admin\AppData\Local\Temp\45602713475314becb0f226a86254af8fc94602daaecf75bc82fee7271a23ecd.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un825493.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un825493.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90836395.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90836395.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk316318.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk316318.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD51576036ac734b73c133b403e4dc1a193
SHA163cf762f7ee587fbb8bdc33c80f8678def0dd44f
SHA256627bdeb929fe4f7fff0c13efbeb1153faa18b08fd37e047ccc86d626a6c21bc8
SHA512e59859dccfa72b64f025f512a5f90aa7774b61d999105b3a03d7bc06dc10d9980ff065bfa2293b835f71fa7462f9a7d4f40d996e9ac284218759d124d5dd6a80
-
Filesize
540KB
MD51576036ac734b73c133b403e4dc1a193
SHA163cf762f7ee587fbb8bdc33c80f8678def0dd44f
SHA256627bdeb929fe4f7fff0c13efbeb1153faa18b08fd37e047ccc86d626a6c21bc8
SHA512e59859dccfa72b64f025f512a5f90aa7774b61d999105b3a03d7bc06dc10d9980ff065bfa2293b835f71fa7462f9a7d4f40d996e9ac284218759d124d5dd6a80
-
Filesize
258KB
MD5df5da51d8781c57e9b60047071820578
SHA10fe551eec1524cd3f7fb47c2740290aaf474dc95
SHA2564c5754bbbf9f85367801ca7a7a3250537ee0c30ee786971b98556d273a19271e
SHA512b18f998531404768d4c67919d6796552830bf293766c935be31394467816c29626eea663b1f9464a759b9404957ef27cc015ff51571f82fe2cd898a3ebae1fa1
-
Filesize
258KB
MD5df5da51d8781c57e9b60047071820578
SHA10fe551eec1524cd3f7fb47c2740290aaf474dc95
SHA2564c5754bbbf9f85367801ca7a7a3250537ee0c30ee786971b98556d273a19271e
SHA512b18f998531404768d4c67919d6796552830bf293766c935be31394467816c29626eea663b1f9464a759b9404957ef27cc015ff51571f82fe2cd898a3ebae1fa1
-
Filesize
258KB
MD5df5da51d8781c57e9b60047071820578
SHA10fe551eec1524cd3f7fb47c2740290aaf474dc95
SHA2564c5754bbbf9f85367801ca7a7a3250537ee0c30ee786971b98556d273a19271e
SHA512b18f998531404768d4c67919d6796552830bf293766c935be31394467816c29626eea663b1f9464a759b9404957ef27cc015ff51571f82fe2cd898a3ebae1fa1
-
Filesize
341KB
MD56fa97825cbee530ff2434a5522e4534e
SHA1ed8a97c309337af777561e9daf07806d43dd9c09
SHA256350b1d0a6781c8cbf2706a1cdff94e574ef4c2e73b26f3e7187e45ef87530598
SHA512cb9fe2c811754eb3e2c95b1be6ad293dfa26f2f74f7f0be287b6c549a563fca00db7f1aceca2d194ed2c11a6805ef5f7b3b0644d0cd7764957b4257538bad015
-
Filesize
341KB
MD56fa97825cbee530ff2434a5522e4534e
SHA1ed8a97c309337af777561e9daf07806d43dd9c09
SHA256350b1d0a6781c8cbf2706a1cdff94e574ef4c2e73b26f3e7187e45ef87530598
SHA512cb9fe2c811754eb3e2c95b1be6ad293dfa26f2f74f7f0be287b6c549a563fca00db7f1aceca2d194ed2c11a6805ef5f7b3b0644d0cd7764957b4257538bad015
-
Filesize
341KB
MD56fa97825cbee530ff2434a5522e4534e
SHA1ed8a97c309337af777561e9daf07806d43dd9c09
SHA256350b1d0a6781c8cbf2706a1cdff94e574ef4c2e73b26f3e7187e45ef87530598
SHA512cb9fe2c811754eb3e2c95b1be6ad293dfa26f2f74f7f0be287b6c549a563fca00db7f1aceca2d194ed2c11a6805ef5f7b3b0644d0cd7764957b4257538bad015
-
Filesize
540KB
MD51576036ac734b73c133b403e4dc1a193
SHA163cf762f7ee587fbb8bdc33c80f8678def0dd44f
SHA256627bdeb929fe4f7fff0c13efbeb1153faa18b08fd37e047ccc86d626a6c21bc8
SHA512e59859dccfa72b64f025f512a5f90aa7774b61d999105b3a03d7bc06dc10d9980ff065bfa2293b835f71fa7462f9a7d4f40d996e9ac284218759d124d5dd6a80
-
Filesize
540KB
MD51576036ac734b73c133b403e4dc1a193
SHA163cf762f7ee587fbb8bdc33c80f8678def0dd44f
SHA256627bdeb929fe4f7fff0c13efbeb1153faa18b08fd37e047ccc86d626a6c21bc8
SHA512e59859dccfa72b64f025f512a5f90aa7774b61d999105b3a03d7bc06dc10d9980ff065bfa2293b835f71fa7462f9a7d4f40d996e9ac284218759d124d5dd6a80
-
Filesize
258KB
MD5df5da51d8781c57e9b60047071820578
SHA10fe551eec1524cd3f7fb47c2740290aaf474dc95
SHA2564c5754bbbf9f85367801ca7a7a3250537ee0c30ee786971b98556d273a19271e
SHA512b18f998531404768d4c67919d6796552830bf293766c935be31394467816c29626eea663b1f9464a759b9404957ef27cc015ff51571f82fe2cd898a3ebae1fa1
-
Filesize
258KB
MD5df5da51d8781c57e9b60047071820578
SHA10fe551eec1524cd3f7fb47c2740290aaf474dc95
SHA2564c5754bbbf9f85367801ca7a7a3250537ee0c30ee786971b98556d273a19271e
SHA512b18f998531404768d4c67919d6796552830bf293766c935be31394467816c29626eea663b1f9464a759b9404957ef27cc015ff51571f82fe2cd898a3ebae1fa1
-
Filesize
258KB
MD5df5da51d8781c57e9b60047071820578
SHA10fe551eec1524cd3f7fb47c2740290aaf474dc95
SHA2564c5754bbbf9f85367801ca7a7a3250537ee0c30ee786971b98556d273a19271e
SHA512b18f998531404768d4c67919d6796552830bf293766c935be31394467816c29626eea663b1f9464a759b9404957ef27cc015ff51571f82fe2cd898a3ebae1fa1
-
Filesize
341KB
MD56fa97825cbee530ff2434a5522e4534e
SHA1ed8a97c309337af777561e9daf07806d43dd9c09
SHA256350b1d0a6781c8cbf2706a1cdff94e574ef4c2e73b26f3e7187e45ef87530598
SHA512cb9fe2c811754eb3e2c95b1be6ad293dfa26f2f74f7f0be287b6c549a563fca00db7f1aceca2d194ed2c11a6805ef5f7b3b0644d0cd7764957b4257538bad015
-
Filesize
341KB
MD56fa97825cbee530ff2434a5522e4534e
SHA1ed8a97c309337af777561e9daf07806d43dd9c09
SHA256350b1d0a6781c8cbf2706a1cdff94e574ef4c2e73b26f3e7187e45ef87530598
SHA512cb9fe2c811754eb3e2c95b1be6ad293dfa26f2f74f7f0be287b6c549a563fca00db7f1aceca2d194ed2c11a6805ef5f7b3b0644d0cd7764957b4257538bad015
-
Filesize
341KB
MD56fa97825cbee530ff2434a5522e4534e
SHA1ed8a97c309337af777561e9daf07806d43dd9c09
SHA256350b1d0a6781c8cbf2706a1cdff94e574ef4c2e73b26f3e7187e45ef87530598
SHA512cb9fe2c811754eb3e2c95b1be6ad293dfa26f2f74f7f0be287b6c549a563fca00db7f1aceca2d194ed2c11a6805ef5f7b3b0644d0cd7764957b4257538bad015