Analysis
-
max time kernel
247s -
max time network
263s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662.exe
Resource
win10v2004-20230221-en
General
-
Target
456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662.exe
-
Size
1.1MB
-
MD5
b0edf7c4c6f773458a3ffa41a2fca79e
-
SHA1
ea6b51e39da69283609d5f8618f66b979553dee2
-
SHA256
456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662
-
SHA512
9c525c2c23b182d982850201129e9faebe0f7dc7b4335970084975cb7215221ff923744ecb0988ae0d66e0183a123e1cc3636ca556395c3104f9bc8ecca85c39
-
SSDEEP
24576:pybVdr/xCt5UH8c+ywgfJfyWBNNUP2eikkjcvmKWn6wsesikNuah:cRdNCtibwO1LS2eikkUi3s9ua
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 159217571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 159217571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 159217571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 275990756.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 275990756.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 275990756.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 275990756.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 159217571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 159217571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 159217571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 275990756.exe -
Executes dropped EXE 5 IoCs
pid Process 2600 LO655528.exe 2588 fe660286.exe 1548 um589945.exe 1340 159217571.exe 4232 275990756.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 159217571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 159217571.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 275990756.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" LO655528.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fe660286.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" fe660286.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce um589945.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" um589945.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce LO655528.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1340 159217571.exe 1340 159217571.exe 4232 275990756.exe 4232 275990756.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1340 159217571.exe Token: SeDebugPrivilege 4232 275990756.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 684 wrote to memory of 2600 684 456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662.exe 79 PID 684 wrote to memory of 2600 684 456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662.exe 79 PID 684 wrote to memory of 2600 684 456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662.exe 79 PID 2600 wrote to memory of 2588 2600 LO655528.exe 80 PID 2600 wrote to memory of 2588 2600 LO655528.exe 80 PID 2600 wrote to memory of 2588 2600 LO655528.exe 80 PID 2588 wrote to memory of 1548 2588 fe660286.exe 81 PID 2588 wrote to memory of 1548 2588 fe660286.exe 81 PID 2588 wrote to memory of 1548 2588 fe660286.exe 81 PID 1548 wrote to memory of 1340 1548 um589945.exe 82 PID 1548 wrote to memory of 1340 1548 um589945.exe 82 PID 1548 wrote to memory of 1340 1548 um589945.exe 82 PID 1548 wrote to memory of 4232 1548 um589945.exe 83 PID 1548 wrote to memory of 4232 1548 um589945.exe 83 PID 1548 wrote to memory of 4232 1548 um589945.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662.exe"C:\Users\Admin\AppData\Local\Temp\456ce4cbdf05c418569e7da39b05a93e75505d1cdaa93a2d71a3bbe8e1c91662.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LO655528.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LO655528.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fe660286.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fe660286.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\um589945.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\um589945.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\159217571.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\159217571.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\275990756.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\275990756.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
993KB
MD56ab9f70a80fdaa2e573cbd1aaa2bb152
SHA17820cb85e5db36c6ce1f5d62797f1d9d4a60a932
SHA256e57b26ea635f191f13b17c809cfefd5bbc04d27edbfc1eb938f7dd4aae1d79ec
SHA5124900d7d2be0d993378b6b063fe7a245f555255f58095a133a1c730be42bfd433fe47243d71c14bd18d339932284f663b8ed68f2bc7da2cf62b1cbf56c5a92b6c
-
Filesize
993KB
MD56ab9f70a80fdaa2e573cbd1aaa2bb152
SHA17820cb85e5db36c6ce1f5d62797f1d9d4a60a932
SHA256e57b26ea635f191f13b17c809cfefd5bbc04d27edbfc1eb938f7dd4aae1d79ec
SHA5124900d7d2be0d993378b6b063fe7a245f555255f58095a133a1c730be42bfd433fe47243d71c14bd18d339932284f663b8ed68f2bc7da2cf62b1cbf56c5a92b6c
-
Filesize
610KB
MD5ff3f88a5ed0fd4d148738e5dcf3ca01e
SHA14b48c950b8296b06b6fa1988cdf11e1e4cfb40ac
SHA256f8a0e82fb0d0ec809be421fabb8145cb1196c8598710caded74799a8eb83c7ed
SHA5129eb67787730149a7d44215e32410b86fea28a51ba93af9d5a98a2a49fb194b2199586d5a5bbde7784b2c6ad0f4732cbc62b409ea6e0d93bf7dc392e520ca7bc6
-
Filesize
610KB
MD5ff3f88a5ed0fd4d148738e5dcf3ca01e
SHA14b48c950b8296b06b6fa1988cdf11e1e4cfb40ac
SHA256f8a0e82fb0d0ec809be421fabb8145cb1196c8598710caded74799a8eb83c7ed
SHA5129eb67787730149a7d44215e32410b86fea28a51ba93af9d5a98a2a49fb194b2199586d5a5bbde7784b2c6ad0f4732cbc62b409ea6e0d93bf7dc392e520ca7bc6
-
Filesize
438KB
MD50c3c0bfa0ba7a36c734589f0978d4fc1
SHA1b12cf27406680091cd524fb18ba2d57858f84de4
SHA256b3a880c119322b3a4df8d9a6b3b427e252cf14eea9edb03d8e1a8f6a1417bd2a
SHA5120b3b5eefc40a18a9b3696d3952294bd752413b8e93fd46177c355e5cf6d95357157187922e2da3bdaae42f145d60a7b50b6bbdc7721e92b54d5df3653e82806d
-
Filesize
438KB
MD50c3c0bfa0ba7a36c734589f0978d4fc1
SHA1b12cf27406680091cd524fb18ba2d57858f84de4
SHA256b3a880c119322b3a4df8d9a6b3b427e252cf14eea9edb03d8e1a8f6a1417bd2a
SHA5120b3b5eefc40a18a9b3696d3952294bd752413b8e93fd46177c355e5cf6d95357157187922e2da3bdaae42f145d60a7b50b6bbdc7721e92b54d5df3653e82806d
-
Filesize
175KB
MD518f26d5b7807e83a640d0aef71b8f117
SHA11d9f19996df202b24b5f8c5e731ff415c8bbb1d4
SHA256cad646c545054153e3e6a79aba8ac20b6295f3100ecb2f6432a3c74705b5fe67
SHA512ca732e7a317846d56e899a8a6a1edb2830dab6f9a8b82876bf056b79a95e3f37e78d8b0a486bf5cde540624206ac55e4d57f07a11426eea8442308b9bae33a2a
-
Filesize
175KB
MD518f26d5b7807e83a640d0aef71b8f117
SHA11d9f19996df202b24b5f8c5e731ff415c8bbb1d4
SHA256cad646c545054153e3e6a79aba8ac20b6295f3100ecb2f6432a3c74705b5fe67
SHA512ca732e7a317846d56e899a8a6a1edb2830dab6f9a8b82876bf056b79a95e3f37e78d8b0a486bf5cde540624206ac55e4d57f07a11426eea8442308b9bae33a2a
-
Filesize
333KB
MD5d851fbe103fb519cba93f470e272a846
SHA1bf630a24124909cb7693b4cfb4bcd016fe4b58fb
SHA256d5bb153f7224ed9f341e188fe5ba26806b1f1c71d1a5290972a32128fe990d78
SHA512b2062c20f5df541e0ca67a144dc0b43c476e42c1f6f8a6d2164cb247cfc60d855d6b7cfe9d7736a6047036faf0d5ccb2ec03df05fd705b45622a38c349c4e4ce
-
Filesize
333KB
MD5d851fbe103fb519cba93f470e272a846
SHA1bf630a24124909cb7693b4cfb4bcd016fe4b58fb
SHA256d5bb153f7224ed9f341e188fe5ba26806b1f1c71d1a5290972a32128fe990d78
SHA512b2062c20f5df541e0ca67a144dc0b43c476e42c1f6f8a6d2164cb247cfc60d855d6b7cfe9d7736a6047036faf0d5ccb2ec03df05fd705b45622a38c349c4e4ce