Analysis
-
max time kernel
151s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe
Resource
win10v2004-20230220-en
General
-
Target
5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe
-
Size
1.3MB
-
MD5
24cca2a9f98862f05d8ec923d854eb41
-
SHA1
81df5fb2dfbaf33eeb4c18d6c73bbf531c3434fd
-
SHA256
5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e
-
SHA512
79a7c41d16282a2ad9518b00ea15cc01c6aec40a727fa0154f221ce76783a72bbefd355b655f384d24591b253173284d46994d376c9fc51b549ec82461cdb96b
-
SSDEEP
24576:cy5jD+g4kFvov3p8KuYWCI6T/vVoFLjnFjXp8Q8V:L1D4wc8G15TXVULj958r
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection n7038952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" n7038952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" n7038952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" n7038952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" n7038952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" n7038952.exe -
Executes dropped EXE 5 IoCs
pid Process 1112 z4444086.exe 268 z7293975.exe 1172 z9160507.exe 800 n7038952.exe 1908 o4266009.exe -
Loads dropped DLL 11 IoCs
pid Process 932 5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe 1112 z4444086.exe 1112 z4444086.exe 268 z7293975.exe 268 z7293975.exe 1172 z9160507.exe 1172 z9160507.exe 1172 z9160507.exe 800 n7038952.exe 1172 z9160507.exe 1908 o4266009.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features n7038952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" n7038952.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4444086.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4444086.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7293975.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7293975.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9160507.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z9160507.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 800 n7038952.exe 800 n7038952.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 800 n7038952.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 932 wrote to memory of 1112 932 5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe 28 PID 932 wrote to memory of 1112 932 5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe 28 PID 932 wrote to memory of 1112 932 5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe 28 PID 932 wrote to memory of 1112 932 5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe 28 PID 932 wrote to memory of 1112 932 5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe 28 PID 932 wrote to memory of 1112 932 5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe 28 PID 932 wrote to memory of 1112 932 5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe 28 PID 1112 wrote to memory of 268 1112 z4444086.exe 29 PID 1112 wrote to memory of 268 1112 z4444086.exe 29 PID 1112 wrote to memory of 268 1112 z4444086.exe 29 PID 1112 wrote to memory of 268 1112 z4444086.exe 29 PID 1112 wrote to memory of 268 1112 z4444086.exe 29 PID 1112 wrote to memory of 268 1112 z4444086.exe 29 PID 1112 wrote to memory of 268 1112 z4444086.exe 29 PID 268 wrote to memory of 1172 268 z7293975.exe 30 PID 268 wrote to memory of 1172 268 z7293975.exe 30 PID 268 wrote to memory of 1172 268 z7293975.exe 30 PID 268 wrote to memory of 1172 268 z7293975.exe 30 PID 268 wrote to memory of 1172 268 z7293975.exe 30 PID 268 wrote to memory of 1172 268 z7293975.exe 30 PID 268 wrote to memory of 1172 268 z7293975.exe 30 PID 1172 wrote to memory of 800 1172 z9160507.exe 31 PID 1172 wrote to memory of 800 1172 z9160507.exe 31 PID 1172 wrote to memory of 800 1172 z9160507.exe 31 PID 1172 wrote to memory of 800 1172 z9160507.exe 31 PID 1172 wrote to memory of 800 1172 z9160507.exe 31 PID 1172 wrote to memory of 800 1172 z9160507.exe 31 PID 1172 wrote to memory of 800 1172 z9160507.exe 31 PID 1172 wrote to memory of 1908 1172 z9160507.exe 32 PID 1172 wrote to memory of 1908 1172 z9160507.exe 32 PID 1172 wrote to memory of 1908 1172 z9160507.exe 32 PID 1172 wrote to memory of 1908 1172 z9160507.exe 32 PID 1172 wrote to memory of 1908 1172 z9160507.exe 32 PID 1172 wrote to memory of 1908 1172 z9160507.exe 32 PID 1172 wrote to memory of 1908 1172 z9160507.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe"C:\Users\Admin\AppData\Local\Temp\5850739931e664a83db3cccc00f089af6373d0c9eac044a5af880f9a0d3d370e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4444086.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4444086.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7293975.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7293975.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9160507.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9160507.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7038952.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7038952.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o4266009.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o4266009.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1908
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5a43ab70564a9e40c2702a509b1221f55
SHA109c616dcf57730b9bb13841bed1222fbadc98d53
SHA2562cf46619372bb777845be8cb4a0f3cf2d94b2e178291e4fcbf6a1b37053a96c6
SHA512856f26ac5efff6f3ec40fad2d10a4abc666fea5baf545c420ab105a7e53056e5026a5a12ccdda8aaa2f482b1cec8a11e7407740bf2f99d55085e6de6ec2cdd94
-
Filesize
1.1MB
MD5a43ab70564a9e40c2702a509b1221f55
SHA109c616dcf57730b9bb13841bed1222fbadc98d53
SHA2562cf46619372bb777845be8cb4a0f3cf2d94b2e178291e4fcbf6a1b37053a96c6
SHA512856f26ac5efff6f3ec40fad2d10a4abc666fea5baf545c420ab105a7e53056e5026a5a12ccdda8aaa2f482b1cec8a11e7407740bf2f99d55085e6de6ec2cdd94
-
Filesize
621KB
MD50e52bbda4bcdce5df20eeced6f5d1186
SHA149565f71f1402ebb837896f3311d385a33b5c962
SHA256e83d89d0d7af0725df81db3f6fdc91b75b5b47e1105bd05915e919b20770453a
SHA5120430da20a3414f709ac23189295e3630d1040319aede912aebd29985e8960a640fbf60de76d293e1e99b8ac81d1a6f54d9b974726941455ee98d3b0cc906c790
-
Filesize
621KB
MD50e52bbda4bcdce5df20eeced6f5d1186
SHA149565f71f1402ebb837896f3311d385a33b5c962
SHA256e83d89d0d7af0725df81db3f6fdc91b75b5b47e1105bd05915e919b20770453a
SHA5120430da20a3414f709ac23189295e3630d1040319aede912aebd29985e8960a640fbf60de76d293e1e99b8ac81d1a6f54d9b974726941455ee98d3b0cc906c790
-
Filesize
418KB
MD55505dc17aef0302e4a219d55e1e54dc1
SHA16a91aecfd0b01659634db12169f6c641e08b56a7
SHA2565955d38556600ea836e607056aca24d3ed7a76b3d8cd6cac77ffe01de729c71d
SHA512973ee6d4b38823ffd314cdf00efe831f73b2b0bfb7a914108f3f2a984b2e6c52e59ddaba7efcc9f8b40dddf28bebd942b2aef9861a524e707afcee0326ec6442
-
Filesize
418KB
MD55505dc17aef0302e4a219d55e1e54dc1
SHA16a91aecfd0b01659634db12169f6c641e08b56a7
SHA2565955d38556600ea836e607056aca24d3ed7a76b3d8cd6cac77ffe01de729c71d
SHA512973ee6d4b38823ffd314cdf00efe831f73b2b0bfb7a914108f3f2a984b2e6c52e59ddaba7efcc9f8b40dddf28bebd942b2aef9861a524e707afcee0326ec6442
-
Filesize
361KB
MD566ac29b6015fe597178f3da153acafa5
SHA11a0bd3ae7936d9dafad10eccbecc84e0cc63efa4
SHA256f047606d526c9cf98d61a7ea83e78ed234c68d9b1d7901475e5bca261b107835
SHA512f535fc8c4432dba1ec95b1f68362a52658a42508f91ff413eac93c480cfaab19ebdc73264c999a22de766e60977c4b4a02c41c21461763f59da6e4514a9bd907
-
Filesize
361KB
MD566ac29b6015fe597178f3da153acafa5
SHA11a0bd3ae7936d9dafad10eccbecc84e0cc63efa4
SHA256f047606d526c9cf98d61a7ea83e78ed234c68d9b1d7901475e5bca261b107835
SHA512f535fc8c4432dba1ec95b1f68362a52658a42508f91ff413eac93c480cfaab19ebdc73264c999a22de766e60977c4b4a02c41c21461763f59da6e4514a9bd907
-
Filesize
361KB
MD566ac29b6015fe597178f3da153acafa5
SHA11a0bd3ae7936d9dafad10eccbecc84e0cc63efa4
SHA256f047606d526c9cf98d61a7ea83e78ed234c68d9b1d7901475e5bca261b107835
SHA512f535fc8c4432dba1ec95b1f68362a52658a42508f91ff413eac93c480cfaab19ebdc73264c999a22de766e60977c4b4a02c41c21461763f59da6e4514a9bd907
-
Filesize
136KB
MD55c186f86d0a5301ce85ec29dd462d7ff
SHA1d0ccfe81e46cc32dbba0df7a99fc19a8d663c3dd
SHA2569eb56011cae5b1047459577149342310910bbb07dab8eebb4ad04e3c1ca3ac07
SHA512b1772fbc4127fff6fc6f110aadd7b9ee59dcc6d8df28fcfcc4d290885041314d4e6e04b85e3c3c2921453363ff620513c65525b8cdb6ee630cbadddeac9613f8
-
Filesize
136KB
MD55c186f86d0a5301ce85ec29dd462d7ff
SHA1d0ccfe81e46cc32dbba0df7a99fc19a8d663c3dd
SHA2569eb56011cae5b1047459577149342310910bbb07dab8eebb4ad04e3c1ca3ac07
SHA512b1772fbc4127fff6fc6f110aadd7b9ee59dcc6d8df28fcfcc4d290885041314d4e6e04b85e3c3c2921453363ff620513c65525b8cdb6ee630cbadddeac9613f8
-
Filesize
1.1MB
MD5a43ab70564a9e40c2702a509b1221f55
SHA109c616dcf57730b9bb13841bed1222fbadc98d53
SHA2562cf46619372bb777845be8cb4a0f3cf2d94b2e178291e4fcbf6a1b37053a96c6
SHA512856f26ac5efff6f3ec40fad2d10a4abc666fea5baf545c420ab105a7e53056e5026a5a12ccdda8aaa2f482b1cec8a11e7407740bf2f99d55085e6de6ec2cdd94
-
Filesize
1.1MB
MD5a43ab70564a9e40c2702a509b1221f55
SHA109c616dcf57730b9bb13841bed1222fbadc98d53
SHA2562cf46619372bb777845be8cb4a0f3cf2d94b2e178291e4fcbf6a1b37053a96c6
SHA512856f26ac5efff6f3ec40fad2d10a4abc666fea5baf545c420ab105a7e53056e5026a5a12ccdda8aaa2f482b1cec8a11e7407740bf2f99d55085e6de6ec2cdd94
-
Filesize
621KB
MD50e52bbda4bcdce5df20eeced6f5d1186
SHA149565f71f1402ebb837896f3311d385a33b5c962
SHA256e83d89d0d7af0725df81db3f6fdc91b75b5b47e1105bd05915e919b20770453a
SHA5120430da20a3414f709ac23189295e3630d1040319aede912aebd29985e8960a640fbf60de76d293e1e99b8ac81d1a6f54d9b974726941455ee98d3b0cc906c790
-
Filesize
621KB
MD50e52bbda4bcdce5df20eeced6f5d1186
SHA149565f71f1402ebb837896f3311d385a33b5c962
SHA256e83d89d0d7af0725df81db3f6fdc91b75b5b47e1105bd05915e919b20770453a
SHA5120430da20a3414f709ac23189295e3630d1040319aede912aebd29985e8960a640fbf60de76d293e1e99b8ac81d1a6f54d9b974726941455ee98d3b0cc906c790
-
Filesize
418KB
MD55505dc17aef0302e4a219d55e1e54dc1
SHA16a91aecfd0b01659634db12169f6c641e08b56a7
SHA2565955d38556600ea836e607056aca24d3ed7a76b3d8cd6cac77ffe01de729c71d
SHA512973ee6d4b38823ffd314cdf00efe831f73b2b0bfb7a914108f3f2a984b2e6c52e59ddaba7efcc9f8b40dddf28bebd942b2aef9861a524e707afcee0326ec6442
-
Filesize
418KB
MD55505dc17aef0302e4a219d55e1e54dc1
SHA16a91aecfd0b01659634db12169f6c641e08b56a7
SHA2565955d38556600ea836e607056aca24d3ed7a76b3d8cd6cac77ffe01de729c71d
SHA512973ee6d4b38823ffd314cdf00efe831f73b2b0bfb7a914108f3f2a984b2e6c52e59ddaba7efcc9f8b40dddf28bebd942b2aef9861a524e707afcee0326ec6442
-
Filesize
361KB
MD566ac29b6015fe597178f3da153acafa5
SHA11a0bd3ae7936d9dafad10eccbecc84e0cc63efa4
SHA256f047606d526c9cf98d61a7ea83e78ed234c68d9b1d7901475e5bca261b107835
SHA512f535fc8c4432dba1ec95b1f68362a52658a42508f91ff413eac93c480cfaab19ebdc73264c999a22de766e60977c4b4a02c41c21461763f59da6e4514a9bd907
-
Filesize
361KB
MD566ac29b6015fe597178f3da153acafa5
SHA11a0bd3ae7936d9dafad10eccbecc84e0cc63efa4
SHA256f047606d526c9cf98d61a7ea83e78ed234c68d9b1d7901475e5bca261b107835
SHA512f535fc8c4432dba1ec95b1f68362a52658a42508f91ff413eac93c480cfaab19ebdc73264c999a22de766e60977c4b4a02c41c21461763f59da6e4514a9bd907
-
Filesize
361KB
MD566ac29b6015fe597178f3da153acafa5
SHA11a0bd3ae7936d9dafad10eccbecc84e0cc63efa4
SHA256f047606d526c9cf98d61a7ea83e78ed234c68d9b1d7901475e5bca261b107835
SHA512f535fc8c4432dba1ec95b1f68362a52658a42508f91ff413eac93c480cfaab19ebdc73264c999a22de766e60977c4b4a02c41c21461763f59da6e4514a9bd907
-
Filesize
136KB
MD55c186f86d0a5301ce85ec29dd462d7ff
SHA1d0ccfe81e46cc32dbba0df7a99fc19a8d663c3dd
SHA2569eb56011cae5b1047459577149342310910bbb07dab8eebb4ad04e3c1ca3ac07
SHA512b1772fbc4127fff6fc6f110aadd7b9ee59dcc6d8df28fcfcc4d290885041314d4e6e04b85e3c3c2921453363ff620513c65525b8cdb6ee630cbadddeac9613f8
-
Filesize
136KB
MD55c186f86d0a5301ce85ec29dd462d7ff
SHA1d0ccfe81e46cc32dbba0df7a99fc19a8d663c3dd
SHA2569eb56011cae5b1047459577149342310910bbb07dab8eebb4ad04e3c1ca3ac07
SHA512b1772fbc4127fff6fc6f110aadd7b9ee59dcc6d8df28fcfcc4d290885041314d4e6e04b85e3c3c2921453363ff620513c65525b8cdb6ee630cbadddeac9613f8