Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe
Resource
win10v2004-20230220-en
General
-
Target
6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe
-
Size
752KB
-
MD5
068373078336a1f9de329e6552ef03cd
-
SHA1
c826d8e37bc346f08e276ee86d643bd7753e1f24
-
SHA256
6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd
-
SHA512
33e8b399832d452ea8045d37795dd7832a3748a4ecdb59a57139e2e119ea40bab33d95ba861c5aef1b701e8b517ed4b1efcef02bfe8b97379376a3bf40fcd267
-
SSDEEP
12288:3y90SFvqw0yS4vb66+8MJjVOsC4wQIeZjxdQC4WD6Vth+r/KiNz:3yTvqVXceBNVey/iCLCth+jKix
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 02692585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 02692585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 02692585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 02692585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 02692585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 02692585.exe -
Executes dropped EXE 3 IoCs
pid Process 868 un423781.exe 432 02692585.exe 1712 rk175020.exe -
Loads dropped DLL 8 IoCs
pid Process 696 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe 868 un423781.exe 868 un423781.exe 868 un423781.exe 432 02692585.exe 868 un423781.exe 868 un423781.exe 1712 rk175020.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 02692585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 02692585.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un423781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un423781.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 432 02692585.exe 432 02692585.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 432 02692585.exe Token: SeDebugPrivilege 1712 rk175020.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 696 wrote to memory of 868 696 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe 28 PID 696 wrote to memory of 868 696 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe 28 PID 696 wrote to memory of 868 696 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe 28 PID 696 wrote to memory of 868 696 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe 28 PID 696 wrote to memory of 868 696 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe 28 PID 696 wrote to memory of 868 696 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe 28 PID 696 wrote to memory of 868 696 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe 28 PID 868 wrote to memory of 432 868 un423781.exe 29 PID 868 wrote to memory of 432 868 un423781.exe 29 PID 868 wrote to memory of 432 868 un423781.exe 29 PID 868 wrote to memory of 432 868 un423781.exe 29 PID 868 wrote to memory of 432 868 un423781.exe 29 PID 868 wrote to memory of 432 868 un423781.exe 29 PID 868 wrote to memory of 432 868 un423781.exe 29 PID 868 wrote to memory of 1712 868 un423781.exe 30 PID 868 wrote to memory of 1712 868 un423781.exe 30 PID 868 wrote to memory of 1712 868 un423781.exe 30 PID 868 wrote to memory of 1712 868 un423781.exe 30 PID 868 wrote to memory of 1712 868 un423781.exe 30 PID 868 wrote to memory of 1712 868 un423781.exe 30 PID 868 wrote to memory of 1712 868 un423781.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe"C:\Users\Admin\AppData\Local\Temp\6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423781.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423781.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02692585.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02692585.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175020.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175020.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD59cdd0c27c092631e914d4aa08ac164f0
SHA1f2ee93f6253a9a811d6a5e9cf680080c3c79ace5
SHA25661c34b052e79d00f5efefca8eb5c42a5fe1b1f8d4efb6733d2476bd630e56af7
SHA512dd64d0fd40271e8072115e7b882eb3eb500e479bc3cfe255534562c9186dfd09a99a98e887096937b114209cb36b33bdbb10b270f262b9aac66577ac741f2753
-
Filesize
598KB
MD59cdd0c27c092631e914d4aa08ac164f0
SHA1f2ee93f6253a9a811d6a5e9cf680080c3c79ace5
SHA25661c34b052e79d00f5efefca8eb5c42a5fe1b1f8d4efb6733d2476bd630e56af7
SHA512dd64d0fd40271e8072115e7b882eb3eb500e479bc3cfe255534562c9186dfd09a99a98e887096937b114209cb36b33bdbb10b270f262b9aac66577ac741f2753
-
Filesize
390KB
MD583782015280fc6704c298cc01f150a81
SHA1e5a257df1611e22e71a093c2d87bd6e366640dab
SHA25669121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167
SHA51205ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503
-
Filesize
390KB
MD583782015280fc6704c298cc01f150a81
SHA1e5a257df1611e22e71a093c2d87bd6e366640dab
SHA25669121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167
SHA51205ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503
-
Filesize
390KB
MD583782015280fc6704c298cc01f150a81
SHA1e5a257df1611e22e71a093c2d87bd6e366640dab
SHA25669121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167
SHA51205ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503
-
Filesize
473KB
MD56bbbc4a0580b78dbdbf54f5a90a74ea8
SHA1a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c
SHA256d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f
SHA512b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e
-
Filesize
473KB
MD56bbbc4a0580b78dbdbf54f5a90a74ea8
SHA1a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c
SHA256d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f
SHA512b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e
-
Filesize
473KB
MD56bbbc4a0580b78dbdbf54f5a90a74ea8
SHA1a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c
SHA256d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f
SHA512b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e
-
Filesize
598KB
MD59cdd0c27c092631e914d4aa08ac164f0
SHA1f2ee93f6253a9a811d6a5e9cf680080c3c79ace5
SHA25661c34b052e79d00f5efefca8eb5c42a5fe1b1f8d4efb6733d2476bd630e56af7
SHA512dd64d0fd40271e8072115e7b882eb3eb500e479bc3cfe255534562c9186dfd09a99a98e887096937b114209cb36b33bdbb10b270f262b9aac66577ac741f2753
-
Filesize
598KB
MD59cdd0c27c092631e914d4aa08ac164f0
SHA1f2ee93f6253a9a811d6a5e9cf680080c3c79ace5
SHA25661c34b052e79d00f5efefca8eb5c42a5fe1b1f8d4efb6733d2476bd630e56af7
SHA512dd64d0fd40271e8072115e7b882eb3eb500e479bc3cfe255534562c9186dfd09a99a98e887096937b114209cb36b33bdbb10b270f262b9aac66577ac741f2753
-
Filesize
390KB
MD583782015280fc6704c298cc01f150a81
SHA1e5a257df1611e22e71a093c2d87bd6e366640dab
SHA25669121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167
SHA51205ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503
-
Filesize
390KB
MD583782015280fc6704c298cc01f150a81
SHA1e5a257df1611e22e71a093c2d87bd6e366640dab
SHA25669121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167
SHA51205ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503
-
Filesize
390KB
MD583782015280fc6704c298cc01f150a81
SHA1e5a257df1611e22e71a093c2d87bd6e366640dab
SHA25669121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167
SHA51205ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503
-
Filesize
473KB
MD56bbbc4a0580b78dbdbf54f5a90a74ea8
SHA1a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c
SHA256d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f
SHA512b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e
-
Filesize
473KB
MD56bbbc4a0580b78dbdbf54f5a90a74ea8
SHA1a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c
SHA256d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f
SHA512b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e
-
Filesize
473KB
MD56bbbc4a0580b78dbdbf54f5a90a74ea8
SHA1a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c
SHA256d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f
SHA512b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e