Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe
Resource
win10v2004-20230220-en
General
-
Target
6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe
-
Size
612KB
-
MD5
6111049a26ad873703183f999708633a
-
SHA1
e8b2184827ea1791b35666552e421bdeb43b0059
-
SHA256
6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087
-
SHA512
8dfc5b6553ec2b3f9e954a6d960999b2c7e2371f805057e020ab51cc17de4d42125e96f4a546030a55fe8708e7155d1070da856dcdcafba30a40d07040f3b45c
-
SSDEEP
12288:Gy90UBsWlHAnMKTuYPRCBZw6bKWwq2yEJySvSEat:GyDBFHAnvsBZRbKTQy9C
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 17492494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 17492494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 17492494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 17492494.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 17492494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 17492494.exe -
Executes dropped EXE 3 IoCs
pid Process 1604 st484556.exe 680 17492494.exe 1116 kp278278.exe -
Loads dropped DLL 6 IoCs
pid Process 1468 6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe 1604 st484556.exe 1604 st484556.exe 1604 st484556.exe 1604 st484556.exe 1116 kp278278.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 17492494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 17492494.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st484556.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st484556.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 680 17492494.exe 680 17492494.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 680 17492494.exe Token: SeDebugPrivilege 1116 kp278278.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1604 1468 6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe 27 PID 1468 wrote to memory of 1604 1468 6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe 27 PID 1468 wrote to memory of 1604 1468 6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe 27 PID 1468 wrote to memory of 1604 1468 6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe 27 PID 1468 wrote to memory of 1604 1468 6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe 27 PID 1468 wrote to memory of 1604 1468 6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe 27 PID 1468 wrote to memory of 1604 1468 6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe 27 PID 1604 wrote to memory of 680 1604 st484556.exe 28 PID 1604 wrote to memory of 680 1604 st484556.exe 28 PID 1604 wrote to memory of 680 1604 st484556.exe 28 PID 1604 wrote to memory of 680 1604 st484556.exe 28 PID 1604 wrote to memory of 680 1604 st484556.exe 28 PID 1604 wrote to memory of 680 1604 st484556.exe 28 PID 1604 wrote to memory of 680 1604 st484556.exe 28 PID 1604 wrote to memory of 1116 1604 st484556.exe 29 PID 1604 wrote to memory of 1116 1604 st484556.exe 29 PID 1604 wrote to memory of 1116 1604 st484556.exe 29 PID 1604 wrote to memory of 1116 1604 st484556.exe 29 PID 1604 wrote to memory of 1116 1604 st484556.exe 29 PID 1604 wrote to memory of 1116 1604 st484556.exe 29 PID 1604 wrote to memory of 1116 1604 st484556.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe"C:\Users\Admin\AppData\Local\Temp\6ce17c035f3dedf0f60e95a99586c2828ccbcdc9498f9abaf445de9bd7655087.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st484556.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st484556.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17492494.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17492494.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp278278.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp278278.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD5fdc3d1cc2a95b2e2838d7c0fb6f44be7
SHA1ab632b93fa28c2f99e2e9c7528156609e84b9264
SHA2567be65160842e965637c321992ccb95d437da00c098b3bc0f605c9e06cdb38c33
SHA5128f244ac6af69215ccb131e2a2d4ab8e29063c0e3bb5d51a00f53733662a81fad48b5cd53f4a7101c1aa710d445d9410965d2a474ec9219dee35b5041d837020c
-
Filesize
457KB
MD5fdc3d1cc2a95b2e2838d7c0fb6f44be7
SHA1ab632b93fa28c2f99e2e9c7528156609e84b9264
SHA2567be65160842e965637c321992ccb95d437da00c098b3bc0f605c9e06cdb38c33
SHA5128f244ac6af69215ccb131e2a2d4ab8e29063c0e3bb5d51a00f53733662a81fad48b5cd53f4a7101c1aa710d445d9410965d2a474ec9219dee35b5041d837020c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD52ebf0c068fed5c8ce6527dcb7ae76ac6
SHA1d7b4984c5383737f5f95268034242ead28c16632
SHA2563a2f27c3f6c3c00342368f12d65e03b2efb0c3a45e4b076698dbce926b66d3b7
SHA51236d0060bb162d6e6da8e5bc969af1faebd3e2f8d2646de626a879b75eb78b790a1c3c40d8991a4966527d46c20bec1cba8f15c2a61b2d7fc67658f803b7cc088
-
Filesize
459KB
MD52ebf0c068fed5c8ce6527dcb7ae76ac6
SHA1d7b4984c5383737f5f95268034242ead28c16632
SHA2563a2f27c3f6c3c00342368f12d65e03b2efb0c3a45e4b076698dbce926b66d3b7
SHA51236d0060bb162d6e6da8e5bc969af1faebd3e2f8d2646de626a879b75eb78b790a1c3c40d8991a4966527d46c20bec1cba8f15c2a61b2d7fc67658f803b7cc088
-
Filesize
459KB
MD52ebf0c068fed5c8ce6527dcb7ae76ac6
SHA1d7b4984c5383737f5f95268034242ead28c16632
SHA2563a2f27c3f6c3c00342368f12d65e03b2efb0c3a45e4b076698dbce926b66d3b7
SHA51236d0060bb162d6e6da8e5bc969af1faebd3e2f8d2646de626a879b75eb78b790a1c3c40d8991a4966527d46c20bec1cba8f15c2a61b2d7fc67658f803b7cc088
-
Filesize
457KB
MD5fdc3d1cc2a95b2e2838d7c0fb6f44be7
SHA1ab632b93fa28c2f99e2e9c7528156609e84b9264
SHA2567be65160842e965637c321992ccb95d437da00c098b3bc0f605c9e06cdb38c33
SHA5128f244ac6af69215ccb131e2a2d4ab8e29063c0e3bb5d51a00f53733662a81fad48b5cd53f4a7101c1aa710d445d9410965d2a474ec9219dee35b5041d837020c
-
Filesize
457KB
MD5fdc3d1cc2a95b2e2838d7c0fb6f44be7
SHA1ab632b93fa28c2f99e2e9c7528156609e84b9264
SHA2567be65160842e965637c321992ccb95d437da00c098b3bc0f605c9e06cdb38c33
SHA5128f244ac6af69215ccb131e2a2d4ab8e29063c0e3bb5d51a00f53733662a81fad48b5cd53f4a7101c1aa710d445d9410965d2a474ec9219dee35b5041d837020c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD52ebf0c068fed5c8ce6527dcb7ae76ac6
SHA1d7b4984c5383737f5f95268034242ead28c16632
SHA2563a2f27c3f6c3c00342368f12d65e03b2efb0c3a45e4b076698dbce926b66d3b7
SHA51236d0060bb162d6e6da8e5bc969af1faebd3e2f8d2646de626a879b75eb78b790a1c3c40d8991a4966527d46c20bec1cba8f15c2a61b2d7fc67658f803b7cc088
-
Filesize
459KB
MD52ebf0c068fed5c8ce6527dcb7ae76ac6
SHA1d7b4984c5383737f5f95268034242ead28c16632
SHA2563a2f27c3f6c3c00342368f12d65e03b2efb0c3a45e4b076698dbce926b66d3b7
SHA51236d0060bb162d6e6da8e5bc969af1faebd3e2f8d2646de626a879b75eb78b790a1c3c40d8991a4966527d46c20bec1cba8f15c2a61b2d7fc67658f803b7cc088
-
Filesize
459KB
MD52ebf0c068fed5c8ce6527dcb7ae76ac6
SHA1d7b4984c5383737f5f95268034242ead28c16632
SHA2563a2f27c3f6c3c00342368f12d65e03b2efb0c3a45e4b076698dbce926b66d3b7
SHA51236d0060bb162d6e6da8e5bc969af1faebd3e2f8d2646de626a879b75eb78b790a1c3c40d8991a4966527d46c20bec1cba8f15c2a61b2d7fc67658f803b7cc088