Analysis
-
max time kernel
148s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe
Resource
win10v2004-20230220-en
General
-
Target
00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe
-
Size
706KB
-
MD5
e9a5b3842d7355d05de43a37a126df52
-
SHA1
1eb9911b8d5a3c7f41135bb73b26e9143366cc00
-
SHA256
00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60
-
SHA512
ff7b99429a02c9ec26892a6f09540bb435fb0f3c1c225a6f5ede7dff9e107b58afca9f2eb459abd371d040f3bed942e7d63dd668c24f84146479fe31a38c6fda
-
SSDEEP
12288:Sy90H879pOov8vrYhCM/vOXjLZUQa9uHHmbTnc7kj9gqeo6KJSyyHxGw58wsLg1f:Sy979pA8vmz0WHmbTQkfXSpRGwqjLg1f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr850363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr850363.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pr850363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr850363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr850363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr850363.exe -
Executes dropped EXE 3 IoCs
pid Process 1168 un272951.exe 580 pr850363.exe 1148 qu750535.exe -
Loads dropped DLL 8 IoCs
pid Process 2004 00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe 1168 un272951.exe 1168 un272951.exe 1168 un272951.exe 580 pr850363.exe 1168 un272951.exe 1168 un272951.exe 1148 qu750535.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pr850363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr850363.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un272951.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un272951.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 580 pr850363.exe 580 pr850363.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 580 pr850363.exe Token: SeDebugPrivilege 1148 qu750535.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1168 2004 00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe 28 PID 2004 wrote to memory of 1168 2004 00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe 28 PID 2004 wrote to memory of 1168 2004 00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe 28 PID 2004 wrote to memory of 1168 2004 00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe 28 PID 2004 wrote to memory of 1168 2004 00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe 28 PID 2004 wrote to memory of 1168 2004 00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe 28 PID 2004 wrote to memory of 1168 2004 00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe 28 PID 1168 wrote to memory of 580 1168 un272951.exe 29 PID 1168 wrote to memory of 580 1168 un272951.exe 29 PID 1168 wrote to memory of 580 1168 un272951.exe 29 PID 1168 wrote to memory of 580 1168 un272951.exe 29 PID 1168 wrote to memory of 580 1168 un272951.exe 29 PID 1168 wrote to memory of 580 1168 un272951.exe 29 PID 1168 wrote to memory of 580 1168 un272951.exe 29 PID 1168 wrote to memory of 1148 1168 un272951.exe 30 PID 1168 wrote to memory of 1148 1168 un272951.exe 30 PID 1168 wrote to memory of 1148 1168 un272951.exe 30 PID 1168 wrote to memory of 1148 1168 un272951.exe 30 PID 1168 wrote to memory of 1148 1168 un272951.exe 30 PID 1168 wrote to memory of 1148 1168 un272951.exe 30 PID 1168 wrote to memory of 1148 1168 un272951.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe"C:\Users\Admin\AppData\Local\Temp\00e06f196b9f035b0edde04d1e751cac27215429bc397360746f3e36f9884b60.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un272951.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un272951.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr850363.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr850363.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750535.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750535.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD55a8a32086d05955382fb0a586633f1d4
SHA151b379133f65a3106de3c588af28ef9d405e3cb8
SHA256b94bf3f280e0453cf5381f201dc602494466a99f5bdac7424f562ee643b7cc0c
SHA5129dbd35911fcd791c0a4ee1e53b9b2589c8d25d7bf3e9ff1857320834e344373a60523d81eafee1259613a48de1868b7c12ab32b6c9af06cd15d43a7abfa24300
-
Filesize
552KB
MD55a8a32086d05955382fb0a586633f1d4
SHA151b379133f65a3106de3c588af28ef9d405e3cb8
SHA256b94bf3f280e0453cf5381f201dc602494466a99f5bdac7424f562ee643b7cc0c
SHA5129dbd35911fcd791c0a4ee1e53b9b2589c8d25d7bf3e9ff1857320834e344373a60523d81eafee1259613a48de1868b7c12ab32b6c9af06cd15d43a7abfa24300
-
Filesize
285KB
MD582cd22c2aa4364a503a8edbdd0e5cbc5
SHA1a47c3fd93bdee9235e9624935ccb32430cc5c1c7
SHA25691245521f71bfbd85d7b77b1fbb2b04d07d0ded898b83f8bf778991a7b5910e2
SHA5124e723b3ebd2b9c00b15d6a673defdb4ba7a61c2549729cb98b4533e52a7cb26f3e82a3306b4f97cfed09d598fbddc8111d9b9b1abe466e98641c36868c924e3d
-
Filesize
285KB
MD582cd22c2aa4364a503a8edbdd0e5cbc5
SHA1a47c3fd93bdee9235e9624935ccb32430cc5c1c7
SHA25691245521f71bfbd85d7b77b1fbb2b04d07d0ded898b83f8bf778991a7b5910e2
SHA5124e723b3ebd2b9c00b15d6a673defdb4ba7a61c2549729cb98b4533e52a7cb26f3e82a3306b4f97cfed09d598fbddc8111d9b9b1abe466e98641c36868c924e3d
-
Filesize
285KB
MD582cd22c2aa4364a503a8edbdd0e5cbc5
SHA1a47c3fd93bdee9235e9624935ccb32430cc5c1c7
SHA25691245521f71bfbd85d7b77b1fbb2b04d07d0ded898b83f8bf778991a7b5910e2
SHA5124e723b3ebd2b9c00b15d6a673defdb4ba7a61c2549729cb98b4533e52a7cb26f3e82a3306b4f97cfed09d598fbddc8111d9b9b1abe466e98641c36868c924e3d
-
Filesize
367KB
MD578714ad68eec3116e729db23d3f8c19d
SHA1e75ee0465bb99ce2a9c2378e26aedbe4ac92b17a
SHA256b013e385959080e40a47106c473f07fae90b5a851ce5ff88e119b614578a17a4
SHA512a529572e89031e3d7fe22acc84ce832d876df04418a1d133150271e62d37a74caa4c3fd0f203b369e83c3a0061e3d116d981325ae494a0f0ca770d5e97621317
-
Filesize
367KB
MD578714ad68eec3116e729db23d3f8c19d
SHA1e75ee0465bb99ce2a9c2378e26aedbe4ac92b17a
SHA256b013e385959080e40a47106c473f07fae90b5a851ce5ff88e119b614578a17a4
SHA512a529572e89031e3d7fe22acc84ce832d876df04418a1d133150271e62d37a74caa4c3fd0f203b369e83c3a0061e3d116d981325ae494a0f0ca770d5e97621317
-
Filesize
367KB
MD578714ad68eec3116e729db23d3f8c19d
SHA1e75ee0465bb99ce2a9c2378e26aedbe4ac92b17a
SHA256b013e385959080e40a47106c473f07fae90b5a851ce5ff88e119b614578a17a4
SHA512a529572e89031e3d7fe22acc84ce832d876df04418a1d133150271e62d37a74caa4c3fd0f203b369e83c3a0061e3d116d981325ae494a0f0ca770d5e97621317
-
Filesize
552KB
MD55a8a32086d05955382fb0a586633f1d4
SHA151b379133f65a3106de3c588af28ef9d405e3cb8
SHA256b94bf3f280e0453cf5381f201dc602494466a99f5bdac7424f562ee643b7cc0c
SHA5129dbd35911fcd791c0a4ee1e53b9b2589c8d25d7bf3e9ff1857320834e344373a60523d81eafee1259613a48de1868b7c12ab32b6c9af06cd15d43a7abfa24300
-
Filesize
552KB
MD55a8a32086d05955382fb0a586633f1d4
SHA151b379133f65a3106de3c588af28ef9d405e3cb8
SHA256b94bf3f280e0453cf5381f201dc602494466a99f5bdac7424f562ee643b7cc0c
SHA5129dbd35911fcd791c0a4ee1e53b9b2589c8d25d7bf3e9ff1857320834e344373a60523d81eafee1259613a48de1868b7c12ab32b6c9af06cd15d43a7abfa24300
-
Filesize
285KB
MD582cd22c2aa4364a503a8edbdd0e5cbc5
SHA1a47c3fd93bdee9235e9624935ccb32430cc5c1c7
SHA25691245521f71bfbd85d7b77b1fbb2b04d07d0ded898b83f8bf778991a7b5910e2
SHA5124e723b3ebd2b9c00b15d6a673defdb4ba7a61c2549729cb98b4533e52a7cb26f3e82a3306b4f97cfed09d598fbddc8111d9b9b1abe466e98641c36868c924e3d
-
Filesize
285KB
MD582cd22c2aa4364a503a8edbdd0e5cbc5
SHA1a47c3fd93bdee9235e9624935ccb32430cc5c1c7
SHA25691245521f71bfbd85d7b77b1fbb2b04d07d0ded898b83f8bf778991a7b5910e2
SHA5124e723b3ebd2b9c00b15d6a673defdb4ba7a61c2549729cb98b4533e52a7cb26f3e82a3306b4f97cfed09d598fbddc8111d9b9b1abe466e98641c36868c924e3d
-
Filesize
285KB
MD582cd22c2aa4364a503a8edbdd0e5cbc5
SHA1a47c3fd93bdee9235e9624935ccb32430cc5c1c7
SHA25691245521f71bfbd85d7b77b1fbb2b04d07d0ded898b83f8bf778991a7b5910e2
SHA5124e723b3ebd2b9c00b15d6a673defdb4ba7a61c2549729cb98b4533e52a7cb26f3e82a3306b4f97cfed09d598fbddc8111d9b9b1abe466e98641c36868c924e3d
-
Filesize
367KB
MD578714ad68eec3116e729db23d3f8c19d
SHA1e75ee0465bb99ce2a9c2378e26aedbe4ac92b17a
SHA256b013e385959080e40a47106c473f07fae90b5a851ce5ff88e119b614578a17a4
SHA512a529572e89031e3d7fe22acc84ce832d876df04418a1d133150271e62d37a74caa4c3fd0f203b369e83c3a0061e3d116d981325ae494a0f0ca770d5e97621317
-
Filesize
367KB
MD578714ad68eec3116e729db23d3f8c19d
SHA1e75ee0465bb99ce2a9c2378e26aedbe4ac92b17a
SHA256b013e385959080e40a47106c473f07fae90b5a851ce5ff88e119b614578a17a4
SHA512a529572e89031e3d7fe22acc84ce832d876df04418a1d133150271e62d37a74caa4c3fd0f203b369e83c3a0061e3d116d981325ae494a0f0ca770d5e97621317
-
Filesize
367KB
MD578714ad68eec3116e729db23d3f8c19d
SHA1e75ee0465bb99ce2a9c2378e26aedbe4ac92b17a
SHA256b013e385959080e40a47106c473f07fae90b5a851ce5ff88e119b614578a17a4
SHA512a529572e89031e3d7fe22acc84ce832d876df04418a1d133150271e62d37a74caa4c3fd0f203b369e83c3a0061e3d116d981325ae494a0f0ca770d5e97621317