Analysis
-
max time kernel
144s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 22:36
Static task
static1
Behavioral task
behavioral1
Sample
02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe
Resource
win10v2004-20230220-en
General
-
Target
02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe
-
Size
706KB
-
MD5
75dc29b7bc1537145083daa16636089d
-
SHA1
29e314003354eb8457a47900cd71579f04308774
-
SHA256
02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b
-
SHA512
4c8e9fb2097b5047a79ce44577dc22800a53bd1e0bcbbc3d513cd8a422ed066934959133120a540d232660e728373c623ee9f461711b88926eb00d422f4afcb6
-
SSDEEP
12288:3y90hPqwv5flb6KtlIcb5LmfrdZDu1Gw/VpGMcpBv8OFTn1dqu7VJePv5Wnk5MR:3yqPNfjF11GjMIJRw3v6A
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr122364.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr122364.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr122364.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr122364.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pr122364.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr122364.exe -
Executes dropped EXE 3 IoCs
pid Process 2000 un079420.exe 1192 pr122364.exe 1536 qu750681.exe -
Loads dropped DLL 8 IoCs
pid Process 2032 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe 2000 un079420.exe 2000 un079420.exe 2000 un079420.exe 1192 pr122364.exe 2000 un079420.exe 2000 un079420.exe 1536 qu750681.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pr122364.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr122364.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un079420.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un079420.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1192 pr122364.exe 1192 pr122364.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1192 pr122364.exe Token: SeDebugPrivilege 1536 qu750681.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2000 2032 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe 28 PID 2032 wrote to memory of 2000 2032 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe 28 PID 2032 wrote to memory of 2000 2032 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe 28 PID 2032 wrote to memory of 2000 2032 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe 28 PID 2032 wrote to memory of 2000 2032 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe 28 PID 2032 wrote to memory of 2000 2032 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe 28 PID 2032 wrote to memory of 2000 2032 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe 28 PID 2000 wrote to memory of 1192 2000 un079420.exe 29 PID 2000 wrote to memory of 1192 2000 un079420.exe 29 PID 2000 wrote to memory of 1192 2000 un079420.exe 29 PID 2000 wrote to memory of 1192 2000 un079420.exe 29 PID 2000 wrote to memory of 1192 2000 un079420.exe 29 PID 2000 wrote to memory of 1192 2000 un079420.exe 29 PID 2000 wrote to memory of 1192 2000 un079420.exe 29 PID 2000 wrote to memory of 1536 2000 un079420.exe 30 PID 2000 wrote to memory of 1536 2000 un079420.exe 30 PID 2000 wrote to memory of 1536 2000 un079420.exe 30 PID 2000 wrote to memory of 1536 2000 un079420.exe 30 PID 2000 wrote to memory of 1536 2000 un079420.exe 30 PID 2000 wrote to memory of 1536 2000 un079420.exe 30 PID 2000 wrote to memory of 1536 2000 un079420.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe"C:\Users\Admin\AppData\Local\Temp\02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un079420.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un079420.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr122364.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr122364.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750681.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750681.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD5670072e65944069d2f3109f53ba9c862
SHA109c08262ec764fee5b74373a65f2b8940b082fdc
SHA2569be89ff88b4e845a7a86cae86b2be03a78747bed615efa6d8992b395f0c8e43a
SHA5124990430129545fb9aec362447bd39205e95b3f8a9db4714cc316a500d1829ada5ad7f1becae7802566e4a588386af479f92120531737ae0b6e598d16667596ba
-
Filesize
552KB
MD5670072e65944069d2f3109f53ba9c862
SHA109c08262ec764fee5b74373a65f2b8940b082fdc
SHA2569be89ff88b4e845a7a86cae86b2be03a78747bed615efa6d8992b395f0c8e43a
SHA5124990430129545fb9aec362447bd39205e95b3f8a9db4714cc316a500d1829ada5ad7f1becae7802566e4a588386af479f92120531737ae0b6e598d16667596ba
-
Filesize
283KB
MD501d01b55d062e3748c431aa3f5dad536
SHA1a709d8f7d643642ebcb0daa3d5a2c4fd66281d77
SHA2567438fe3a52edd21474bae824c49c797ad051de55936e3fca5115123625800ca2
SHA5123ebdc00a250978034d7fac1afae7847806a2ae9d352870228a3f918453f11a16a834aa6dbf6c91be006190dd78bbe7c70e0413a400c0596f955b7c5dbcc16a76
-
Filesize
283KB
MD501d01b55d062e3748c431aa3f5dad536
SHA1a709d8f7d643642ebcb0daa3d5a2c4fd66281d77
SHA2567438fe3a52edd21474bae824c49c797ad051de55936e3fca5115123625800ca2
SHA5123ebdc00a250978034d7fac1afae7847806a2ae9d352870228a3f918453f11a16a834aa6dbf6c91be006190dd78bbe7c70e0413a400c0596f955b7c5dbcc16a76
-
Filesize
283KB
MD501d01b55d062e3748c431aa3f5dad536
SHA1a709d8f7d643642ebcb0daa3d5a2c4fd66281d77
SHA2567438fe3a52edd21474bae824c49c797ad051de55936e3fca5115123625800ca2
SHA5123ebdc00a250978034d7fac1afae7847806a2ae9d352870228a3f918453f11a16a834aa6dbf6c91be006190dd78bbe7c70e0413a400c0596f955b7c5dbcc16a76
-
Filesize
353KB
MD59050d75efee117cd41ff76058fd9de4a
SHA125ca9d65fd29d63807ae441e893fc9dfab42f879
SHA256bad01384accc2056793241206eaa43563649463cbd2a08d9104c7d2a823fcf88
SHA51266a17a57e827c7be2fb91c39c034fbfd30231fdb810ed049e6f26e99d701d2519f66eb5b8e190dd87c9bdd38546d427d8339c2ab20480b0c99fba0e0f1be9137
-
Filesize
353KB
MD59050d75efee117cd41ff76058fd9de4a
SHA125ca9d65fd29d63807ae441e893fc9dfab42f879
SHA256bad01384accc2056793241206eaa43563649463cbd2a08d9104c7d2a823fcf88
SHA51266a17a57e827c7be2fb91c39c034fbfd30231fdb810ed049e6f26e99d701d2519f66eb5b8e190dd87c9bdd38546d427d8339c2ab20480b0c99fba0e0f1be9137
-
Filesize
353KB
MD59050d75efee117cd41ff76058fd9de4a
SHA125ca9d65fd29d63807ae441e893fc9dfab42f879
SHA256bad01384accc2056793241206eaa43563649463cbd2a08d9104c7d2a823fcf88
SHA51266a17a57e827c7be2fb91c39c034fbfd30231fdb810ed049e6f26e99d701d2519f66eb5b8e190dd87c9bdd38546d427d8339c2ab20480b0c99fba0e0f1be9137
-
Filesize
552KB
MD5670072e65944069d2f3109f53ba9c862
SHA109c08262ec764fee5b74373a65f2b8940b082fdc
SHA2569be89ff88b4e845a7a86cae86b2be03a78747bed615efa6d8992b395f0c8e43a
SHA5124990430129545fb9aec362447bd39205e95b3f8a9db4714cc316a500d1829ada5ad7f1becae7802566e4a588386af479f92120531737ae0b6e598d16667596ba
-
Filesize
552KB
MD5670072e65944069d2f3109f53ba9c862
SHA109c08262ec764fee5b74373a65f2b8940b082fdc
SHA2569be89ff88b4e845a7a86cae86b2be03a78747bed615efa6d8992b395f0c8e43a
SHA5124990430129545fb9aec362447bd39205e95b3f8a9db4714cc316a500d1829ada5ad7f1becae7802566e4a588386af479f92120531737ae0b6e598d16667596ba
-
Filesize
283KB
MD501d01b55d062e3748c431aa3f5dad536
SHA1a709d8f7d643642ebcb0daa3d5a2c4fd66281d77
SHA2567438fe3a52edd21474bae824c49c797ad051de55936e3fca5115123625800ca2
SHA5123ebdc00a250978034d7fac1afae7847806a2ae9d352870228a3f918453f11a16a834aa6dbf6c91be006190dd78bbe7c70e0413a400c0596f955b7c5dbcc16a76
-
Filesize
283KB
MD501d01b55d062e3748c431aa3f5dad536
SHA1a709d8f7d643642ebcb0daa3d5a2c4fd66281d77
SHA2567438fe3a52edd21474bae824c49c797ad051de55936e3fca5115123625800ca2
SHA5123ebdc00a250978034d7fac1afae7847806a2ae9d352870228a3f918453f11a16a834aa6dbf6c91be006190dd78bbe7c70e0413a400c0596f955b7c5dbcc16a76
-
Filesize
283KB
MD501d01b55d062e3748c431aa3f5dad536
SHA1a709d8f7d643642ebcb0daa3d5a2c4fd66281d77
SHA2567438fe3a52edd21474bae824c49c797ad051de55936e3fca5115123625800ca2
SHA5123ebdc00a250978034d7fac1afae7847806a2ae9d352870228a3f918453f11a16a834aa6dbf6c91be006190dd78bbe7c70e0413a400c0596f955b7c5dbcc16a76
-
Filesize
353KB
MD59050d75efee117cd41ff76058fd9de4a
SHA125ca9d65fd29d63807ae441e893fc9dfab42f879
SHA256bad01384accc2056793241206eaa43563649463cbd2a08d9104c7d2a823fcf88
SHA51266a17a57e827c7be2fb91c39c034fbfd30231fdb810ed049e6f26e99d701d2519f66eb5b8e190dd87c9bdd38546d427d8339c2ab20480b0c99fba0e0f1be9137
-
Filesize
353KB
MD59050d75efee117cd41ff76058fd9de4a
SHA125ca9d65fd29d63807ae441e893fc9dfab42f879
SHA256bad01384accc2056793241206eaa43563649463cbd2a08d9104c7d2a823fcf88
SHA51266a17a57e827c7be2fb91c39c034fbfd30231fdb810ed049e6f26e99d701d2519f66eb5b8e190dd87c9bdd38546d427d8339c2ab20480b0c99fba0e0f1be9137
-
Filesize
353KB
MD59050d75efee117cd41ff76058fd9de4a
SHA125ca9d65fd29d63807ae441e893fc9dfab42f879
SHA256bad01384accc2056793241206eaa43563649463cbd2a08d9104c7d2a823fcf88
SHA51266a17a57e827c7be2fb91c39c034fbfd30231fdb810ed049e6f26e99d701d2519f66eb5b8e190dd87c9bdd38546d427d8339c2ab20480b0c99fba0e0f1be9137