Analysis
-
max time kernel
144s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe
Resource
win10v2004-20230220-en
General
-
Target
05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe
-
Size
747KB
-
MD5
d109166d0abea341b013b90fa72993b0
-
SHA1
ddad95f50e52786510613f8267cfef388de03a98
-
SHA256
05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde
-
SHA512
fff3b166e06435a7d5a500c3087ce19eddb53ae412a1eb5168e77dd96cab347eeb1e5972e9e1471c7b5a850877016cf0489102145fcb074db5de2bd262a09b0c
-
SSDEEP
12288:4y90GmLtZEilUZHJIl30TCXIM/lFV56V5lYPWYEE:4y/mLtZvSHS0O4MHL6V5aOa
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 42138815.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 42138815.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 42138815.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 42138815.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 42138815.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 42138815.exe -
Executes dropped EXE 3 IoCs
pid Process 1548 un600094.exe 576 42138815.exe 1152 rk768831.exe -
Loads dropped DLL 8 IoCs
pid Process 1688 05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe 1548 un600094.exe 1548 un600094.exe 1548 un600094.exe 576 42138815.exe 1548 un600094.exe 1548 un600094.exe 1152 rk768831.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 42138815.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 42138815.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un600094.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un600094.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 576 42138815.exe 576 42138815.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 576 42138815.exe Token: SeDebugPrivilege 1152 rk768831.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1548 1688 05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe 28 PID 1688 wrote to memory of 1548 1688 05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe 28 PID 1688 wrote to memory of 1548 1688 05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe 28 PID 1688 wrote to memory of 1548 1688 05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe 28 PID 1688 wrote to memory of 1548 1688 05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe 28 PID 1688 wrote to memory of 1548 1688 05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe 28 PID 1688 wrote to memory of 1548 1688 05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe 28 PID 1548 wrote to memory of 576 1548 un600094.exe 29 PID 1548 wrote to memory of 576 1548 un600094.exe 29 PID 1548 wrote to memory of 576 1548 un600094.exe 29 PID 1548 wrote to memory of 576 1548 un600094.exe 29 PID 1548 wrote to memory of 576 1548 un600094.exe 29 PID 1548 wrote to memory of 576 1548 un600094.exe 29 PID 1548 wrote to memory of 576 1548 un600094.exe 29 PID 1548 wrote to memory of 1152 1548 un600094.exe 30 PID 1548 wrote to memory of 1152 1548 un600094.exe 30 PID 1548 wrote to memory of 1152 1548 un600094.exe 30 PID 1548 wrote to memory of 1152 1548 un600094.exe 30 PID 1548 wrote to memory of 1152 1548 un600094.exe 30 PID 1548 wrote to memory of 1152 1548 un600094.exe 30 PID 1548 wrote to memory of 1152 1548 un600094.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe"C:\Users\Admin\AppData\Local\Temp\05c7666859b4b497216bb769debb7bf3b71eacbcc35377ba7ebbba766c4d8bde.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un600094.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un600094.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42138815.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42138815.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk768831.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk768831.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD5a60350665d5544fa472570a241e1b18f
SHA15bdc0eb2cbc89baefcf8b43deba02bab87f8eaa8
SHA2563f3754a9fd30381ee9bc85637342d88311f1e999a256f3dd6b63fb090b998049
SHA5128e085a91375def29346b3b55346796270b7e0a49dc7293fa3bde0310515140b01a01bd06c8241e42c8f5f032c9a300e247be2a1cb82635bbdadfd717d853d291
-
Filesize
592KB
MD5a60350665d5544fa472570a241e1b18f
SHA15bdc0eb2cbc89baefcf8b43deba02bab87f8eaa8
SHA2563f3754a9fd30381ee9bc85637342d88311f1e999a256f3dd6b63fb090b998049
SHA5128e085a91375def29346b3b55346796270b7e0a49dc7293fa3bde0310515140b01a01bd06c8241e42c8f5f032c9a300e247be2a1cb82635bbdadfd717d853d291
-
Filesize
376KB
MD5d97c15265161f0230fbc78e683eee758
SHA15d384883df18d8f4ebe1f1efa091916107ac3b24
SHA2569cafef785e64d4ff8fd437a2fdacdc383c7bbadcf3a5fa444058152fb5f93ac2
SHA5126d2844b5ca9cd1d5bec90f58068449dfc97c61544a19b5d866238acb9010c434f552b8b5d4dc8a6cda8d332c571904148f098cb86ea270b72cf3dfe82692dd36
-
Filesize
376KB
MD5d97c15265161f0230fbc78e683eee758
SHA15d384883df18d8f4ebe1f1efa091916107ac3b24
SHA2569cafef785e64d4ff8fd437a2fdacdc383c7bbadcf3a5fa444058152fb5f93ac2
SHA5126d2844b5ca9cd1d5bec90f58068449dfc97c61544a19b5d866238acb9010c434f552b8b5d4dc8a6cda8d332c571904148f098cb86ea270b72cf3dfe82692dd36
-
Filesize
376KB
MD5d97c15265161f0230fbc78e683eee758
SHA15d384883df18d8f4ebe1f1efa091916107ac3b24
SHA2569cafef785e64d4ff8fd437a2fdacdc383c7bbadcf3a5fa444058152fb5f93ac2
SHA5126d2844b5ca9cd1d5bec90f58068449dfc97c61544a19b5d866238acb9010c434f552b8b5d4dc8a6cda8d332c571904148f098cb86ea270b72cf3dfe82692dd36
-
Filesize
459KB
MD5ee85de96b6145b0c083617d097f9a380
SHA186b8f0f1d4dcb09a0be66a8ad0a977ee01bcda5e
SHA256d55b347213dda9ea57db61ba319e95c7095360cb103285784ecc6f18df1dd153
SHA512c29ece7cd9af64f2540fb00ec4c0e07323886c261a26257d93ac6811e039c286669d5843eb38806dd5ef7568653a9d64963338bbfa816b2e1a2084e645f6958c
-
Filesize
459KB
MD5ee85de96b6145b0c083617d097f9a380
SHA186b8f0f1d4dcb09a0be66a8ad0a977ee01bcda5e
SHA256d55b347213dda9ea57db61ba319e95c7095360cb103285784ecc6f18df1dd153
SHA512c29ece7cd9af64f2540fb00ec4c0e07323886c261a26257d93ac6811e039c286669d5843eb38806dd5ef7568653a9d64963338bbfa816b2e1a2084e645f6958c
-
Filesize
459KB
MD5ee85de96b6145b0c083617d097f9a380
SHA186b8f0f1d4dcb09a0be66a8ad0a977ee01bcda5e
SHA256d55b347213dda9ea57db61ba319e95c7095360cb103285784ecc6f18df1dd153
SHA512c29ece7cd9af64f2540fb00ec4c0e07323886c261a26257d93ac6811e039c286669d5843eb38806dd5ef7568653a9d64963338bbfa816b2e1a2084e645f6958c
-
Filesize
592KB
MD5a60350665d5544fa472570a241e1b18f
SHA15bdc0eb2cbc89baefcf8b43deba02bab87f8eaa8
SHA2563f3754a9fd30381ee9bc85637342d88311f1e999a256f3dd6b63fb090b998049
SHA5128e085a91375def29346b3b55346796270b7e0a49dc7293fa3bde0310515140b01a01bd06c8241e42c8f5f032c9a300e247be2a1cb82635bbdadfd717d853d291
-
Filesize
592KB
MD5a60350665d5544fa472570a241e1b18f
SHA15bdc0eb2cbc89baefcf8b43deba02bab87f8eaa8
SHA2563f3754a9fd30381ee9bc85637342d88311f1e999a256f3dd6b63fb090b998049
SHA5128e085a91375def29346b3b55346796270b7e0a49dc7293fa3bde0310515140b01a01bd06c8241e42c8f5f032c9a300e247be2a1cb82635bbdadfd717d853d291
-
Filesize
376KB
MD5d97c15265161f0230fbc78e683eee758
SHA15d384883df18d8f4ebe1f1efa091916107ac3b24
SHA2569cafef785e64d4ff8fd437a2fdacdc383c7bbadcf3a5fa444058152fb5f93ac2
SHA5126d2844b5ca9cd1d5bec90f58068449dfc97c61544a19b5d866238acb9010c434f552b8b5d4dc8a6cda8d332c571904148f098cb86ea270b72cf3dfe82692dd36
-
Filesize
376KB
MD5d97c15265161f0230fbc78e683eee758
SHA15d384883df18d8f4ebe1f1efa091916107ac3b24
SHA2569cafef785e64d4ff8fd437a2fdacdc383c7bbadcf3a5fa444058152fb5f93ac2
SHA5126d2844b5ca9cd1d5bec90f58068449dfc97c61544a19b5d866238acb9010c434f552b8b5d4dc8a6cda8d332c571904148f098cb86ea270b72cf3dfe82692dd36
-
Filesize
376KB
MD5d97c15265161f0230fbc78e683eee758
SHA15d384883df18d8f4ebe1f1efa091916107ac3b24
SHA2569cafef785e64d4ff8fd437a2fdacdc383c7bbadcf3a5fa444058152fb5f93ac2
SHA5126d2844b5ca9cd1d5bec90f58068449dfc97c61544a19b5d866238acb9010c434f552b8b5d4dc8a6cda8d332c571904148f098cb86ea270b72cf3dfe82692dd36
-
Filesize
459KB
MD5ee85de96b6145b0c083617d097f9a380
SHA186b8f0f1d4dcb09a0be66a8ad0a977ee01bcda5e
SHA256d55b347213dda9ea57db61ba319e95c7095360cb103285784ecc6f18df1dd153
SHA512c29ece7cd9af64f2540fb00ec4c0e07323886c261a26257d93ac6811e039c286669d5843eb38806dd5ef7568653a9d64963338bbfa816b2e1a2084e645f6958c
-
Filesize
459KB
MD5ee85de96b6145b0c083617d097f9a380
SHA186b8f0f1d4dcb09a0be66a8ad0a977ee01bcda5e
SHA256d55b347213dda9ea57db61ba319e95c7095360cb103285784ecc6f18df1dd153
SHA512c29ece7cd9af64f2540fb00ec4c0e07323886c261a26257d93ac6811e039c286669d5843eb38806dd5ef7568653a9d64963338bbfa816b2e1a2084e645f6958c
-
Filesize
459KB
MD5ee85de96b6145b0c083617d097f9a380
SHA186b8f0f1d4dcb09a0be66a8ad0a977ee01bcda5e
SHA256d55b347213dda9ea57db61ba319e95c7095360cb103285784ecc6f18df1dd153
SHA512c29ece7cd9af64f2540fb00ec4c0e07323886c261a26257d93ac6811e039c286669d5843eb38806dd5ef7568653a9d64963338bbfa816b2e1a2084e645f6958c