Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe
Resource
win10v2004-20230220-en
General
-
Target
0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe
-
Size
376KB
-
MD5
58bfcc846b7cd6fb7ecd56c46d612bc9
-
SHA1
c1d90ea706e78e698b0132aa4aaf0cb307c345a8
-
SHA256
0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff
-
SHA512
ee32a6bbea6398dd9e56327226edafca7048ebe86c99a2df1bc2eaba63f874e120dea0f74ac48905ea998f4555bbcf667a353a684e081809cad57b95f7c20c7b
-
SSDEEP
6144:Key+bnr+3p0yN90QE9E2dMI6diUexAAvQrz8x8gNkkAoaXIbKv4sXiqOXyv:CMrPy90XyI6TeqAQcOkAxXIGv4sXidCv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6378541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6378541.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6378541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6378541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6378541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6378541.exe -
Executes dropped EXE 3 IoCs
pid Process 848 v0324893.exe 1444 a6378541.exe 740 b5367556.exe -
Loads dropped DLL 5 IoCs
pid Process 1240 0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe 848 v0324893.exe 848 v0324893.exe 848 v0324893.exe 740 b5367556.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features a6378541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6378541.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0324893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0324893.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1444 a6378541.exe 1444 a6378541.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1444 a6378541.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1240 wrote to memory of 848 1240 0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe 27 PID 1240 wrote to memory of 848 1240 0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe 27 PID 1240 wrote to memory of 848 1240 0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe 27 PID 1240 wrote to memory of 848 1240 0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe 27 PID 1240 wrote to memory of 848 1240 0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe 27 PID 1240 wrote to memory of 848 1240 0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe 27 PID 1240 wrote to memory of 848 1240 0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe 27 PID 848 wrote to memory of 1444 848 v0324893.exe 28 PID 848 wrote to memory of 1444 848 v0324893.exe 28 PID 848 wrote to memory of 1444 848 v0324893.exe 28 PID 848 wrote to memory of 1444 848 v0324893.exe 28 PID 848 wrote to memory of 1444 848 v0324893.exe 28 PID 848 wrote to memory of 1444 848 v0324893.exe 28 PID 848 wrote to memory of 1444 848 v0324893.exe 28 PID 848 wrote to memory of 740 848 v0324893.exe 29 PID 848 wrote to memory of 740 848 v0324893.exe 29 PID 848 wrote to memory of 740 848 v0324893.exe 29 PID 848 wrote to memory of 740 848 v0324893.exe 29 PID 848 wrote to memory of 740 848 v0324893.exe 29 PID 848 wrote to memory of 740 848 v0324893.exe 29 PID 848 wrote to memory of 740 848 v0324893.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe"C:\Users\Admin\AppData\Local\Temp\0462f226d091e85e1c5c968dd1ff58f676650e82e7528e25a065e14e5c82b5ff.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0324893.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0324893.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6378541.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6378541.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5367556.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5367556.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:740
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5f8cef0829a7c4e131fb45c55e6f81203
SHA1da8f0db2a48f6857b6f76d9aed92223946752809
SHA2560fa5d39c7ddd3ccbc36bffe2012f04b1ddd25df1c32bda97043615810d61a5db
SHA5122b095ab2fddf00cb711a6a66fc6b7bfd19c2bdd825d2cac83741ddb72906cdc52f29e95822b72c0bae82b6ec675e30d4efc0e194917fe63fe6259290f7ccb85e
-
Filesize
204KB
MD5f8cef0829a7c4e131fb45c55e6f81203
SHA1da8f0db2a48f6857b6f76d9aed92223946752809
SHA2560fa5d39c7ddd3ccbc36bffe2012f04b1ddd25df1c32bda97043615810d61a5db
SHA5122b095ab2fddf00cb711a6a66fc6b7bfd19c2bdd825d2cac83741ddb72906cdc52f29e95822b72c0bae82b6ec675e30d4efc0e194917fe63fe6259290f7ccb85e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284
-
Filesize
204KB
MD5f8cef0829a7c4e131fb45c55e6f81203
SHA1da8f0db2a48f6857b6f76d9aed92223946752809
SHA2560fa5d39c7ddd3ccbc36bffe2012f04b1ddd25df1c32bda97043615810d61a5db
SHA5122b095ab2fddf00cb711a6a66fc6b7bfd19c2bdd825d2cac83741ddb72906cdc52f29e95822b72c0bae82b6ec675e30d4efc0e194917fe63fe6259290f7ccb85e
-
Filesize
204KB
MD5f8cef0829a7c4e131fb45c55e6f81203
SHA1da8f0db2a48f6857b6f76d9aed92223946752809
SHA2560fa5d39c7ddd3ccbc36bffe2012f04b1ddd25df1c32bda97043615810d61a5db
SHA5122b095ab2fddf00cb711a6a66fc6b7bfd19c2bdd825d2cac83741ddb72906cdc52f29e95822b72c0bae82b6ec675e30d4efc0e194917fe63fe6259290f7ccb85e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284