Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe
Resource
win10v2004-20230220-en
General
-
Target
057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe
-
Size
651KB
-
MD5
610a8f214fb76216b3990fd4fbb845fe
-
SHA1
8ccd2ca761997fb625181a0e9f4bf2565544972d
-
SHA256
057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3
-
SHA512
24e4c4c8ceb86c685f53294009ab2180314bed40ee41266a2fe957b61997635f1c205220ec191a97efdee2a5e0e0107e4e4a2146d07a308d4ea698e9f2941bf1
-
SSDEEP
12288:ey90kEcu9yZZtJc4qoXR7iDPoGKnKNkpMy39EEZdL1fcy:eywcugZZtJPqoB2DPtNC3CEZ5my
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 68720229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 68720229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 68720229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 68720229.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 68720229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 68720229.exe -
Executes dropped EXE 3 IoCs
pid Process 2044 st337363.exe 568 68720229.exe 820 kp177926.exe -
Loads dropped DLL 7 IoCs
pid Process 1684 057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe 2044 st337363.exe 2044 st337363.exe 568 68720229.exe 2044 st337363.exe 2044 st337363.exe 820 kp177926.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 68720229.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 68720229.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st337363.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st337363.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 568 68720229.exe 568 68720229.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 568 68720229.exe Token: SeDebugPrivilege 820 kp177926.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2044 1684 057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe 28 PID 1684 wrote to memory of 2044 1684 057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe 28 PID 1684 wrote to memory of 2044 1684 057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe 28 PID 1684 wrote to memory of 2044 1684 057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe 28 PID 1684 wrote to memory of 2044 1684 057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe 28 PID 1684 wrote to memory of 2044 1684 057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe 28 PID 1684 wrote to memory of 2044 1684 057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe 28 PID 2044 wrote to memory of 568 2044 st337363.exe 29 PID 2044 wrote to memory of 568 2044 st337363.exe 29 PID 2044 wrote to memory of 568 2044 st337363.exe 29 PID 2044 wrote to memory of 568 2044 st337363.exe 29 PID 2044 wrote to memory of 568 2044 st337363.exe 29 PID 2044 wrote to memory of 568 2044 st337363.exe 29 PID 2044 wrote to memory of 568 2044 st337363.exe 29 PID 2044 wrote to memory of 820 2044 st337363.exe 30 PID 2044 wrote to memory of 820 2044 st337363.exe 30 PID 2044 wrote to memory of 820 2044 st337363.exe 30 PID 2044 wrote to memory of 820 2044 st337363.exe 30 PID 2044 wrote to memory of 820 2044 st337363.exe 30 PID 2044 wrote to memory of 820 2044 st337363.exe 30 PID 2044 wrote to memory of 820 2044 st337363.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe"C:\Users\Admin\AppData\Local\Temp\057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st337363.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st337363.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68720229.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68720229.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD5a45c6a540b71e6e50d9ce824e014b9b5
SHA12ee7dd09f4baaff2cf586d85ea97ed71ff7be2ae
SHA256e85f9afe2c58b09a4006f1e52b52a69140df83f5d438cd74709968623197b3a7
SHA512d89da634a0c967ca039e430c503444406e4a2727a4bcbb058cf2fa99ff77ffcee08360e019016d3015fc42fe04c98ea44c0cba530d7721610a8e6effe0a2fff5
-
Filesize
497KB
MD5a45c6a540b71e6e50d9ce824e014b9b5
SHA12ee7dd09f4baaff2cf586d85ea97ed71ff7be2ae
SHA256e85f9afe2c58b09a4006f1e52b52a69140df83f5d438cd74709968623197b3a7
SHA512d89da634a0c967ca039e430c503444406e4a2727a4bcbb058cf2fa99ff77ffcee08360e019016d3015fc42fe04c98ea44c0cba530d7721610a8e6effe0a2fff5
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
341KB
MD5c1800cb8710bcd33cb601334e60f3a10
SHA1f02f9d87a5558d1507c6ba11473c5c81fc91706f
SHA2569c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52
SHA51233d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4
-
Filesize
341KB
MD5c1800cb8710bcd33cb601334e60f3a10
SHA1f02f9d87a5558d1507c6ba11473c5c81fc91706f
SHA2569c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52
SHA51233d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4
-
Filesize
341KB
MD5c1800cb8710bcd33cb601334e60f3a10
SHA1f02f9d87a5558d1507c6ba11473c5c81fc91706f
SHA2569c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52
SHA51233d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4
-
Filesize
497KB
MD5a45c6a540b71e6e50d9ce824e014b9b5
SHA12ee7dd09f4baaff2cf586d85ea97ed71ff7be2ae
SHA256e85f9afe2c58b09a4006f1e52b52a69140df83f5d438cd74709968623197b3a7
SHA512d89da634a0c967ca039e430c503444406e4a2727a4bcbb058cf2fa99ff77ffcee08360e019016d3015fc42fe04c98ea44c0cba530d7721610a8e6effe0a2fff5
-
Filesize
497KB
MD5a45c6a540b71e6e50d9ce824e014b9b5
SHA12ee7dd09f4baaff2cf586d85ea97ed71ff7be2ae
SHA256e85f9afe2c58b09a4006f1e52b52a69140df83f5d438cd74709968623197b3a7
SHA512d89da634a0c967ca039e430c503444406e4a2727a4bcbb058cf2fa99ff77ffcee08360e019016d3015fc42fe04c98ea44c0cba530d7721610a8e6effe0a2fff5
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
341KB
MD5c1800cb8710bcd33cb601334e60f3a10
SHA1f02f9d87a5558d1507c6ba11473c5c81fc91706f
SHA2569c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52
SHA51233d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4
-
Filesize
341KB
MD5c1800cb8710bcd33cb601334e60f3a10
SHA1f02f9d87a5558d1507c6ba11473c5c81fc91706f
SHA2569c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52
SHA51233d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4
-
Filesize
341KB
MD5c1800cb8710bcd33cb601334e60f3a10
SHA1f02f9d87a5558d1507c6ba11473c5c81fc91706f
SHA2569c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52
SHA51233d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4