Analysis
-
max time kernel
188s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 20:20
Static task
static1
Behavioral task
behavioral1
Sample
07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe
Resource
win10v2004-20230220-en
General
-
Target
07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe
-
Size
998KB
-
MD5
36b259cc7f82e5771bfc00fd2d94b885
-
SHA1
0fbf7c4f6caafd33c6ef1844b7a239499e35ef00
-
SHA256
07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338
-
SHA512
790a2d876eba3ae2dfaca21710f06b526a83980abd3afbf9bbaafa9e70bbcea47e7b489a48e5676cc7e7bef2fdd6a109435ed9481a681c153fd7e59fefeeb9c5
-
SSDEEP
24576:hyLgsllIlL7nKOGLSwLnc0SIGwErHCbytD70:ULgsizAS6c0jGwHbYD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 184357238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 184357238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 184357238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 184357238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 184357238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 184357238.exe -
Executes dropped EXE 4 IoCs
pid Process 484 ZR363723.exe 1028 AN544097.exe 528 184357238.exe 1644 277149504.exe -
Loads dropped DLL 10 IoCs
pid Process 864 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe 484 ZR363723.exe 484 ZR363723.exe 1028 AN544097.exe 1028 AN544097.exe 1028 AN544097.exe 528 184357238.exe 1028 AN544097.exe 1028 AN544097.exe 1644 277149504.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 184357238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 184357238.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ZR363723.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ZR363723.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce AN544097.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" AN544097.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 528 184357238.exe 528 184357238.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 528 184357238.exe Token: SeDebugPrivilege 1644 277149504.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 864 wrote to memory of 484 864 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe 28 PID 864 wrote to memory of 484 864 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe 28 PID 864 wrote to memory of 484 864 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe 28 PID 864 wrote to memory of 484 864 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe 28 PID 864 wrote to memory of 484 864 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe 28 PID 864 wrote to memory of 484 864 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe 28 PID 864 wrote to memory of 484 864 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe 28 PID 484 wrote to memory of 1028 484 ZR363723.exe 29 PID 484 wrote to memory of 1028 484 ZR363723.exe 29 PID 484 wrote to memory of 1028 484 ZR363723.exe 29 PID 484 wrote to memory of 1028 484 ZR363723.exe 29 PID 484 wrote to memory of 1028 484 ZR363723.exe 29 PID 484 wrote to memory of 1028 484 ZR363723.exe 29 PID 484 wrote to memory of 1028 484 ZR363723.exe 29 PID 1028 wrote to memory of 528 1028 AN544097.exe 30 PID 1028 wrote to memory of 528 1028 AN544097.exe 30 PID 1028 wrote to memory of 528 1028 AN544097.exe 30 PID 1028 wrote to memory of 528 1028 AN544097.exe 30 PID 1028 wrote to memory of 528 1028 AN544097.exe 30 PID 1028 wrote to memory of 528 1028 AN544097.exe 30 PID 1028 wrote to memory of 528 1028 AN544097.exe 30 PID 1028 wrote to memory of 1644 1028 AN544097.exe 31 PID 1028 wrote to memory of 1644 1028 AN544097.exe 31 PID 1028 wrote to memory of 1644 1028 AN544097.exe 31 PID 1028 wrote to memory of 1644 1028 AN544097.exe 31 PID 1028 wrote to memory of 1644 1028 AN544097.exe 31 PID 1028 wrote to memory of 1644 1028 AN544097.exe 31 PID 1028 wrote to memory of 1644 1028 AN544097.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe"C:\Users\Admin\AppData\Local\Temp\07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZR363723.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZR363723.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\AN544097.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\AN544097.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\184357238.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\184357238.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\277149504.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\277149504.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
769KB
MD50f81b9f80c1229c1074db19b197765c2
SHA1b250f1d525856e613fbc86f364f25243b03fdce6
SHA2565dc84e93463d5eb0eb6d318d8e60ade985e3def735f2846b5bb4f3988f9e14c7
SHA5121653599ca1b763120389301aa5d75dca6ff2a3bc1e67570b5d35a111ff0f5c9f71695ac109772526aa8a2b20ad8032c34ef6649d52a21f3624dcf19b075a9f6d
-
Filesize
769KB
MD50f81b9f80c1229c1074db19b197765c2
SHA1b250f1d525856e613fbc86f364f25243b03fdce6
SHA2565dc84e93463d5eb0eb6d318d8e60ade985e3def735f2846b5bb4f3988f9e14c7
SHA5121653599ca1b763120389301aa5d75dca6ff2a3bc1e67570b5d35a111ff0f5c9f71695ac109772526aa8a2b20ad8032c34ef6649d52a21f3624dcf19b075a9f6d
-
Filesize
597KB
MD5e66eac9328ed6d89e106c5ae7fb8328b
SHA178ef242df2b5bf034729f6768543f7e6817f0351
SHA256862d2aa4bee82bd43aa8906240db0a440d4e929c8be80f0bf1de838014bbb92e
SHA512d53841efd0b8b7bd89b4fc9dfe93e51b9c0469790942249eaf1ba851c52e36a874fb5788f527a8b404cf639e8447e6414dfe09a73856689935f90ccd66da3ed3
-
Filesize
597KB
MD5e66eac9328ed6d89e106c5ae7fb8328b
SHA178ef242df2b5bf034729f6768543f7e6817f0351
SHA256862d2aa4bee82bd43aa8906240db0a440d4e929c8be80f0bf1de838014bbb92e
SHA512d53841efd0b8b7bd89b4fc9dfe93e51b9c0469790942249eaf1ba851c52e36a874fb5788f527a8b404cf639e8447e6414dfe09a73856689935f90ccd66da3ed3
-
Filesize
390KB
MD57cda122d869d11f7c91fe6d606b02747
SHA1ecb87c79b46b997df7e44843a6e0e260aa78a4e7
SHA256d39fbd1875109df5f99ccd3498e534d596e5ea78f8b585ad57958187bf7afff1
SHA512373b7630e51aeca33a844b7aa8013ca5bf8ada992bba64f7e5e9321dad6b8dae0504be517a5c9fb019be90efd6aa11b0b9ec0527682ad54d9ea1097eb7060de7
-
Filesize
390KB
MD57cda122d869d11f7c91fe6d606b02747
SHA1ecb87c79b46b997df7e44843a6e0e260aa78a4e7
SHA256d39fbd1875109df5f99ccd3498e534d596e5ea78f8b585ad57958187bf7afff1
SHA512373b7630e51aeca33a844b7aa8013ca5bf8ada992bba64f7e5e9321dad6b8dae0504be517a5c9fb019be90efd6aa11b0b9ec0527682ad54d9ea1097eb7060de7
-
Filesize
390KB
MD57cda122d869d11f7c91fe6d606b02747
SHA1ecb87c79b46b997df7e44843a6e0e260aa78a4e7
SHA256d39fbd1875109df5f99ccd3498e534d596e5ea78f8b585ad57958187bf7afff1
SHA512373b7630e51aeca33a844b7aa8013ca5bf8ada992bba64f7e5e9321dad6b8dae0504be517a5c9fb019be90efd6aa11b0b9ec0527682ad54d9ea1097eb7060de7
-
Filesize
473KB
MD59a2e8b3986286a2f77e7d9d40f0d6951
SHA1896f348bd33d486ce270e297b88d5e4de480aff1
SHA256a8c4bb37fe1948144330f6245ddb4a0fc37ce85eca660be6dbd15faa7509c260
SHA512f43d26afa879292d0efbd0206e480347251b8361c7e0a4a453dad09166d9098dc23694a03c11f16d8b310ad5b6327382ab2e7cda2bcca1d5fe403ea1037fe261
-
Filesize
473KB
MD59a2e8b3986286a2f77e7d9d40f0d6951
SHA1896f348bd33d486ce270e297b88d5e4de480aff1
SHA256a8c4bb37fe1948144330f6245ddb4a0fc37ce85eca660be6dbd15faa7509c260
SHA512f43d26afa879292d0efbd0206e480347251b8361c7e0a4a453dad09166d9098dc23694a03c11f16d8b310ad5b6327382ab2e7cda2bcca1d5fe403ea1037fe261
-
Filesize
473KB
MD59a2e8b3986286a2f77e7d9d40f0d6951
SHA1896f348bd33d486ce270e297b88d5e4de480aff1
SHA256a8c4bb37fe1948144330f6245ddb4a0fc37ce85eca660be6dbd15faa7509c260
SHA512f43d26afa879292d0efbd0206e480347251b8361c7e0a4a453dad09166d9098dc23694a03c11f16d8b310ad5b6327382ab2e7cda2bcca1d5fe403ea1037fe261
-
Filesize
769KB
MD50f81b9f80c1229c1074db19b197765c2
SHA1b250f1d525856e613fbc86f364f25243b03fdce6
SHA2565dc84e93463d5eb0eb6d318d8e60ade985e3def735f2846b5bb4f3988f9e14c7
SHA5121653599ca1b763120389301aa5d75dca6ff2a3bc1e67570b5d35a111ff0f5c9f71695ac109772526aa8a2b20ad8032c34ef6649d52a21f3624dcf19b075a9f6d
-
Filesize
769KB
MD50f81b9f80c1229c1074db19b197765c2
SHA1b250f1d525856e613fbc86f364f25243b03fdce6
SHA2565dc84e93463d5eb0eb6d318d8e60ade985e3def735f2846b5bb4f3988f9e14c7
SHA5121653599ca1b763120389301aa5d75dca6ff2a3bc1e67570b5d35a111ff0f5c9f71695ac109772526aa8a2b20ad8032c34ef6649d52a21f3624dcf19b075a9f6d
-
Filesize
597KB
MD5e66eac9328ed6d89e106c5ae7fb8328b
SHA178ef242df2b5bf034729f6768543f7e6817f0351
SHA256862d2aa4bee82bd43aa8906240db0a440d4e929c8be80f0bf1de838014bbb92e
SHA512d53841efd0b8b7bd89b4fc9dfe93e51b9c0469790942249eaf1ba851c52e36a874fb5788f527a8b404cf639e8447e6414dfe09a73856689935f90ccd66da3ed3
-
Filesize
597KB
MD5e66eac9328ed6d89e106c5ae7fb8328b
SHA178ef242df2b5bf034729f6768543f7e6817f0351
SHA256862d2aa4bee82bd43aa8906240db0a440d4e929c8be80f0bf1de838014bbb92e
SHA512d53841efd0b8b7bd89b4fc9dfe93e51b9c0469790942249eaf1ba851c52e36a874fb5788f527a8b404cf639e8447e6414dfe09a73856689935f90ccd66da3ed3
-
Filesize
390KB
MD57cda122d869d11f7c91fe6d606b02747
SHA1ecb87c79b46b997df7e44843a6e0e260aa78a4e7
SHA256d39fbd1875109df5f99ccd3498e534d596e5ea78f8b585ad57958187bf7afff1
SHA512373b7630e51aeca33a844b7aa8013ca5bf8ada992bba64f7e5e9321dad6b8dae0504be517a5c9fb019be90efd6aa11b0b9ec0527682ad54d9ea1097eb7060de7
-
Filesize
390KB
MD57cda122d869d11f7c91fe6d606b02747
SHA1ecb87c79b46b997df7e44843a6e0e260aa78a4e7
SHA256d39fbd1875109df5f99ccd3498e534d596e5ea78f8b585ad57958187bf7afff1
SHA512373b7630e51aeca33a844b7aa8013ca5bf8ada992bba64f7e5e9321dad6b8dae0504be517a5c9fb019be90efd6aa11b0b9ec0527682ad54d9ea1097eb7060de7
-
Filesize
390KB
MD57cda122d869d11f7c91fe6d606b02747
SHA1ecb87c79b46b997df7e44843a6e0e260aa78a4e7
SHA256d39fbd1875109df5f99ccd3498e534d596e5ea78f8b585ad57958187bf7afff1
SHA512373b7630e51aeca33a844b7aa8013ca5bf8ada992bba64f7e5e9321dad6b8dae0504be517a5c9fb019be90efd6aa11b0b9ec0527682ad54d9ea1097eb7060de7
-
Filesize
473KB
MD59a2e8b3986286a2f77e7d9d40f0d6951
SHA1896f348bd33d486ce270e297b88d5e4de480aff1
SHA256a8c4bb37fe1948144330f6245ddb4a0fc37ce85eca660be6dbd15faa7509c260
SHA512f43d26afa879292d0efbd0206e480347251b8361c7e0a4a453dad09166d9098dc23694a03c11f16d8b310ad5b6327382ab2e7cda2bcca1d5fe403ea1037fe261
-
Filesize
473KB
MD59a2e8b3986286a2f77e7d9d40f0d6951
SHA1896f348bd33d486ce270e297b88d5e4de480aff1
SHA256a8c4bb37fe1948144330f6245ddb4a0fc37ce85eca660be6dbd15faa7509c260
SHA512f43d26afa879292d0efbd0206e480347251b8361c7e0a4a453dad09166d9098dc23694a03c11f16d8b310ad5b6327382ab2e7cda2bcca1d5fe403ea1037fe261
-
Filesize
473KB
MD59a2e8b3986286a2f77e7d9d40f0d6951
SHA1896f348bd33d486ce270e297b88d5e4de480aff1
SHA256a8c4bb37fe1948144330f6245ddb4a0fc37ce85eca660be6dbd15faa7509c260
SHA512f43d26afa879292d0efbd0206e480347251b8361c7e0a4a453dad09166d9098dc23694a03c11f16d8b310ad5b6327382ab2e7cda2bcca1d5fe403ea1037fe261