Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe
Resource
win10v2004-20230220-en
General
-
Target
0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe
-
Size
747KB
-
MD5
e6637f1ebdb3a5c4daa346526d370a02
-
SHA1
9daba6a073598fda16f75a30363f44c7d6dbadef
-
SHA256
0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069
-
SHA512
e6617b356ec9fde069b31f9edc1bcd6c19a83f4028611444be4717ea003615295a43cd5b0da638dfbd54b987205a31fc6b491854314ded1782b13a9449bab8ce
-
SSDEEP
12288:Cy90s+m/eMwlLt5bTq95SweFFAUAGyCSzafDnHltwEH:Cyr/Un1G99VzOb82
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 98552496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 98552496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 98552496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 98552496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 98552496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 98552496.exe -
Executes dropped EXE 3 IoCs
pid Process 1668 un684523.exe 1736 98552496.exe 1600 rk680708.exe -
Loads dropped DLL 8 IoCs
pid Process 1696 0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe 1668 un684523.exe 1668 un684523.exe 1668 un684523.exe 1736 98552496.exe 1668 un684523.exe 1668 un684523.exe 1600 rk680708.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 98552496.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 98552496.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un684523.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un684523.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1736 98552496.exe 1736 98552496.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1736 98552496.exe Token: SeDebugPrivilege 1600 rk680708.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1668 1696 0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe 27 PID 1696 wrote to memory of 1668 1696 0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe 27 PID 1696 wrote to memory of 1668 1696 0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe 27 PID 1696 wrote to memory of 1668 1696 0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe 27 PID 1696 wrote to memory of 1668 1696 0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe 27 PID 1696 wrote to memory of 1668 1696 0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe 27 PID 1696 wrote to memory of 1668 1696 0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe 27 PID 1668 wrote to memory of 1736 1668 un684523.exe 28 PID 1668 wrote to memory of 1736 1668 un684523.exe 28 PID 1668 wrote to memory of 1736 1668 un684523.exe 28 PID 1668 wrote to memory of 1736 1668 un684523.exe 28 PID 1668 wrote to memory of 1736 1668 un684523.exe 28 PID 1668 wrote to memory of 1736 1668 un684523.exe 28 PID 1668 wrote to memory of 1736 1668 un684523.exe 28 PID 1668 wrote to memory of 1600 1668 un684523.exe 29 PID 1668 wrote to memory of 1600 1668 un684523.exe 29 PID 1668 wrote to memory of 1600 1668 un684523.exe 29 PID 1668 wrote to memory of 1600 1668 un684523.exe 29 PID 1668 wrote to memory of 1600 1668 un684523.exe 29 PID 1668 wrote to memory of 1600 1668 un684523.exe 29 PID 1668 wrote to memory of 1600 1668 un684523.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe"C:\Users\Admin\AppData\Local\Temp\0a233e08b6b8f9f6eff42cafc54c237ac3ad7415cecb32cfa5ed267ccb096069.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684523.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684523.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\98552496.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\98552496.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680708.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680708.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD57f88755be992cf9de99a0b1dcc63ddd2
SHA1ea498aea45df90fefa816fd66a9f09fb6353ed12
SHA2560f68733e5ac2f3416f22b542e587c7c176e3a6ed3315b00c87453a24aeb3240a
SHA51206996ac45d01c1acbb988b3c9ba54a242a5630b97056aa7198c30466cc9f794b705ab74574f6c00d032d032995d5a916c782aa11dc9af629d8173d6dee7b9ccd
-
Filesize
592KB
MD57f88755be992cf9de99a0b1dcc63ddd2
SHA1ea498aea45df90fefa816fd66a9f09fb6353ed12
SHA2560f68733e5ac2f3416f22b542e587c7c176e3a6ed3315b00c87453a24aeb3240a
SHA51206996ac45d01c1acbb988b3c9ba54a242a5630b97056aa7198c30466cc9f794b705ab74574f6c00d032d032995d5a916c782aa11dc9af629d8173d6dee7b9ccd
-
Filesize
377KB
MD5d04a92e893cb4daed583aa057e4e2b57
SHA1a962fb837d6b02b69c81d3e9f05a78ec75b77aa1
SHA256ba64567e94cb27afe3466aa007f2414aa63ac458f3696bafce068db61c60c1a8
SHA512990af31624391fafab1ef797cbb230707ace0614b78ea7d0d505d63b9636f3966c3638b1c4eefff81c8fba080775f0e488417e55c7c2574796f6894d00bd67f5
-
Filesize
377KB
MD5d04a92e893cb4daed583aa057e4e2b57
SHA1a962fb837d6b02b69c81d3e9f05a78ec75b77aa1
SHA256ba64567e94cb27afe3466aa007f2414aa63ac458f3696bafce068db61c60c1a8
SHA512990af31624391fafab1ef797cbb230707ace0614b78ea7d0d505d63b9636f3966c3638b1c4eefff81c8fba080775f0e488417e55c7c2574796f6894d00bd67f5
-
Filesize
377KB
MD5d04a92e893cb4daed583aa057e4e2b57
SHA1a962fb837d6b02b69c81d3e9f05a78ec75b77aa1
SHA256ba64567e94cb27afe3466aa007f2414aa63ac458f3696bafce068db61c60c1a8
SHA512990af31624391fafab1ef797cbb230707ace0614b78ea7d0d505d63b9636f3966c3638b1c4eefff81c8fba080775f0e488417e55c7c2574796f6894d00bd67f5
-
Filesize
459KB
MD593a6b72ea793f1093365b93644017cfe
SHA1295d0803fc3bb5d72fd61a1dae2766baa61a3630
SHA2568d549a944914c71a22ac0799b319c6c71763c74010f8dd722383a8d5a8a03e0b
SHA512166dc842a914af73865f36d855d0a69951df473521578d2c91b0cef722bfe11a5d52290e3fd9e5180966604d0e71be1ed00a8dc832868470b32d56ead95854e4
-
Filesize
459KB
MD593a6b72ea793f1093365b93644017cfe
SHA1295d0803fc3bb5d72fd61a1dae2766baa61a3630
SHA2568d549a944914c71a22ac0799b319c6c71763c74010f8dd722383a8d5a8a03e0b
SHA512166dc842a914af73865f36d855d0a69951df473521578d2c91b0cef722bfe11a5d52290e3fd9e5180966604d0e71be1ed00a8dc832868470b32d56ead95854e4
-
Filesize
459KB
MD593a6b72ea793f1093365b93644017cfe
SHA1295d0803fc3bb5d72fd61a1dae2766baa61a3630
SHA2568d549a944914c71a22ac0799b319c6c71763c74010f8dd722383a8d5a8a03e0b
SHA512166dc842a914af73865f36d855d0a69951df473521578d2c91b0cef722bfe11a5d52290e3fd9e5180966604d0e71be1ed00a8dc832868470b32d56ead95854e4
-
Filesize
592KB
MD57f88755be992cf9de99a0b1dcc63ddd2
SHA1ea498aea45df90fefa816fd66a9f09fb6353ed12
SHA2560f68733e5ac2f3416f22b542e587c7c176e3a6ed3315b00c87453a24aeb3240a
SHA51206996ac45d01c1acbb988b3c9ba54a242a5630b97056aa7198c30466cc9f794b705ab74574f6c00d032d032995d5a916c782aa11dc9af629d8173d6dee7b9ccd
-
Filesize
592KB
MD57f88755be992cf9de99a0b1dcc63ddd2
SHA1ea498aea45df90fefa816fd66a9f09fb6353ed12
SHA2560f68733e5ac2f3416f22b542e587c7c176e3a6ed3315b00c87453a24aeb3240a
SHA51206996ac45d01c1acbb988b3c9ba54a242a5630b97056aa7198c30466cc9f794b705ab74574f6c00d032d032995d5a916c782aa11dc9af629d8173d6dee7b9ccd
-
Filesize
377KB
MD5d04a92e893cb4daed583aa057e4e2b57
SHA1a962fb837d6b02b69c81d3e9f05a78ec75b77aa1
SHA256ba64567e94cb27afe3466aa007f2414aa63ac458f3696bafce068db61c60c1a8
SHA512990af31624391fafab1ef797cbb230707ace0614b78ea7d0d505d63b9636f3966c3638b1c4eefff81c8fba080775f0e488417e55c7c2574796f6894d00bd67f5
-
Filesize
377KB
MD5d04a92e893cb4daed583aa057e4e2b57
SHA1a962fb837d6b02b69c81d3e9f05a78ec75b77aa1
SHA256ba64567e94cb27afe3466aa007f2414aa63ac458f3696bafce068db61c60c1a8
SHA512990af31624391fafab1ef797cbb230707ace0614b78ea7d0d505d63b9636f3966c3638b1c4eefff81c8fba080775f0e488417e55c7c2574796f6894d00bd67f5
-
Filesize
377KB
MD5d04a92e893cb4daed583aa057e4e2b57
SHA1a962fb837d6b02b69c81d3e9f05a78ec75b77aa1
SHA256ba64567e94cb27afe3466aa007f2414aa63ac458f3696bafce068db61c60c1a8
SHA512990af31624391fafab1ef797cbb230707ace0614b78ea7d0d505d63b9636f3966c3638b1c4eefff81c8fba080775f0e488417e55c7c2574796f6894d00bd67f5
-
Filesize
459KB
MD593a6b72ea793f1093365b93644017cfe
SHA1295d0803fc3bb5d72fd61a1dae2766baa61a3630
SHA2568d549a944914c71a22ac0799b319c6c71763c74010f8dd722383a8d5a8a03e0b
SHA512166dc842a914af73865f36d855d0a69951df473521578d2c91b0cef722bfe11a5d52290e3fd9e5180966604d0e71be1ed00a8dc832868470b32d56ead95854e4
-
Filesize
459KB
MD593a6b72ea793f1093365b93644017cfe
SHA1295d0803fc3bb5d72fd61a1dae2766baa61a3630
SHA2568d549a944914c71a22ac0799b319c6c71763c74010f8dd722383a8d5a8a03e0b
SHA512166dc842a914af73865f36d855d0a69951df473521578d2c91b0cef722bfe11a5d52290e3fd9e5180966604d0e71be1ed00a8dc832868470b32d56ead95854e4
-
Filesize
459KB
MD593a6b72ea793f1093365b93644017cfe
SHA1295d0803fc3bb5d72fd61a1dae2766baa61a3630
SHA2568d549a944914c71a22ac0799b319c6c71763c74010f8dd722383a8d5a8a03e0b
SHA512166dc842a914af73865f36d855d0a69951df473521578d2c91b0cef722bfe11a5d52290e3fd9e5180966604d0e71be1ed00a8dc832868470b32d56ead95854e4