Analysis
-
max time kernel
157s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe
Resource
win10v2004-20230220-en
General
-
Target
0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe
-
Size
747KB
-
MD5
81e00846aa9b7e0a840bea7baa201a55
-
SHA1
c25051f8ceb8e0cc7d11f554fae6c83d84f1509f
-
SHA256
0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7
-
SHA512
e225e22c8d208b66cebd7151d62a60b3de3e3d9b5894589e0b340d2e4863ca02bbbff7bf40a9b94c00bbb473ef2266248ee3e12d73a2a4ade24a9e50a651bf35
-
SSDEEP
12288:Ry90gtuUreMzP3YBilaZd/Azet5O9V7y+UyW/WvUjOGKo5Rf:RyBtuWeAPIsaZxvMV2+VtsjxK2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 64297555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 64297555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 64297555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 64297555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 64297555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 64297555.exe -
Executes dropped EXE 3 IoCs
pid Process 2020 un871922.exe 1340 64297555.exe 1528 rk952299.exe -
Loads dropped DLL 8 IoCs
pid Process 1188 0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe 2020 un871922.exe 2020 un871922.exe 2020 un871922.exe 1340 64297555.exe 2020 un871922.exe 2020 un871922.exe 1528 rk952299.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 64297555.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 64297555.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un871922.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un871922.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1340 64297555.exe 1340 64297555.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1340 64297555.exe Token: SeDebugPrivilege 1528 rk952299.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2020 1188 0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe 28 PID 1188 wrote to memory of 2020 1188 0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe 28 PID 1188 wrote to memory of 2020 1188 0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe 28 PID 1188 wrote to memory of 2020 1188 0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe 28 PID 1188 wrote to memory of 2020 1188 0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe 28 PID 1188 wrote to memory of 2020 1188 0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe 28 PID 1188 wrote to memory of 2020 1188 0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe 28 PID 2020 wrote to memory of 1340 2020 un871922.exe 29 PID 2020 wrote to memory of 1340 2020 un871922.exe 29 PID 2020 wrote to memory of 1340 2020 un871922.exe 29 PID 2020 wrote to memory of 1340 2020 un871922.exe 29 PID 2020 wrote to memory of 1340 2020 un871922.exe 29 PID 2020 wrote to memory of 1340 2020 un871922.exe 29 PID 2020 wrote to memory of 1340 2020 un871922.exe 29 PID 2020 wrote to memory of 1528 2020 un871922.exe 30 PID 2020 wrote to memory of 1528 2020 un871922.exe 30 PID 2020 wrote to memory of 1528 2020 un871922.exe 30 PID 2020 wrote to memory of 1528 2020 un871922.exe 30 PID 2020 wrote to memory of 1528 2020 un871922.exe 30 PID 2020 wrote to memory of 1528 2020 un871922.exe 30 PID 2020 wrote to memory of 1528 2020 un871922.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe"C:\Users\Admin\AppData\Local\Temp\0042ad106ee5658000c4d841d319ee1a49154ffa63a6caa749e45253909cf1a7.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un871922.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un871922.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\64297555.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\64297555.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952299.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk952299.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5a8a79f3f5d4dd35e8ea5c0347dffdcd6
SHA1d1c3b6660235a972475ee2b70c2f597d4fca5c16
SHA256a2f976f7d4359aa6db8beb24291336cfc0b5484c0f010de6d81cf2e08ec787d7
SHA51227adec55f877ed6a7154eceb770a58c544fe7f11ce5156459cfda74449fd91f14d25b05a8f1083f2045cdda3fb6435a1834cf337717f204b5879283c5bd681c9
-
Filesize
593KB
MD5a8a79f3f5d4dd35e8ea5c0347dffdcd6
SHA1d1c3b6660235a972475ee2b70c2f597d4fca5c16
SHA256a2f976f7d4359aa6db8beb24291336cfc0b5484c0f010de6d81cf2e08ec787d7
SHA51227adec55f877ed6a7154eceb770a58c544fe7f11ce5156459cfda74449fd91f14d25b05a8f1083f2045cdda3fb6435a1834cf337717f204b5879283c5bd681c9
-
Filesize
378KB
MD53be72b7202e08d841650cf337ec68bd9
SHA1ea312efe563f844156aac0b17637558435cb989d
SHA2561aefdceb45b8fa201e4d8eda311f9a0577f35c21a0f48428bab5701e88b6c700
SHA512828a7f357752c8e773b5f10fd761f9e9898200487ad149d75236e3850d91631b78836015d3ef4988f32c8c74085a4c134d44703bdab338531571b383a59e9abf
-
Filesize
378KB
MD53be72b7202e08d841650cf337ec68bd9
SHA1ea312efe563f844156aac0b17637558435cb989d
SHA2561aefdceb45b8fa201e4d8eda311f9a0577f35c21a0f48428bab5701e88b6c700
SHA512828a7f357752c8e773b5f10fd761f9e9898200487ad149d75236e3850d91631b78836015d3ef4988f32c8c74085a4c134d44703bdab338531571b383a59e9abf
-
Filesize
378KB
MD53be72b7202e08d841650cf337ec68bd9
SHA1ea312efe563f844156aac0b17637558435cb989d
SHA2561aefdceb45b8fa201e4d8eda311f9a0577f35c21a0f48428bab5701e88b6c700
SHA512828a7f357752c8e773b5f10fd761f9e9898200487ad149d75236e3850d91631b78836015d3ef4988f32c8c74085a4c134d44703bdab338531571b383a59e9abf
-
Filesize
460KB
MD5e4c85364aa3984c1ff318f674f29ecd6
SHA136f377e17933812daedfb8093490261b8459e680
SHA2566d0c70413c5e227917a07f248d727e80cc5225e7720e01cfe4d418611379319d
SHA512c8c2eb62c1ef5c700cc7b0a763738ffb6c824428fcacbebadac68279e6d7f7453818ffe751d0d6b0435b2c07f12502384ed69e82748aeeb5ce99944f8ec6d352
-
Filesize
460KB
MD5e4c85364aa3984c1ff318f674f29ecd6
SHA136f377e17933812daedfb8093490261b8459e680
SHA2566d0c70413c5e227917a07f248d727e80cc5225e7720e01cfe4d418611379319d
SHA512c8c2eb62c1ef5c700cc7b0a763738ffb6c824428fcacbebadac68279e6d7f7453818ffe751d0d6b0435b2c07f12502384ed69e82748aeeb5ce99944f8ec6d352
-
Filesize
460KB
MD5e4c85364aa3984c1ff318f674f29ecd6
SHA136f377e17933812daedfb8093490261b8459e680
SHA2566d0c70413c5e227917a07f248d727e80cc5225e7720e01cfe4d418611379319d
SHA512c8c2eb62c1ef5c700cc7b0a763738ffb6c824428fcacbebadac68279e6d7f7453818ffe751d0d6b0435b2c07f12502384ed69e82748aeeb5ce99944f8ec6d352
-
Filesize
593KB
MD5a8a79f3f5d4dd35e8ea5c0347dffdcd6
SHA1d1c3b6660235a972475ee2b70c2f597d4fca5c16
SHA256a2f976f7d4359aa6db8beb24291336cfc0b5484c0f010de6d81cf2e08ec787d7
SHA51227adec55f877ed6a7154eceb770a58c544fe7f11ce5156459cfda74449fd91f14d25b05a8f1083f2045cdda3fb6435a1834cf337717f204b5879283c5bd681c9
-
Filesize
593KB
MD5a8a79f3f5d4dd35e8ea5c0347dffdcd6
SHA1d1c3b6660235a972475ee2b70c2f597d4fca5c16
SHA256a2f976f7d4359aa6db8beb24291336cfc0b5484c0f010de6d81cf2e08ec787d7
SHA51227adec55f877ed6a7154eceb770a58c544fe7f11ce5156459cfda74449fd91f14d25b05a8f1083f2045cdda3fb6435a1834cf337717f204b5879283c5bd681c9
-
Filesize
378KB
MD53be72b7202e08d841650cf337ec68bd9
SHA1ea312efe563f844156aac0b17637558435cb989d
SHA2561aefdceb45b8fa201e4d8eda311f9a0577f35c21a0f48428bab5701e88b6c700
SHA512828a7f357752c8e773b5f10fd761f9e9898200487ad149d75236e3850d91631b78836015d3ef4988f32c8c74085a4c134d44703bdab338531571b383a59e9abf
-
Filesize
378KB
MD53be72b7202e08d841650cf337ec68bd9
SHA1ea312efe563f844156aac0b17637558435cb989d
SHA2561aefdceb45b8fa201e4d8eda311f9a0577f35c21a0f48428bab5701e88b6c700
SHA512828a7f357752c8e773b5f10fd761f9e9898200487ad149d75236e3850d91631b78836015d3ef4988f32c8c74085a4c134d44703bdab338531571b383a59e9abf
-
Filesize
378KB
MD53be72b7202e08d841650cf337ec68bd9
SHA1ea312efe563f844156aac0b17637558435cb989d
SHA2561aefdceb45b8fa201e4d8eda311f9a0577f35c21a0f48428bab5701e88b6c700
SHA512828a7f357752c8e773b5f10fd761f9e9898200487ad149d75236e3850d91631b78836015d3ef4988f32c8c74085a4c134d44703bdab338531571b383a59e9abf
-
Filesize
460KB
MD5e4c85364aa3984c1ff318f674f29ecd6
SHA136f377e17933812daedfb8093490261b8459e680
SHA2566d0c70413c5e227917a07f248d727e80cc5225e7720e01cfe4d418611379319d
SHA512c8c2eb62c1ef5c700cc7b0a763738ffb6c824428fcacbebadac68279e6d7f7453818ffe751d0d6b0435b2c07f12502384ed69e82748aeeb5ce99944f8ec6d352
-
Filesize
460KB
MD5e4c85364aa3984c1ff318f674f29ecd6
SHA136f377e17933812daedfb8093490261b8459e680
SHA2566d0c70413c5e227917a07f248d727e80cc5225e7720e01cfe4d418611379319d
SHA512c8c2eb62c1ef5c700cc7b0a763738ffb6c824428fcacbebadac68279e6d7f7453818ffe751d0d6b0435b2c07f12502384ed69e82748aeeb5ce99944f8ec6d352
-
Filesize
460KB
MD5e4c85364aa3984c1ff318f674f29ecd6
SHA136f377e17933812daedfb8093490261b8459e680
SHA2566d0c70413c5e227917a07f248d727e80cc5225e7720e01cfe4d418611379319d
SHA512c8c2eb62c1ef5c700cc7b0a763738ffb6c824428fcacbebadac68279e6d7f7453818ffe751d0d6b0435b2c07f12502384ed69e82748aeeb5ce99944f8ec6d352