Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe
Resource
win10v2004-20230220-en
General
-
Target
0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe
-
Size
376KB
-
MD5
e82e59f5151530189ba666f8057d8ad1
-
SHA1
588199b81930c8ee8dfa1f735bc01f317ac86f7b
-
SHA256
0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840
-
SHA512
4cd55ccf264fba2f07a22a849137967bd9c4649b61b1fdba23cb83eec2bce9d8cfddef1f6d1a52fee6a9f3fef4ba618e7078b8e95b75abce5413fb16d40643a1
-
SSDEEP
6144:Kyy+bnr+lp0yN90QELzAJe7dkpaqUDxIO79qFOseESrYzM7y:WMr5y90NGckpaqUv7gFOPE87y
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0909038.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a0909038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0909038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0909038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0909038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0909038.exe -
Executes dropped EXE 3 IoCs
pid Process 952 v5920336.exe 1676 a0909038.exe 1852 b0853331.exe -
Loads dropped DLL 5 IoCs
pid Process 1868 0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe 952 v5920336.exe 952 v5920336.exe 952 v5920336.exe 1852 b0853331.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features a0909038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a0909038.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5920336.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5920336.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1676 a0909038.exe 1676 a0909038.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1676 a0909038.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1868 wrote to memory of 952 1868 0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe 27 PID 1868 wrote to memory of 952 1868 0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe 27 PID 1868 wrote to memory of 952 1868 0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe 27 PID 1868 wrote to memory of 952 1868 0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe 27 PID 1868 wrote to memory of 952 1868 0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe 27 PID 1868 wrote to memory of 952 1868 0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe 27 PID 1868 wrote to memory of 952 1868 0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe 27 PID 952 wrote to memory of 1676 952 v5920336.exe 28 PID 952 wrote to memory of 1676 952 v5920336.exe 28 PID 952 wrote to memory of 1676 952 v5920336.exe 28 PID 952 wrote to memory of 1676 952 v5920336.exe 28 PID 952 wrote to memory of 1676 952 v5920336.exe 28 PID 952 wrote to memory of 1676 952 v5920336.exe 28 PID 952 wrote to memory of 1676 952 v5920336.exe 28 PID 952 wrote to memory of 1852 952 v5920336.exe 29 PID 952 wrote to memory of 1852 952 v5920336.exe 29 PID 952 wrote to memory of 1852 952 v5920336.exe 29 PID 952 wrote to memory of 1852 952 v5920336.exe 29 PID 952 wrote to memory of 1852 952 v5920336.exe 29 PID 952 wrote to memory of 1852 952 v5920336.exe 29 PID 952 wrote to memory of 1852 952 v5920336.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe"C:\Users\Admin\AppData\Local\Temp\0296a0143491eb312d35738ed3f67db76f63657ed718fff226c45f17ec9c0840.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5920336.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5920336.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0909038.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0909038.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0853331.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0853331.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1852
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD554dc93e74d5a8f38c843678b25fb6c49
SHA19b65cf39b4a4a25346787c618479cba744e31dfd
SHA256b4db2f5c2e0f27a38c4fa744ae8c91f824fd6ecd6a0b5802902e0813d88b12ed
SHA51298bf2c0c41f1d8a7e333ba69f5845cd0eae8d43c3ce99fd2962c44a862eb04533164dff1fa72139f0f0920bca08f80d6dc0d8097f6a3d5f64bf3fb13ca8c28d4
-
Filesize
204KB
MD554dc93e74d5a8f38c843678b25fb6c49
SHA19b65cf39b4a4a25346787c618479cba744e31dfd
SHA256b4db2f5c2e0f27a38c4fa744ae8c91f824fd6ecd6a0b5802902e0813d88b12ed
SHA51298bf2c0c41f1d8a7e333ba69f5845cd0eae8d43c3ce99fd2962c44a862eb04533164dff1fa72139f0f0920bca08f80d6dc0d8097f6a3d5f64bf3fb13ca8c28d4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284
-
Filesize
204KB
MD554dc93e74d5a8f38c843678b25fb6c49
SHA19b65cf39b4a4a25346787c618479cba744e31dfd
SHA256b4db2f5c2e0f27a38c4fa744ae8c91f824fd6ecd6a0b5802902e0813d88b12ed
SHA51298bf2c0c41f1d8a7e333ba69f5845cd0eae8d43c3ce99fd2962c44a862eb04533164dff1fa72139f0f0920bca08f80d6dc0d8097f6a3d5f64bf3fb13ca8c28d4
-
Filesize
204KB
MD554dc93e74d5a8f38c843678b25fb6c49
SHA19b65cf39b4a4a25346787c618479cba744e31dfd
SHA256b4db2f5c2e0f27a38c4fa744ae8c91f824fd6ecd6a0b5802902e0813d88b12ed
SHA51298bf2c0c41f1d8a7e333ba69f5845cd0eae8d43c3ce99fd2962c44a862eb04533164dff1fa72139f0f0920bca08f80d6dc0d8097f6a3d5f64bf3fb13ca8c28d4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284