Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe
Resource
win10v2004-20230220-en
General
-
Target
33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe
-
Size
701KB
-
MD5
243456c830cbe264025309d40192fdfd
-
SHA1
0211a08db62e814a81ae6000e6d106e93371335e
-
SHA256
33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a
-
SHA512
5303d2d6629704b9eea961b43ce92a2da3a191055d510dc93fcba251dabf461b71c6f8383f01cf81fd25e666774aa3046545d84cfee3c53980dd2ca0fa9ebaa6
-
SSDEEP
12288:iy909Vl56+rkrV/jriBpr3FDDjiDD+m5boAwXthlGiArHzPRiBCf5sPY:iyiTdgVuBpZDuDD+m5EAwoJzPRiBCRsg
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 31151928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 31151928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 31151928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 31151928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 31151928.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 31151928.exe -
Executes dropped EXE 3 IoCs
pid Process 1836 un611357.exe 976 31151928.exe 1624 rk613042.exe -
Loads dropped DLL 8 IoCs
pid Process 1704 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe 1836 un611357.exe 1836 un611357.exe 1836 un611357.exe 976 31151928.exe 1836 un611357.exe 1836 un611357.exe 1624 rk613042.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 31151928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 31151928.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un611357.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un611357.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 976 31151928.exe 976 31151928.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 976 31151928.exe Token: SeDebugPrivilege 1624 rk613042.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1836 1704 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe 28 PID 1704 wrote to memory of 1836 1704 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe 28 PID 1704 wrote to memory of 1836 1704 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe 28 PID 1704 wrote to memory of 1836 1704 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe 28 PID 1704 wrote to memory of 1836 1704 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe 28 PID 1704 wrote to memory of 1836 1704 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe 28 PID 1704 wrote to memory of 1836 1704 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe 28 PID 1836 wrote to memory of 976 1836 un611357.exe 29 PID 1836 wrote to memory of 976 1836 un611357.exe 29 PID 1836 wrote to memory of 976 1836 un611357.exe 29 PID 1836 wrote to memory of 976 1836 un611357.exe 29 PID 1836 wrote to memory of 976 1836 un611357.exe 29 PID 1836 wrote to memory of 976 1836 un611357.exe 29 PID 1836 wrote to memory of 976 1836 un611357.exe 29 PID 1836 wrote to memory of 1624 1836 un611357.exe 30 PID 1836 wrote to memory of 1624 1836 un611357.exe 30 PID 1836 wrote to memory of 1624 1836 un611357.exe 30 PID 1836 wrote to memory of 1624 1836 un611357.exe 30 PID 1836 wrote to memory of 1624 1836 un611357.exe 30 PID 1836 wrote to memory of 1624 1836 un611357.exe 30 PID 1836 wrote to memory of 1624 1836 un611357.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe"C:\Users\Admin\AppData\Local\Temp\33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un611357.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un611357.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\31151928.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\31151928.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613042.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613042.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD58dc485b769c5e0680d72419d2b568f19
SHA12c51522b756d0f4a5a93427c4701314682d34a34
SHA2563342ad3abb0a858f8edeed019594bb3b05d6829439b4e9ecf8e3567c51629e87
SHA5120d600949ff6a02c51d48e0b5ce02dfca66c3cfeeb11575987be3461bde682a01dce7d8a2f62b2618fc6b1683fae4d08cc82bc909f3c0d1a05147a5553a00f5b5
-
Filesize
547KB
MD58dc485b769c5e0680d72419d2b568f19
SHA12c51522b756d0f4a5a93427c4701314682d34a34
SHA2563342ad3abb0a858f8edeed019594bb3b05d6829439b4e9ecf8e3567c51629e87
SHA5120d600949ff6a02c51d48e0b5ce02dfca66c3cfeeb11575987be3461bde682a01dce7d8a2f62b2618fc6b1683fae4d08cc82bc909f3c0d1a05147a5553a00f5b5
-
Filesize
269KB
MD51654ae14cb472a918c89e1501fa4fff6
SHA12b0a6dbee5fc721b601428f45820c9dbb04b583d
SHA25676dbce94cd332414cb9f7acd36ad001fd73f630bdcc52705ee1c31d80ec4ecbb
SHA51265d00d17ca4249cca70ac64e3861817a6970fd2aec11180f57bc2cf09f0f4848d967d56e25f74b289099393978d2cbe92b00fbeb84d1951af13fa50bb9c60674
-
Filesize
269KB
MD51654ae14cb472a918c89e1501fa4fff6
SHA12b0a6dbee5fc721b601428f45820c9dbb04b583d
SHA25676dbce94cd332414cb9f7acd36ad001fd73f630bdcc52705ee1c31d80ec4ecbb
SHA51265d00d17ca4249cca70ac64e3861817a6970fd2aec11180f57bc2cf09f0f4848d967d56e25f74b289099393978d2cbe92b00fbeb84d1951af13fa50bb9c60674
-
Filesize
269KB
MD51654ae14cb472a918c89e1501fa4fff6
SHA12b0a6dbee5fc721b601428f45820c9dbb04b583d
SHA25676dbce94cd332414cb9f7acd36ad001fd73f630bdcc52705ee1c31d80ec4ecbb
SHA51265d00d17ca4249cca70ac64e3861817a6970fd2aec11180f57bc2cf09f0f4848d967d56e25f74b289099393978d2cbe92b00fbeb84d1951af13fa50bb9c60674
-
Filesize
353KB
MD5c8aa4148478bd90aa2efd94ac27b46be
SHA1bc4f4ed76b9500261e46244f3f530480c8e172c1
SHA256cf6fcc0f32a9ea206c72a17a98a9c6b3835090dd35c65b9755c7d863473cb05b
SHA512da54b393a687c43829c847040fa17284c39b5e4dfca8f4062bfa2a2dc5870cffdb9201fee67c03ff7b630e04fca5894bae4f5625815c649bb85e14f21bbc1cc2
-
Filesize
353KB
MD5c8aa4148478bd90aa2efd94ac27b46be
SHA1bc4f4ed76b9500261e46244f3f530480c8e172c1
SHA256cf6fcc0f32a9ea206c72a17a98a9c6b3835090dd35c65b9755c7d863473cb05b
SHA512da54b393a687c43829c847040fa17284c39b5e4dfca8f4062bfa2a2dc5870cffdb9201fee67c03ff7b630e04fca5894bae4f5625815c649bb85e14f21bbc1cc2
-
Filesize
353KB
MD5c8aa4148478bd90aa2efd94ac27b46be
SHA1bc4f4ed76b9500261e46244f3f530480c8e172c1
SHA256cf6fcc0f32a9ea206c72a17a98a9c6b3835090dd35c65b9755c7d863473cb05b
SHA512da54b393a687c43829c847040fa17284c39b5e4dfca8f4062bfa2a2dc5870cffdb9201fee67c03ff7b630e04fca5894bae4f5625815c649bb85e14f21bbc1cc2
-
Filesize
547KB
MD58dc485b769c5e0680d72419d2b568f19
SHA12c51522b756d0f4a5a93427c4701314682d34a34
SHA2563342ad3abb0a858f8edeed019594bb3b05d6829439b4e9ecf8e3567c51629e87
SHA5120d600949ff6a02c51d48e0b5ce02dfca66c3cfeeb11575987be3461bde682a01dce7d8a2f62b2618fc6b1683fae4d08cc82bc909f3c0d1a05147a5553a00f5b5
-
Filesize
547KB
MD58dc485b769c5e0680d72419d2b568f19
SHA12c51522b756d0f4a5a93427c4701314682d34a34
SHA2563342ad3abb0a858f8edeed019594bb3b05d6829439b4e9ecf8e3567c51629e87
SHA5120d600949ff6a02c51d48e0b5ce02dfca66c3cfeeb11575987be3461bde682a01dce7d8a2f62b2618fc6b1683fae4d08cc82bc909f3c0d1a05147a5553a00f5b5
-
Filesize
269KB
MD51654ae14cb472a918c89e1501fa4fff6
SHA12b0a6dbee5fc721b601428f45820c9dbb04b583d
SHA25676dbce94cd332414cb9f7acd36ad001fd73f630bdcc52705ee1c31d80ec4ecbb
SHA51265d00d17ca4249cca70ac64e3861817a6970fd2aec11180f57bc2cf09f0f4848d967d56e25f74b289099393978d2cbe92b00fbeb84d1951af13fa50bb9c60674
-
Filesize
269KB
MD51654ae14cb472a918c89e1501fa4fff6
SHA12b0a6dbee5fc721b601428f45820c9dbb04b583d
SHA25676dbce94cd332414cb9f7acd36ad001fd73f630bdcc52705ee1c31d80ec4ecbb
SHA51265d00d17ca4249cca70ac64e3861817a6970fd2aec11180f57bc2cf09f0f4848d967d56e25f74b289099393978d2cbe92b00fbeb84d1951af13fa50bb9c60674
-
Filesize
269KB
MD51654ae14cb472a918c89e1501fa4fff6
SHA12b0a6dbee5fc721b601428f45820c9dbb04b583d
SHA25676dbce94cd332414cb9f7acd36ad001fd73f630bdcc52705ee1c31d80ec4ecbb
SHA51265d00d17ca4249cca70ac64e3861817a6970fd2aec11180f57bc2cf09f0f4848d967d56e25f74b289099393978d2cbe92b00fbeb84d1951af13fa50bb9c60674
-
Filesize
353KB
MD5c8aa4148478bd90aa2efd94ac27b46be
SHA1bc4f4ed76b9500261e46244f3f530480c8e172c1
SHA256cf6fcc0f32a9ea206c72a17a98a9c6b3835090dd35c65b9755c7d863473cb05b
SHA512da54b393a687c43829c847040fa17284c39b5e4dfca8f4062bfa2a2dc5870cffdb9201fee67c03ff7b630e04fca5894bae4f5625815c649bb85e14f21bbc1cc2
-
Filesize
353KB
MD5c8aa4148478bd90aa2efd94ac27b46be
SHA1bc4f4ed76b9500261e46244f3f530480c8e172c1
SHA256cf6fcc0f32a9ea206c72a17a98a9c6b3835090dd35c65b9755c7d863473cb05b
SHA512da54b393a687c43829c847040fa17284c39b5e4dfca8f4062bfa2a2dc5870cffdb9201fee67c03ff7b630e04fca5894bae4f5625815c649bb85e14f21bbc1cc2
-
Filesize
353KB
MD5c8aa4148478bd90aa2efd94ac27b46be
SHA1bc4f4ed76b9500261e46244f3f530480c8e172c1
SHA256cf6fcc0f32a9ea206c72a17a98a9c6b3835090dd35c65b9755c7d863473cb05b
SHA512da54b393a687c43829c847040fa17284c39b5e4dfca8f4062bfa2a2dc5870cffdb9201fee67c03ff7b630e04fca5894bae4f5625815c649bb85e14f21bbc1cc2