Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe
Resource
win10v2004-20230220-en
General
-
Target
3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe
-
Size
694KB
-
MD5
c573fbc09828359cd16daee9a7b4ed96
-
SHA1
29d949ce761176d1a2cbd98da256bc863110b28d
-
SHA256
3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9
-
SHA512
a3503198270f42bc6fa343f3e9ebad2fc61b97efd30126ef0c65804fd86f190f9330015b465f9f2b2d978bfd0b7e7a392f5761617b347a04d4739c22e5b2525b
-
SSDEEP
12288:Fy90sfJ12HiqalR3PbTZyB+Ibd1srBeAjWK1gmOQ4ZRhuyHO0iDqe7t0eNhNws2:FyLh12CHlR3Pm+IZ1sF7+mOTj1n1e7t2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 38003302.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 38003302.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 38003302.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 38003302.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 38003302.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 38003302.exe -
Executes dropped EXE 3 IoCs
pid Process 848 un598197.exe 1444 38003302.exe 1960 rk301490.exe -
Loads dropped DLL 8 IoCs
pid Process 1240 3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe 848 un598197.exe 848 un598197.exe 848 un598197.exe 1444 38003302.exe 848 un598197.exe 848 un598197.exe 1960 rk301490.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 38003302.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 38003302.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un598197.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un598197.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1444 38003302.exe 1444 38003302.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1444 38003302.exe Token: SeDebugPrivilege 1960 rk301490.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1240 wrote to memory of 848 1240 3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe 27 PID 1240 wrote to memory of 848 1240 3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe 27 PID 1240 wrote to memory of 848 1240 3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe 27 PID 1240 wrote to memory of 848 1240 3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe 27 PID 1240 wrote to memory of 848 1240 3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe 27 PID 1240 wrote to memory of 848 1240 3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe 27 PID 1240 wrote to memory of 848 1240 3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe 27 PID 848 wrote to memory of 1444 848 un598197.exe 28 PID 848 wrote to memory of 1444 848 un598197.exe 28 PID 848 wrote to memory of 1444 848 un598197.exe 28 PID 848 wrote to memory of 1444 848 un598197.exe 28 PID 848 wrote to memory of 1444 848 un598197.exe 28 PID 848 wrote to memory of 1444 848 un598197.exe 28 PID 848 wrote to memory of 1444 848 un598197.exe 28 PID 848 wrote to memory of 1960 848 un598197.exe 29 PID 848 wrote to memory of 1960 848 un598197.exe 29 PID 848 wrote to memory of 1960 848 un598197.exe 29 PID 848 wrote to memory of 1960 848 un598197.exe 29 PID 848 wrote to memory of 1960 848 un598197.exe 29 PID 848 wrote to memory of 1960 848 un598197.exe 29 PID 848 wrote to memory of 1960 848 un598197.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe"C:\Users\Admin\AppData\Local\Temp\3b43ff30cd4dd2512e4984e576752d6e7a0731d3b5901a5f99ee1fb84b3b4ca9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598197.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598197.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38003302.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38003302.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk301490.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk301490.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5acd099afc15fbb2b7a6847a0e764fbf4
SHA18fb51d14a122881e52d87decede6a132955d6698
SHA256be97a486f19a5617e4a2150e86813d8806c8e24c4111f38f01a83a6637bdb45e
SHA51277310aaacdab04465712fd1c4840a01bf52a24a99e432dd46bd494207e73a9f026dd47da8c3d35314dfe061ba5e1b1540a98a4fd87775f21211ac5df96ac8e4e
-
Filesize
540KB
MD5acd099afc15fbb2b7a6847a0e764fbf4
SHA18fb51d14a122881e52d87decede6a132955d6698
SHA256be97a486f19a5617e4a2150e86813d8806c8e24c4111f38f01a83a6637bdb45e
SHA51277310aaacdab04465712fd1c4840a01bf52a24a99e432dd46bd494207e73a9f026dd47da8c3d35314dfe061ba5e1b1540a98a4fd87775f21211ac5df96ac8e4e
-
Filesize
264KB
MD5eaa0c6aa9904cdf629bbe8b04114aced
SHA1932b165a8ee0386669d02d975583e804e5d4ce07
SHA2560da95ba6b6470a0ab806ac37e2a663cc30720305b6083cf7e3c1b6b069cd9411
SHA5128e9deb29e3ec0a230e62121781c752f93c0be45cfd7c65e1a7a3ca0999fc9a6d1e4a6401efed1290a74701ec07ecc53e742cfa03f71ea0652a535365eac5d4b3
-
Filesize
264KB
MD5eaa0c6aa9904cdf629bbe8b04114aced
SHA1932b165a8ee0386669d02d975583e804e5d4ce07
SHA2560da95ba6b6470a0ab806ac37e2a663cc30720305b6083cf7e3c1b6b069cd9411
SHA5128e9deb29e3ec0a230e62121781c752f93c0be45cfd7c65e1a7a3ca0999fc9a6d1e4a6401efed1290a74701ec07ecc53e742cfa03f71ea0652a535365eac5d4b3
-
Filesize
264KB
MD5eaa0c6aa9904cdf629bbe8b04114aced
SHA1932b165a8ee0386669d02d975583e804e5d4ce07
SHA2560da95ba6b6470a0ab806ac37e2a663cc30720305b6083cf7e3c1b6b069cd9411
SHA5128e9deb29e3ec0a230e62121781c752f93c0be45cfd7c65e1a7a3ca0999fc9a6d1e4a6401efed1290a74701ec07ecc53e742cfa03f71ea0652a535365eac5d4b3
-
Filesize
348KB
MD508333d96633502ade11a06ce814b8aa3
SHA13c8b110b39638900b52153726e31a4a58cdd516d
SHA25647e75c49b4c95772724c09f4ce610018dac6d5412f26bb3e3209d8a17c375518
SHA5121cb8ac98f28209e19cd942aa3dd5a408e376c3a26388d31b03cbef9d479eda493880840df410689c477616767226841d5f7dd065084189925ba415a4e0c7332f
-
Filesize
348KB
MD508333d96633502ade11a06ce814b8aa3
SHA13c8b110b39638900b52153726e31a4a58cdd516d
SHA25647e75c49b4c95772724c09f4ce610018dac6d5412f26bb3e3209d8a17c375518
SHA5121cb8ac98f28209e19cd942aa3dd5a408e376c3a26388d31b03cbef9d479eda493880840df410689c477616767226841d5f7dd065084189925ba415a4e0c7332f
-
Filesize
348KB
MD508333d96633502ade11a06ce814b8aa3
SHA13c8b110b39638900b52153726e31a4a58cdd516d
SHA25647e75c49b4c95772724c09f4ce610018dac6d5412f26bb3e3209d8a17c375518
SHA5121cb8ac98f28209e19cd942aa3dd5a408e376c3a26388d31b03cbef9d479eda493880840df410689c477616767226841d5f7dd065084189925ba415a4e0c7332f
-
Filesize
540KB
MD5acd099afc15fbb2b7a6847a0e764fbf4
SHA18fb51d14a122881e52d87decede6a132955d6698
SHA256be97a486f19a5617e4a2150e86813d8806c8e24c4111f38f01a83a6637bdb45e
SHA51277310aaacdab04465712fd1c4840a01bf52a24a99e432dd46bd494207e73a9f026dd47da8c3d35314dfe061ba5e1b1540a98a4fd87775f21211ac5df96ac8e4e
-
Filesize
540KB
MD5acd099afc15fbb2b7a6847a0e764fbf4
SHA18fb51d14a122881e52d87decede6a132955d6698
SHA256be97a486f19a5617e4a2150e86813d8806c8e24c4111f38f01a83a6637bdb45e
SHA51277310aaacdab04465712fd1c4840a01bf52a24a99e432dd46bd494207e73a9f026dd47da8c3d35314dfe061ba5e1b1540a98a4fd87775f21211ac5df96ac8e4e
-
Filesize
264KB
MD5eaa0c6aa9904cdf629bbe8b04114aced
SHA1932b165a8ee0386669d02d975583e804e5d4ce07
SHA2560da95ba6b6470a0ab806ac37e2a663cc30720305b6083cf7e3c1b6b069cd9411
SHA5128e9deb29e3ec0a230e62121781c752f93c0be45cfd7c65e1a7a3ca0999fc9a6d1e4a6401efed1290a74701ec07ecc53e742cfa03f71ea0652a535365eac5d4b3
-
Filesize
264KB
MD5eaa0c6aa9904cdf629bbe8b04114aced
SHA1932b165a8ee0386669d02d975583e804e5d4ce07
SHA2560da95ba6b6470a0ab806ac37e2a663cc30720305b6083cf7e3c1b6b069cd9411
SHA5128e9deb29e3ec0a230e62121781c752f93c0be45cfd7c65e1a7a3ca0999fc9a6d1e4a6401efed1290a74701ec07ecc53e742cfa03f71ea0652a535365eac5d4b3
-
Filesize
264KB
MD5eaa0c6aa9904cdf629bbe8b04114aced
SHA1932b165a8ee0386669d02d975583e804e5d4ce07
SHA2560da95ba6b6470a0ab806ac37e2a663cc30720305b6083cf7e3c1b6b069cd9411
SHA5128e9deb29e3ec0a230e62121781c752f93c0be45cfd7c65e1a7a3ca0999fc9a6d1e4a6401efed1290a74701ec07ecc53e742cfa03f71ea0652a535365eac5d4b3
-
Filesize
348KB
MD508333d96633502ade11a06ce814b8aa3
SHA13c8b110b39638900b52153726e31a4a58cdd516d
SHA25647e75c49b4c95772724c09f4ce610018dac6d5412f26bb3e3209d8a17c375518
SHA5121cb8ac98f28209e19cd942aa3dd5a408e376c3a26388d31b03cbef9d479eda493880840df410689c477616767226841d5f7dd065084189925ba415a4e0c7332f
-
Filesize
348KB
MD508333d96633502ade11a06ce814b8aa3
SHA13c8b110b39638900b52153726e31a4a58cdd516d
SHA25647e75c49b4c95772724c09f4ce610018dac6d5412f26bb3e3209d8a17c375518
SHA5121cb8ac98f28209e19cd942aa3dd5a408e376c3a26388d31b03cbef9d479eda493880840df410689c477616767226841d5f7dd065084189925ba415a4e0c7332f
-
Filesize
348KB
MD508333d96633502ade11a06ce814b8aa3
SHA13c8b110b39638900b52153726e31a4a58cdd516d
SHA25647e75c49b4c95772724c09f4ce610018dac6d5412f26bb3e3209d8a17c375518
SHA5121cb8ac98f28209e19cd942aa3dd5a408e376c3a26388d31b03cbef9d479eda493880840df410689c477616767226841d5f7dd065084189925ba415a4e0c7332f