Analysis
-
max time kernel
196s -
max time network
206s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe
Resource
win10v2004-20230220-en
General
-
Target
1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe
-
Size
611KB
-
MD5
45efb40ba04100e6bad265d0188eb555
-
SHA1
cfa1b9925e560e079aa165fe019791884df7fdfa
-
SHA256
1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc
-
SHA512
cb719726efcbbafd3d34353c008a17b138de8c7a12e3bce69aa04a59ea5a5279f2e6e0cdb601a9ad0452fe7b0ef4a9b6060a9d383ef3b1c93803fb823e74d3a7
-
SSDEEP
12288:2y90lIaPwQ+Ab4MuIgrfqWhnO9J0rttX8d2De/K/HPFZq1Z:2yJaP/5uvq0aUtXU2VS1Z
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 01534680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 01534680.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 01534680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 01534680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 01534680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 01534680.exe -
Executes dropped EXE 3 IoCs
pid Process 1948 st259424.exe 808 01534680.exe 588 kp928626.exe -
Loads dropped DLL 6 IoCs
pid Process 2020 1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe 1948 st259424.exe 1948 st259424.exe 1948 st259424.exe 1948 st259424.exe 588 kp928626.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 01534680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 01534680.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st259424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st259424.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 808 01534680.exe 808 01534680.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 808 01534680.exe Token: SeDebugPrivilege 588 kp928626.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1948 2020 1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe 28 PID 2020 wrote to memory of 1948 2020 1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe 28 PID 2020 wrote to memory of 1948 2020 1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe 28 PID 2020 wrote to memory of 1948 2020 1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe 28 PID 2020 wrote to memory of 1948 2020 1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe 28 PID 2020 wrote to memory of 1948 2020 1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe 28 PID 2020 wrote to memory of 1948 2020 1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe 28 PID 1948 wrote to memory of 808 1948 st259424.exe 29 PID 1948 wrote to memory of 808 1948 st259424.exe 29 PID 1948 wrote to memory of 808 1948 st259424.exe 29 PID 1948 wrote to memory of 808 1948 st259424.exe 29 PID 1948 wrote to memory of 808 1948 st259424.exe 29 PID 1948 wrote to memory of 808 1948 st259424.exe 29 PID 1948 wrote to memory of 808 1948 st259424.exe 29 PID 1948 wrote to memory of 588 1948 st259424.exe 30 PID 1948 wrote to memory of 588 1948 st259424.exe 30 PID 1948 wrote to memory of 588 1948 st259424.exe 30 PID 1948 wrote to memory of 588 1948 st259424.exe 30 PID 1948 wrote to memory of 588 1948 st259424.exe 30 PID 1948 wrote to memory of 588 1948 st259424.exe 30 PID 1948 wrote to memory of 588 1948 st259424.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe"C:\Users\Admin\AppData\Local\Temp\1252e0cd9dc91d610e131e5bf9f7061414ca1fc335ed66c05332f95677c450fc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st259424.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st259424.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\01534680.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\01534680.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp928626.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp928626.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD5db46a760d12c0054e3dd9a56d55dedcd
SHA11fa3ab4a27480ba66daab2edca583ba4ef4849a6
SHA2566e2bd4f3f1b5e3b881e732c62c97970d09c1eec7a0baa71f03d0567a40af972c
SHA5129f056899907efaabd29536d53efc8e3755c7bf4b2d736aa24984a9d2c3fbdeaa0b5d1a07a16c7969884d1fa217d34b0ba5a70930dae2cb8ac849d9561d32e034
-
Filesize
457KB
MD5db46a760d12c0054e3dd9a56d55dedcd
SHA11fa3ab4a27480ba66daab2edca583ba4ef4849a6
SHA2566e2bd4f3f1b5e3b881e732c62c97970d09c1eec7a0baa71f03d0567a40af972c
SHA5129f056899907efaabd29536d53efc8e3755c7bf4b2d736aa24984a9d2c3fbdeaa0b5d1a07a16c7969884d1fa217d34b0ba5a70930dae2cb8ac849d9561d32e034
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD54c2ee1d5cb97a2dac2e09c4451c3fac1
SHA12f284724b3ede0854d9f14f9455fc823f86c24bf
SHA25640911a2c3e3b091c477fcab084e22a0e7af194e31a5b12fa3187351a7e7dba6a
SHA512604961163d46d82e1aa5fac5dc97fdc6138e7606196bdcdb926a3a004290258f113c53117c1211bc6ed6aabb7ebff69fa90632f58bc56cd77ba6b2c1a92fac85
-
Filesize
459KB
MD54c2ee1d5cb97a2dac2e09c4451c3fac1
SHA12f284724b3ede0854d9f14f9455fc823f86c24bf
SHA25640911a2c3e3b091c477fcab084e22a0e7af194e31a5b12fa3187351a7e7dba6a
SHA512604961163d46d82e1aa5fac5dc97fdc6138e7606196bdcdb926a3a004290258f113c53117c1211bc6ed6aabb7ebff69fa90632f58bc56cd77ba6b2c1a92fac85
-
Filesize
459KB
MD54c2ee1d5cb97a2dac2e09c4451c3fac1
SHA12f284724b3ede0854d9f14f9455fc823f86c24bf
SHA25640911a2c3e3b091c477fcab084e22a0e7af194e31a5b12fa3187351a7e7dba6a
SHA512604961163d46d82e1aa5fac5dc97fdc6138e7606196bdcdb926a3a004290258f113c53117c1211bc6ed6aabb7ebff69fa90632f58bc56cd77ba6b2c1a92fac85
-
Filesize
457KB
MD5db46a760d12c0054e3dd9a56d55dedcd
SHA11fa3ab4a27480ba66daab2edca583ba4ef4849a6
SHA2566e2bd4f3f1b5e3b881e732c62c97970d09c1eec7a0baa71f03d0567a40af972c
SHA5129f056899907efaabd29536d53efc8e3755c7bf4b2d736aa24984a9d2c3fbdeaa0b5d1a07a16c7969884d1fa217d34b0ba5a70930dae2cb8ac849d9561d32e034
-
Filesize
457KB
MD5db46a760d12c0054e3dd9a56d55dedcd
SHA11fa3ab4a27480ba66daab2edca583ba4ef4849a6
SHA2566e2bd4f3f1b5e3b881e732c62c97970d09c1eec7a0baa71f03d0567a40af972c
SHA5129f056899907efaabd29536d53efc8e3755c7bf4b2d736aa24984a9d2c3fbdeaa0b5d1a07a16c7969884d1fa217d34b0ba5a70930dae2cb8ac849d9561d32e034
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD54c2ee1d5cb97a2dac2e09c4451c3fac1
SHA12f284724b3ede0854d9f14f9455fc823f86c24bf
SHA25640911a2c3e3b091c477fcab084e22a0e7af194e31a5b12fa3187351a7e7dba6a
SHA512604961163d46d82e1aa5fac5dc97fdc6138e7606196bdcdb926a3a004290258f113c53117c1211bc6ed6aabb7ebff69fa90632f58bc56cd77ba6b2c1a92fac85
-
Filesize
459KB
MD54c2ee1d5cb97a2dac2e09c4451c3fac1
SHA12f284724b3ede0854d9f14f9455fc823f86c24bf
SHA25640911a2c3e3b091c477fcab084e22a0e7af194e31a5b12fa3187351a7e7dba6a
SHA512604961163d46d82e1aa5fac5dc97fdc6138e7606196bdcdb926a3a004290258f113c53117c1211bc6ed6aabb7ebff69fa90632f58bc56cd77ba6b2c1a92fac85
-
Filesize
459KB
MD54c2ee1d5cb97a2dac2e09c4451c3fac1
SHA12f284724b3ede0854d9f14f9455fc823f86c24bf
SHA25640911a2c3e3b091c477fcab084e22a0e7af194e31a5b12fa3187351a7e7dba6a
SHA512604961163d46d82e1aa5fac5dc97fdc6138e7606196bdcdb926a3a004290258f113c53117c1211bc6ed6aabb7ebff69fa90632f58bc56cd77ba6b2c1a92fac85