Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 20:37
Static task
static1
Behavioral task
behavioral1
Sample
14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe
Resource
win10v2004-20230220-en
General
-
Target
14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe
-
Size
701KB
-
MD5
4bcaf8cdbef79b4dc47c3a4ee21da181
-
SHA1
d7baa68613ffa89f3e98ab6a1dbfbc091d8a1205
-
SHA256
14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf
-
SHA512
3b3910178d40b6cdbf987b755121c1741984ac6dc2392493f4eeabafb0670c4e475fdcdcf3e8de8f65c31afdfd5db998c87e28d9969da36c49ca065af9c61020
-
SSDEEP
12288:Zy907uUizD6uPZRNT/x8FPclOhgVXb9jMpGiG8GJrGVRmBnBccqoXr:ZyYuFOuxRNTx8lcIhm9jVrGVRmBn2lU
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 03177054.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 03177054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 03177054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 03177054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 03177054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 03177054.exe -
Executes dropped EXE 3 IoCs
pid Process 1696 un281626.exe 580 03177054.exe 984 rk806980.exe -
Loads dropped DLL 8 IoCs
pid Process 1312 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe 1696 un281626.exe 1696 un281626.exe 1696 un281626.exe 580 03177054.exe 1696 un281626.exe 1696 un281626.exe 984 rk806980.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 03177054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 03177054.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un281626.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un281626.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 580 03177054.exe 580 03177054.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 580 03177054.exe Token: SeDebugPrivilege 984 rk806980.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1696 1312 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe 28 PID 1312 wrote to memory of 1696 1312 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe 28 PID 1312 wrote to memory of 1696 1312 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe 28 PID 1312 wrote to memory of 1696 1312 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe 28 PID 1312 wrote to memory of 1696 1312 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe 28 PID 1312 wrote to memory of 1696 1312 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe 28 PID 1312 wrote to memory of 1696 1312 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe 28 PID 1696 wrote to memory of 580 1696 un281626.exe 29 PID 1696 wrote to memory of 580 1696 un281626.exe 29 PID 1696 wrote to memory of 580 1696 un281626.exe 29 PID 1696 wrote to memory of 580 1696 un281626.exe 29 PID 1696 wrote to memory of 580 1696 un281626.exe 29 PID 1696 wrote to memory of 580 1696 un281626.exe 29 PID 1696 wrote to memory of 580 1696 un281626.exe 29 PID 1696 wrote to memory of 984 1696 un281626.exe 30 PID 1696 wrote to memory of 984 1696 un281626.exe 30 PID 1696 wrote to memory of 984 1696 un281626.exe 30 PID 1696 wrote to memory of 984 1696 un281626.exe 30 PID 1696 wrote to memory of 984 1696 un281626.exe 30 PID 1696 wrote to memory of 984 1696 un281626.exe 30 PID 1696 wrote to memory of 984 1696 un281626.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe"C:\Users\Admin\AppData\Local\Temp\14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD51e999155a42215ce3561ee98e7582615
SHA1b443ee2cc1793e498082ba4575a004821fba7e8a
SHA2560324fc7bd08b96423553594ba2861ba48e04137caa9db72426fe4b0d9c177f93
SHA5121a9564236fdc5feb8be10df2d2268d3e4ca613d418b5b32c44ae3ab0d27c7d869ba7e737f4cc650cc951bdfacf7a4273860bc5600cee03c9b3c66058e5c467da
-
Filesize
547KB
MD51e999155a42215ce3561ee98e7582615
SHA1b443ee2cc1793e498082ba4575a004821fba7e8a
SHA2560324fc7bd08b96423553594ba2861ba48e04137caa9db72426fe4b0d9c177f93
SHA5121a9564236fdc5feb8be10df2d2268d3e4ca613d418b5b32c44ae3ab0d27c7d869ba7e737f4cc650cc951bdfacf7a4273860bc5600cee03c9b3c66058e5c467da
-
Filesize
269KB
MD5b30cc80e434c5d0eb23678030f2e0702
SHA1477560df97c9fc157325dee019702a68c4888590
SHA2569ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304
SHA5128e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539
-
Filesize
269KB
MD5b30cc80e434c5d0eb23678030f2e0702
SHA1477560df97c9fc157325dee019702a68c4888590
SHA2569ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304
SHA5128e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539
-
Filesize
269KB
MD5b30cc80e434c5d0eb23678030f2e0702
SHA1477560df97c9fc157325dee019702a68c4888590
SHA2569ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304
SHA5128e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539
-
Filesize
353KB
MD5b0052a48f062ef5922a4914ac648b8d7
SHA186f04d8d805c989bc22a0772336d968a1ecb4708
SHA25658469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9
SHA51284b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb
-
Filesize
353KB
MD5b0052a48f062ef5922a4914ac648b8d7
SHA186f04d8d805c989bc22a0772336d968a1ecb4708
SHA25658469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9
SHA51284b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb
-
Filesize
353KB
MD5b0052a48f062ef5922a4914ac648b8d7
SHA186f04d8d805c989bc22a0772336d968a1ecb4708
SHA25658469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9
SHA51284b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb
-
Filesize
547KB
MD51e999155a42215ce3561ee98e7582615
SHA1b443ee2cc1793e498082ba4575a004821fba7e8a
SHA2560324fc7bd08b96423553594ba2861ba48e04137caa9db72426fe4b0d9c177f93
SHA5121a9564236fdc5feb8be10df2d2268d3e4ca613d418b5b32c44ae3ab0d27c7d869ba7e737f4cc650cc951bdfacf7a4273860bc5600cee03c9b3c66058e5c467da
-
Filesize
547KB
MD51e999155a42215ce3561ee98e7582615
SHA1b443ee2cc1793e498082ba4575a004821fba7e8a
SHA2560324fc7bd08b96423553594ba2861ba48e04137caa9db72426fe4b0d9c177f93
SHA5121a9564236fdc5feb8be10df2d2268d3e4ca613d418b5b32c44ae3ab0d27c7d869ba7e737f4cc650cc951bdfacf7a4273860bc5600cee03c9b3c66058e5c467da
-
Filesize
269KB
MD5b30cc80e434c5d0eb23678030f2e0702
SHA1477560df97c9fc157325dee019702a68c4888590
SHA2569ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304
SHA5128e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539
-
Filesize
269KB
MD5b30cc80e434c5d0eb23678030f2e0702
SHA1477560df97c9fc157325dee019702a68c4888590
SHA2569ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304
SHA5128e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539
-
Filesize
269KB
MD5b30cc80e434c5d0eb23678030f2e0702
SHA1477560df97c9fc157325dee019702a68c4888590
SHA2569ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304
SHA5128e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539
-
Filesize
353KB
MD5b0052a48f062ef5922a4914ac648b8d7
SHA186f04d8d805c989bc22a0772336d968a1ecb4708
SHA25658469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9
SHA51284b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb
-
Filesize
353KB
MD5b0052a48f062ef5922a4914ac648b8d7
SHA186f04d8d805c989bc22a0772336d968a1ecb4708
SHA25658469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9
SHA51284b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb
-
Filesize
353KB
MD5b0052a48f062ef5922a4914ac648b8d7
SHA186f04d8d805c989bc22a0772336d968a1ecb4708
SHA25658469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9
SHA51284b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb