Analysis
-
max time kernel
150s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe
Resource
win10v2004-20230220-en
General
-
Target
1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe
-
Size
697KB
-
MD5
b1b3e35ade3229a97d14c4ad2d6edbde
-
SHA1
571fa00ac559ff5ad25f53038463cac543e56da0
-
SHA256
1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606
-
SHA512
053f6194bd33a3faaad5b30a3de5abce8fb090b78a4937c21cb254cdd8ced9ad7cdc5511cfa346cb6266dbddb06e868ca6ac588689e0bd2cdf6bf2f30a95009e
-
SSDEEP
12288:Py90S8W5xESQuZ9tSRnEMed8s1VIddBpHyA2od:PyyWjESP9AEMijI5h2od
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 92003122.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 92003122.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 92003122.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 92003122.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 92003122.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 92003122.exe -
Executes dropped EXE 3 IoCs
pid Process 1112 un330171.exe 268 92003122.exe 2040 rk996975.exe -
Loads dropped DLL 8 IoCs
pid Process 932 1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe 1112 un330171.exe 1112 un330171.exe 1112 un330171.exe 268 92003122.exe 1112 un330171.exe 1112 un330171.exe 2040 rk996975.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 92003122.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 92003122.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un330171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un330171.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 268 92003122.exe 268 92003122.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 268 92003122.exe Token: SeDebugPrivilege 2040 rk996975.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 932 wrote to memory of 1112 932 1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe 28 PID 932 wrote to memory of 1112 932 1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe 28 PID 932 wrote to memory of 1112 932 1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe 28 PID 932 wrote to memory of 1112 932 1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe 28 PID 932 wrote to memory of 1112 932 1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe 28 PID 932 wrote to memory of 1112 932 1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe 28 PID 932 wrote to memory of 1112 932 1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe 28 PID 1112 wrote to memory of 268 1112 un330171.exe 29 PID 1112 wrote to memory of 268 1112 un330171.exe 29 PID 1112 wrote to memory of 268 1112 un330171.exe 29 PID 1112 wrote to memory of 268 1112 un330171.exe 29 PID 1112 wrote to memory of 268 1112 un330171.exe 29 PID 1112 wrote to memory of 268 1112 un330171.exe 29 PID 1112 wrote to memory of 268 1112 un330171.exe 29 PID 1112 wrote to memory of 2040 1112 un330171.exe 30 PID 1112 wrote to memory of 2040 1112 un330171.exe 30 PID 1112 wrote to memory of 2040 1112 un330171.exe 30 PID 1112 wrote to memory of 2040 1112 un330171.exe 30 PID 1112 wrote to memory of 2040 1112 un330171.exe 30 PID 1112 wrote to memory of 2040 1112 un330171.exe 30 PID 1112 wrote to memory of 2040 1112 un330171.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe"C:\Users\Admin\AppData\Local\Temp\1a00c334a3d4fe9d02bac16c19ff6ce8a6890d5e93a6f9211812acb88c525606.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un330171.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un330171.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92003122.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92003122.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk996975.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk996975.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD58899780cbc72e50d91eacf094f923196
SHA1d36bdeaf7b3a18c199037ea57d61ef40d7f39d62
SHA25636acef713d5f8e229f365f56355014dd272239c8bc5182f225cec6f83071ccce
SHA512b6cb6c8f4f68da65d49fdfe9c29c712b85006bf126774c87e2503c06ad9406ab0e02b5f6bc4ff700f842bf87b7a034862e257c634cd0eed3d92e5820889c9190
-
Filesize
543KB
MD58899780cbc72e50d91eacf094f923196
SHA1d36bdeaf7b3a18c199037ea57d61ef40d7f39d62
SHA25636acef713d5f8e229f365f56355014dd272239c8bc5182f225cec6f83071ccce
SHA512b6cb6c8f4f68da65d49fdfe9c29c712b85006bf126774c87e2503c06ad9406ab0e02b5f6bc4ff700f842bf87b7a034862e257c634cd0eed3d92e5820889c9190
-
Filesize
263KB
MD58aec28541db80ee920ed0d2438c6e9f4
SHA16c6808593af20eb9dbc7e8929b00d9531f24b1e5
SHA256133bee8d541f219b50c7b81b16af2c20337f10f64d80b25e8fb515fc80087850
SHA51289fc90aeed01c5be75295e3132d0cae0f1565025754956da3ec163e908228e1ebf14614b7761a6912f00412ac6ab0dc13083bd35c568e4891af16a231324a682
-
Filesize
263KB
MD58aec28541db80ee920ed0d2438c6e9f4
SHA16c6808593af20eb9dbc7e8929b00d9531f24b1e5
SHA256133bee8d541f219b50c7b81b16af2c20337f10f64d80b25e8fb515fc80087850
SHA51289fc90aeed01c5be75295e3132d0cae0f1565025754956da3ec163e908228e1ebf14614b7761a6912f00412ac6ab0dc13083bd35c568e4891af16a231324a682
-
Filesize
263KB
MD58aec28541db80ee920ed0d2438c6e9f4
SHA16c6808593af20eb9dbc7e8929b00d9531f24b1e5
SHA256133bee8d541f219b50c7b81b16af2c20337f10f64d80b25e8fb515fc80087850
SHA51289fc90aeed01c5be75295e3132d0cae0f1565025754956da3ec163e908228e1ebf14614b7761a6912f00412ac6ab0dc13083bd35c568e4891af16a231324a682
-
Filesize
328KB
MD5228758d29cd11c89abfe2fc3fd376d1c
SHA194f55fa3402a7e2011c0454a9e9ca0971a8d8084
SHA2566b0b460b98e4e3ba0a1f804ee8aa61ef29bf12fb97d589bf3d3a765ed71482d9
SHA512c1047385aef5c34395937be44f1cf46f7adc72714d862154e21b9dbbfcfbcf139d6ae532ec59ce7b89ff5326d8d08553c5be10a20a1543a007e0a180a1af0a84
-
Filesize
328KB
MD5228758d29cd11c89abfe2fc3fd376d1c
SHA194f55fa3402a7e2011c0454a9e9ca0971a8d8084
SHA2566b0b460b98e4e3ba0a1f804ee8aa61ef29bf12fb97d589bf3d3a765ed71482d9
SHA512c1047385aef5c34395937be44f1cf46f7adc72714d862154e21b9dbbfcfbcf139d6ae532ec59ce7b89ff5326d8d08553c5be10a20a1543a007e0a180a1af0a84
-
Filesize
328KB
MD5228758d29cd11c89abfe2fc3fd376d1c
SHA194f55fa3402a7e2011c0454a9e9ca0971a8d8084
SHA2566b0b460b98e4e3ba0a1f804ee8aa61ef29bf12fb97d589bf3d3a765ed71482d9
SHA512c1047385aef5c34395937be44f1cf46f7adc72714d862154e21b9dbbfcfbcf139d6ae532ec59ce7b89ff5326d8d08553c5be10a20a1543a007e0a180a1af0a84
-
Filesize
543KB
MD58899780cbc72e50d91eacf094f923196
SHA1d36bdeaf7b3a18c199037ea57d61ef40d7f39d62
SHA25636acef713d5f8e229f365f56355014dd272239c8bc5182f225cec6f83071ccce
SHA512b6cb6c8f4f68da65d49fdfe9c29c712b85006bf126774c87e2503c06ad9406ab0e02b5f6bc4ff700f842bf87b7a034862e257c634cd0eed3d92e5820889c9190
-
Filesize
543KB
MD58899780cbc72e50d91eacf094f923196
SHA1d36bdeaf7b3a18c199037ea57d61ef40d7f39d62
SHA25636acef713d5f8e229f365f56355014dd272239c8bc5182f225cec6f83071ccce
SHA512b6cb6c8f4f68da65d49fdfe9c29c712b85006bf126774c87e2503c06ad9406ab0e02b5f6bc4ff700f842bf87b7a034862e257c634cd0eed3d92e5820889c9190
-
Filesize
263KB
MD58aec28541db80ee920ed0d2438c6e9f4
SHA16c6808593af20eb9dbc7e8929b00d9531f24b1e5
SHA256133bee8d541f219b50c7b81b16af2c20337f10f64d80b25e8fb515fc80087850
SHA51289fc90aeed01c5be75295e3132d0cae0f1565025754956da3ec163e908228e1ebf14614b7761a6912f00412ac6ab0dc13083bd35c568e4891af16a231324a682
-
Filesize
263KB
MD58aec28541db80ee920ed0d2438c6e9f4
SHA16c6808593af20eb9dbc7e8929b00d9531f24b1e5
SHA256133bee8d541f219b50c7b81b16af2c20337f10f64d80b25e8fb515fc80087850
SHA51289fc90aeed01c5be75295e3132d0cae0f1565025754956da3ec163e908228e1ebf14614b7761a6912f00412ac6ab0dc13083bd35c568e4891af16a231324a682
-
Filesize
263KB
MD58aec28541db80ee920ed0d2438c6e9f4
SHA16c6808593af20eb9dbc7e8929b00d9531f24b1e5
SHA256133bee8d541f219b50c7b81b16af2c20337f10f64d80b25e8fb515fc80087850
SHA51289fc90aeed01c5be75295e3132d0cae0f1565025754956da3ec163e908228e1ebf14614b7761a6912f00412ac6ab0dc13083bd35c568e4891af16a231324a682
-
Filesize
328KB
MD5228758d29cd11c89abfe2fc3fd376d1c
SHA194f55fa3402a7e2011c0454a9e9ca0971a8d8084
SHA2566b0b460b98e4e3ba0a1f804ee8aa61ef29bf12fb97d589bf3d3a765ed71482d9
SHA512c1047385aef5c34395937be44f1cf46f7adc72714d862154e21b9dbbfcfbcf139d6ae532ec59ce7b89ff5326d8d08553c5be10a20a1543a007e0a180a1af0a84
-
Filesize
328KB
MD5228758d29cd11c89abfe2fc3fd376d1c
SHA194f55fa3402a7e2011c0454a9e9ca0971a8d8084
SHA2566b0b460b98e4e3ba0a1f804ee8aa61ef29bf12fb97d589bf3d3a765ed71482d9
SHA512c1047385aef5c34395937be44f1cf46f7adc72714d862154e21b9dbbfcfbcf139d6ae532ec59ce7b89ff5326d8d08553c5be10a20a1543a007e0a180a1af0a84
-
Filesize
328KB
MD5228758d29cd11c89abfe2fc3fd376d1c
SHA194f55fa3402a7e2011c0454a9e9ca0971a8d8084
SHA2566b0b460b98e4e3ba0a1f804ee8aa61ef29bf12fb97d589bf3d3a765ed71482d9
SHA512c1047385aef5c34395937be44f1cf46f7adc72714d862154e21b9dbbfcfbcf139d6ae532ec59ce7b89ff5326d8d08553c5be10a20a1543a007e0a180a1af0a84