Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe
Resource
win10v2004-20230220-en
General
-
Target
269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe
-
Size
479KB
-
MD5
2dd3dcc10f7006763fb2751b0fa6f454
-
SHA1
484bfeb780722165db13052795e2f4422f828707
-
SHA256
269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232
-
SHA512
79a78376652972730c83e57444a167953a45d749a1ddb141d4e68ad043fff56f5e1e633d7592c4a4280ce540706059cd007812434a1d50afea1ef9564785da3a
-
SSDEEP
6144:Kzy+bnr+rp0yN90QETpsOMm2Vn+UwCj0FOUEjCgnbEQ/PIz2QUJ9tVVv3SJV:VMrry90bpMMC0OAgnbE01Qu9rVvAV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0859051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0859051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0859051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0859051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0859051.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a0859051.exe -
Executes dropped EXE 3 IoCs
pid Process 1172 v7184437.exe 652 a0859051.exe 924 b8913035.exe -
Loads dropped DLL 6 IoCs
pid Process 1856 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe 1172 v7184437.exe 1172 v7184437.exe 652 a0859051.exe 1172 v7184437.exe 924 b8913035.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a0859051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0859051.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7184437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7184437.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 652 a0859051.exe 652 a0859051.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 652 a0859051.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1856 wrote to memory of 1172 1856 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe 28 PID 1856 wrote to memory of 1172 1856 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe 28 PID 1856 wrote to memory of 1172 1856 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe 28 PID 1856 wrote to memory of 1172 1856 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe 28 PID 1856 wrote to memory of 1172 1856 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe 28 PID 1856 wrote to memory of 1172 1856 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe 28 PID 1856 wrote to memory of 1172 1856 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe 28 PID 1172 wrote to memory of 652 1172 v7184437.exe 29 PID 1172 wrote to memory of 652 1172 v7184437.exe 29 PID 1172 wrote to memory of 652 1172 v7184437.exe 29 PID 1172 wrote to memory of 652 1172 v7184437.exe 29 PID 1172 wrote to memory of 652 1172 v7184437.exe 29 PID 1172 wrote to memory of 652 1172 v7184437.exe 29 PID 1172 wrote to memory of 652 1172 v7184437.exe 29 PID 1172 wrote to memory of 924 1172 v7184437.exe 30 PID 1172 wrote to memory of 924 1172 v7184437.exe 30 PID 1172 wrote to memory of 924 1172 v7184437.exe 30 PID 1172 wrote to memory of 924 1172 v7184437.exe 30 PID 1172 wrote to memory of 924 1172 v7184437.exe 30 PID 1172 wrote to memory of 924 1172 v7184437.exe 30 PID 1172 wrote to memory of 924 1172 v7184437.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe"C:\Users\Admin\AppData\Local\Temp\269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7184437.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7184437.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0859051.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0859051.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8913035.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8913035.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:924
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD525d205eb0b4d50be87dea2d3043ee936
SHA19d8d1271e22b8f12614db71e18a43ed1a6918b4b
SHA2562a7ea5826deab8afb1383512f6ee928d5eb7bcf7ce8e0a660816f2b474fac726
SHA512f14082b9a6ddcc6cedb524cdb4f64feebc97a90fffc8f844932d376324964b7ee3dd8180430221a7bceb1619282e512e564bd8bed41a9f5e5101b2e56e4c3c2d
-
Filesize
307KB
MD525d205eb0b4d50be87dea2d3043ee936
SHA19d8d1271e22b8f12614db71e18a43ed1a6918b4b
SHA2562a7ea5826deab8afb1383512f6ee928d5eb7bcf7ce8e0a660816f2b474fac726
SHA512f14082b9a6ddcc6cedb524cdb4f64feebc97a90fffc8f844932d376324964b7ee3dd8180430221a7bceb1619282e512e564bd8bed41a9f5e5101b2e56e4c3c2d
-
Filesize
175KB
MD5d59b989253d9bd505567328d127ce588
SHA17f2bc6f370f00d2364c50ed6037eff706f64d5c5
SHA256b5a92e6994f0db8057eaa987df7bf5e1dace2f834d26672ef78b70620f6812cc
SHA512bcc947bbc66c63da11439aec57b08e7aa6e92c9278d83d523d41a0a13129711d9e609a195526e69b504a9079af880a90cfa4ed01aa920d9295851d8f7ad2d189
-
Filesize
175KB
MD5d59b989253d9bd505567328d127ce588
SHA17f2bc6f370f00d2364c50ed6037eff706f64d5c5
SHA256b5a92e6994f0db8057eaa987df7bf5e1dace2f834d26672ef78b70620f6812cc
SHA512bcc947bbc66c63da11439aec57b08e7aa6e92c9278d83d523d41a0a13129711d9e609a195526e69b504a9079af880a90cfa4ed01aa920d9295851d8f7ad2d189
-
Filesize
136KB
MD531fc937fffe039390eec038ac8e953d7
SHA1bad83a487f89adf0daf13140d0f7956e26d81a83
SHA256da0047fc3c24596e35d37015285c4c6467ab25a7fa17b5d7663e2f8c3b4d7087
SHA512b4137c7aeb7067d62002ac8dca0ff647a7f25c6f57457ed1a9971b855400718b9388b6a69fd2fecf22cdcb3ebe28ea1fe4da98f848bcc230fa196c8363f42fd3
-
Filesize
136KB
MD531fc937fffe039390eec038ac8e953d7
SHA1bad83a487f89adf0daf13140d0f7956e26d81a83
SHA256da0047fc3c24596e35d37015285c4c6467ab25a7fa17b5d7663e2f8c3b4d7087
SHA512b4137c7aeb7067d62002ac8dca0ff647a7f25c6f57457ed1a9971b855400718b9388b6a69fd2fecf22cdcb3ebe28ea1fe4da98f848bcc230fa196c8363f42fd3
-
Filesize
307KB
MD525d205eb0b4d50be87dea2d3043ee936
SHA19d8d1271e22b8f12614db71e18a43ed1a6918b4b
SHA2562a7ea5826deab8afb1383512f6ee928d5eb7bcf7ce8e0a660816f2b474fac726
SHA512f14082b9a6ddcc6cedb524cdb4f64feebc97a90fffc8f844932d376324964b7ee3dd8180430221a7bceb1619282e512e564bd8bed41a9f5e5101b2e56e4c3c2d
-
Filesize
307KB
MD525d205eb0b4d50be87dea2d3043ee936
SHA19d8d1271e22b8f12614db71e18a43ed1a6918b4b
SHA2562a7ea5826deab8afb1383512f6ee928d5eb7bcf7ce8e0a660816f2b474fac726
SHA512f14082b9a6ddcc6cedb524cdb4f64feebc97a90fffc8f844932d376324964b7ee3dd8180430221a7bceb1619282e512e564bd8bed41a9f5e5101b2e56e4c3c2d
-
Filesize
175KB
MD5d59b989253d9bd505567328d127ce588
SHA17f2bc6f370f00d2364c50ed6037eff706f64d5c5
SHA256b5a92e6994f0db8057eaa987df7bf5e1dace2f834d26672ef78b70620f6812cc
SHA512bcc947bbc66c63da11439aec57b08e7aa6e92c9278d83d523d41a0a13129711d9e609a195526e69b504a9079af880a90cfa4ed01aa920d9295851d8f7ad2d189
-
Filesize
175KB
MD5d59b989253d9bd505567328d127ce588
SHA17f2bc6f370f00d2364c50ed6037eff706f64d5c5
SHA256b5a92e6994f0db8057eaa987df7bf5e1dace2f834d26672ef78b70620f6812cc
SHA512bcc947bbc66c63da11439aec57b08e7aa6e92c9278d83d523d41a0a13129711d9e609a195526e69b504a9079af880a90cfa4ed01aa920d9295851d8f7ad2d189
-
Filesize
136KB
MD531fc937fffe039390eec038ac8e953d7
SHA1bad83a487f89adf0daf13140d0f7956e26d81a83
SHA256da0047fc3c24596e35d37015285c4c6467ab25a7fa17b5d7663e2f8c3b4d7087
SHA512b4137c7aeb7067d62002ac8dca0ff647a7f25c6f57457ed1a9971b855400718b9388b6a69fd2fecf22cdcb3ebe28ea1fe4da98f848bcc230fa196c8363f42fd3
-
Filesize
136KB
MD531fc937fffe039390eec038ac8e953d7
SHA1bad83a487f89adf0daf13140d0f7956e26d81a83
SHA256da0047fc3c24596e35d37015285c4c6467ab25a7fa17b5d7663e2f8c3b4d7087
SHA512b4137c7aeb7067d62002ac8dca0ff647a7f25c6f57457ed1a9971b855400718b9388b6a69fd2fecf22cdcb3ebe28ea1fe4da98f848bcc230fa196c8363f42fd3