Analysis
-
max time kernel
253s -
max time network
312s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
2701bced7c4d45041dbd68d1df03673cec5d5eca730fd680868ef34b351896a5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2701bced7c4d45041dbd68d1df03673cec5d5eca730fd680868ef34b351896a5.exe
Resource
win10v2004-20230221-en
General
-
Target
2701bced7c4d45041dbd68d1df03673cec5d5eca730fd680868ef34b351896a5.exe
-
Size
1.1MB
-
MD5
cb431f6d4b89d7236818d4192d7689e2
-
SHA1
996ad8579e1b45ca8071ac76f6ce19a65261eb56
-
SHA256
2701bced7c4d45041dbd68d1df03673cec5d5eca730fd680868ef34b351896a5
-
SHA512
e7b558a6d429f384c97ff1ba1bd63b7eddd568e1edc54b6a26c35edc25777736f812658ed1b01712cff610bb85ec50ebc73ecce4b244908f55a2994b77e1d3d1
-
SSDEEP
24576:my1eixKfaWffBH4ntyIo2G2g2GR2vJItyE:1oiQfaWfJEfNGR2Ity
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 191716642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 191716642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 264435407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 264435407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 264435407.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 191716642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 191716642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 264435407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 264435407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 191716642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 191716642.exe -
Executes dropped EXE 5 IoCs
pid Process 1516 aX906535.exe 224 sY926001.exe 3640 Sg945151.exe 3616 191716642.exe 2100 264435407.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 191716642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 191716642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 264435407.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sY926001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sY926001.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Sg945151.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Sg945151.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2701bced7c4d45041dbd68d1df03673cec5d5eca730fd680868ef34b351896a5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2701bced7c4d45041dbd68d1df03673cec5d5eca730fd680868ef34b351896a5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce aX906535.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" aX906535.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4464 2100 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3616 191716642.exe 3616 191716642.exe 2100 264435407.exe 2100 264435407.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3616 191716642.exe Token: SeDebugPrivilege 2100 264435407.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3536 wrote to memory of 1516 3536 2701bced7c4d45041dbd68d1df03673cec5d5eca730fd680868ef34b351896a5.exe 79 PID 3536 wrote to memory of 1516 3536 2701bced7c4d45041dbd68d1df03673cec5d5eca730fd680868ef34b351896a5.exe 79 PID 3536 wrote to memory of 1516 3536 2701bced7c4d45041dbd68d1df03673cec5d5eca730fd680868ef34b351896a5.exe 79 PID 1516 wrote to memory of 224 1516 aX906535.exe 80 PID 1516 wrote to memory of 224 1516 aX906535.exe 80 PID 1516 wrote to memory of 224 1516 aX906535.exe 80 PID 224 wrote to memory of 3640 224 sY926001.exe 81 PID 224 wrote to memory of 3640 224 sY926001.exe 81 PID 224 wrote to memory of 3640 224 sY926001.exe 81 PID 3640 wrote to memory of 3616 3640 Sg945151.exe 82 PID 3640 wrote to memory of 3616 3640 Sg945151.exe 82 PID 3640 wrote to memory of 3616 3640 Sg945151.exe 82 PID 3640 wrote to memory of 2100 3640 Sg945151.exe 84 PID 3640 wrote to memory of 2100 3640 Sg945151.exe 84 PID 3640 wrote to memory of 2100 3640 Sg945151.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2701bced7c4d45041dbd68d1df03673cec5d5eca730fd680868ef34b351896a5.exe"C:\Users\Admin\AppData\Local\Temp\2701bced7c4d45041dbd68d1df03673cec5d5eca730fd680868ef34b351896a5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aX906535.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aX906535.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sY926001.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sY926001.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Sg945151.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Sg945151.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\191716642.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\191716642.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\264435407.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\264435407.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 10766⤵
- Program crash
PID:4464
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2100 -ip 21001⤵PID:1868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
940KB
MD5dc4a381a0064d3913248e3260f27471c
SHA131eefa39c2de16327df93fafcfb4cbda4aaace56
SHA2565028896be79d593129112c444ddc37b182a9c8f26cee55a6b65809e5f56c4ffe
SHA512c64cd2995b81243c544a68981b0f7579131f1a18a768cfb424f79d99038b75a24af1a421e8834fa684bbc9f2dd3f885f072976e3ea388667f9d8ad4355eec064
-
Filesize
940KB
MD5dc4a381a0064d3913248e3260f27471c
SHA131eefa39c2de16327df93fafcfb4cbda4aaace56
SHA2565028896be79d593129112c444ddc37b182a9c8f26cee55a6b65809e5f56c4ffe
SHA512c64cd2995b81243c544a68981b0f7579131f1a18a768cfb424f79d99038b75a24af1a421e8834fa684bbc9f2dd3f885f072976e3ea388667f9d8ad4355eec064
-
Filesize
586KB
MD598cfbe9dcec948c77713ec365059007e
SHA193db57f605fdcbf01ad7bf3f9779ab84679dc896
SHA256b85696f390b0904c0a52169660674580c29f4997a174c9f214e73a4b80fb0f50
SHA51250809ff8a589f07232b9b16a6c5e0275ab1df333689b5e4caf584aba792a0936e86f56bbc0ca47743f254c97eb2c31634a2993fa84b55a466c2262eea9ee6a15
-
Filesize
586KB
MD598cfbe9dcec948c77713ec365059007e
SHA193db57f605fdcbf01ad7bf3f9779ab84679dc896
SHA256b85696f390b0904c0a52169660674580c29f4997a174c9f214e73a4b80fb0f50
SHA51250809ff8a589f07232b9b16a6c5e0275ab1df333689b5e4caf584aba792a0936e86f56bbc0ca47743f254c97eb2c31634a2993fa84b55a466c2262eea9ee6a15
-
Filesize
414KB
MD5419d5992ee441078e38c97c35529fd9a
SHA1b60e13bfeed0414c1ad462fddb21d036af12d027
SHA25626efac9e6c66a6a6fd63b0e68d5abd32076bcb6ce7e430dcd6cd2a4e83f08188
SHA512ba949cb623d0c4952a517a28498e9d8f2bb19c8f0e891dcdd0cdbd727d4bc0c881596b3c8c4a65d493ca8a09f4b6d69b1528dd8fb5317f46151f50910e8aca88
-
Filesize
414KB
MD5419d5992ee441078e38c97c35529fd9a
SHA1b60e13bfeed0414c1ad462fddb21d036af12d027
SHA25626efac9e6c66a6a6fd63b0e68d5abd32076bcb6ce7e430dcd6cd2a4e83f08188
SHA512ba949cb623d0c4952a517a28498e9d8f2bb19c8f0e891dcdd0cdbd727d4bc0c881596b3c8c4a65d493ca8a09f4b6d69b1528dd8fb5317f46151f50910e8aca88
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
259KB
MD56ad8b1c0397ebcc4d6c71585f8e4587c
SHA1c2b02b844eb61f224e2564a0b630072be6811504
SHA256c6244e5dc5c3aa79a46ef6bcc119dd75f3492ac37e475cafd8f6984d6cd4bdab
SHA51230f2ed107672bbfa2a773ded99d5e12a7779f85f61b00c1146c15e4c7b2bbb46c3b480fc4ca4c56ff5fca4b584fe4cb5fe915bf7e611644048a6820901060362
-
Filesize
259KB
MD56ad8b1c0397ebcc4d6c71585f8e4587c
SHA1c2b02b844eb61f224e2564a0b630072be6811504
SHA256c6244e5dc5c3aa79a46ef6bcc119dd75f3492ac37e475cafd8f6984d6cd4bdab
SHA51230f2ed107672bbfa2a773ded99d5e12a7779f85f61b00c1146c15e4c7b2bbb46c3b480fc4ca4c56ff5fca4b584fe4cb5fe915bf7e611644048a6820901060362