Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 03:57
Static task
static1
Behavioral task
behavioral1
Sample
82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe
Resource
win10v2004-20230220-en
General
-
Target
82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe
-
Size
703KB
-
MD5
3e26c381640690bf7e0962b8f2c72233
-
SHA1
03fededf396247880a2f74d92b9580b28395b0c9
-
SHA256
82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171
-
SHA512
f9004d2c2d6a6b3c16c24574644d155bb5c28dc574cf3daef231ec52de5ac0b0ef396460d2e96b618660cce92fd867fd954e71b7d5fe33d013bfae65daf044ac
-
SSDEEP
12288:+y90DlZvFsdPUeUNJd3LDZdEifSe5FzBfRHQcIWxypGj+Qj1:+ymB0IkifnzBJe7g+QR
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr464653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr464653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr464653.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pr464653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr464653.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr464653.exe -
Executes dropped EXE 3 IoCs
pid Process 1208 un759067.exe 1472 pr464653.exe 1928 qu258754.exe -
Loads dropped DLL 8 IoCs
pid Process 1684 82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe 1208 un759067.exe 1208 un759067.exe 1208 un759067.exe 1472 pr464653.exe 1208 un759067.exe 1208 un759067.exe 1928 qu258754.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr464653.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pr464653.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un759067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un759067.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1472 pr464653.exe 1472 pr464653.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1472 pr464653.exe Token: SeDebugPrivilege 1928 qu258754.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1208 1684 82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe 26 PID 1684 wrote to memory of 1208 1684 82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe 26 PID 1684 wrote to memory of 1208 1684 82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe 26 PID 1684 wrote to memory of 1208 1684 82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe 26 PID 1684 wrote to memory of 1208 1684 82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe 26 PID 1684 wrote to memory of 1208 1684 82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe 26 PID 1684 wrote to memory of 1208 1684 82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe 26 PID 1208 wrote to memory of 1472 1208 un759067.exe 27 PID 1208 wrote to memory of 1472 1208 un759067.exe 27 PID 1208 wrote to memory of 1472 1208 un759067.exe 27 PID 1208 wrote to memory of 1472 1208 un759067.exe 27 PID 1208 wrote to memory of 1472 1208 un759067.exe 27 PID 1208 wrote to memory of 1472 1208 un759067.exe 27 PID 1208 wrote to memory of 1472 1208 un759067.exe 27 PID 1208 wrote to memory of 1928 1208 un759067.exe 28 PID 1208 wrote to memory of 1928 1208 un759067.exe 28 PID 1208 wrote to memory of 1928 1208 un759067.exe 28 PID 1208 wrote to memory of 1928 1208 un759067.exe 28 PID 1208 wrote to memory of 1928 1208 un759067.exe 28 PID 1208 wrote to memory of 1928 1208 un759067.exe 28 PID 1208 wrote to memory of 1928 1208 un759067.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe"C:\Users\Admin\AppData\Local\Temp\82228df790108de5fe3e4b0dfd89883a8e7a31868dbfe7098c5c2b4fcae2d171.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un759067.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un759067.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr464653.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr464653.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu258754.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu258754.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD55e16f026b0ac4d7e2a00b10de77f8204
SHA167961a79e4d055794b3384b529fcf12039da2cd7
SHA256641e5860f5494295173ef4340cc919e165e9dd8974ee6f880518158def128b48
SHA512a8bd73db8b2da6e17a5c9fff9762c6ea59886f1a4a55f64806bfdc6811a1c5c90eac04a7d8a2afd37e8b0db69a25a0f08f07f27146b6df0a3ba1e03daa0d2c1a
-
Filesize
549KB
MD55e16f026b0ac4d7e2a00b10de77f8204
SHA167961a79e4d055794b3384b529fcf12039da2cd7
SHA256641e5860f5494295173ef4340cc919e165e9dd8974ee6f880518158def128b48
SHA512a8bd73db8b2da6e17a5c9fff9762c6ea59886f1a4a55f64806bfdc6811a1c5c90eac04a7d8a2afd37e8b0db69a25a0f08f07f27146b6df0a3ba1e03daa0d2c1a
-
Filesize
277KB
MD56e55e4839edebd728fce17027213b7f8
SHA1fabc57f742c82a1bc4b3ef5ca54e10c6f7a52131
SHA256197a14637f01415bf849e814c65476443ffdd31681daacb43e2476f7be6503ee
SHA512f2ba944d6fae2c058bc4af0cf1513a65d0ea71197b6b4f127720c3f349dfbc3c71069230a6bb3cee07a3b18ae9d5ba399db5cdeea8768b096451366a3c5320db
-
Filesize
277KB
MD56e55e4839edebd728fce17027213b7f8
SHA1fabc57f742c82a1bc4b3ef5ca54e10c6f7a52131
SHA256197a14637f01415bf849e814c65476443ffdd31681daacb43e2476f7be6503ee
SHA512f2ba944d6fae2c058bc4af0cf1513a65d0ea71197b6b4f127720c3f349dfbc3c71069230a6bb3cee07a3b18ae9d5ba399db5cdeea8768b096451366a3c5320db
-
Filesize
277KB
MD56e55e4839edebd728fce17027213b7f8
SHA1fabc57f742c82a1bc4b3ef5ca54e10c6f7a52131
SHA256197a14637f01415bf849e814c65476443ffdd31681daacb43e2476f7be6503ee
SHA512f2ba944d6fae2c058bc4af0cf1513a65d0ea71197b6b4f127720c3f349dfbc3c71069230a6bb3cee07a3b18ae9d5ba399db5cdeea8768b096451366a3c5320db
-
Filesize
360KB
MD583a4bbe455c4a06ade7bf93576467695
SHA10e22e5fcf5b7e7197f8a37306a5ffd3796e2db58
SHA256fa175f2c8905f1a8f0b3a136e50fafd9b037b72e49f5b43ca76cac7197908d24
SHA5127226e6c2278894fa84b8700b64c56fb3848ca647281cda96573b18e9b97bbbc9af86a45e700fb573987b5e660d6a6726d64cb2f0a83c24b53f888871414a3b7a
-
Filesize
360KB
MD583a4bbe455c4a06ade7bf93576467695
SHA10e22e5fcf5b7e7197f8a37306a5ffd3796e2db58
SHA256fa175f2c8905f1a8f0b3a136e50fafd9b037b72e49f5b43ca76cac7197908d24
SHA5127226e6c2278894fa84b8700b64c56fb3848ca647281cda96573b18e9b97bbbc9af86a45e700fb573987b5e660d6a6726d64cb2f0a83c24b53f888871414a3b7a
-
Filesize
360KB
MD583a4bbe455c4a06ade7bf93576467695
SHA10e22e5fcf5b7e7197f8a37306a5ffd3796e2db58
SHA256fa175f2c8905f1a8f0b3a136e50fafd9b037b72e49f5b43ca76cac7197908d24
SHA5127226e6c2278894fa84b8700b64c56fb3848ca647281cda96573b18e9b97bbbc9af86a45e700fb573987b5e660d6a6726d64cb2f0a83c24b53f888871414a3b7a
-
Filesize
549KB
MD55e16f026b0ac4d7e2a00b10de77f8204
SHA167961a79e4d055794b3384b529fcf12039da2cd7
SHA256641e5860f5494295173ef4340cc919e165e9dd8974ee6f880518158def128b48
SHA512a8bd73db8b2da6e17a5c9fff9762c6ea59886f1a4a55f64806bfdc6811a1c5c90eac04a7d8a2afd37e8b0db69a25a0f08f07f27146b6df0a3ba1e03daa0d2c1a
-
Filesize
549KB
MD55e16f026b0ac4d7e2a00b10de77f8204
SHA167961a79e4d055794b3384b529fcf12039da2cd7
SHA256641e5860f5494295173ef4340cc919e165e9dd8974ee6f880518158def128b48
SHA512a8bd73db8b2da6e17a5c9fff9762c6ea59886f1a4a55f64806bfdc6811a1c5c90eac04a7d8a2afd37e8b0db69a25a0f08f07f27146b6df0a3ba1e03daa0d2c1a
-
Filesize
277KB
MD56e55e4839edebd728fce17027213b7f8
SHA1fabc57f742c82a1bc4b3ef5ca54e10c6f7a52131
SHA256197a14637f01415bf849e814c65476443ffdd31681daacb43e2476f7be6503ee
SHA512f2ba944d6fae2c058bc4af0cf1513a65d0ea71197b6b4f127720c3f349dfbc3c71069230a6bb3cee07a3b18ae9d5ba399db5cdeea8768b096451366a3c5320db
-
Filesize
277KB
MD56e55e4839edebd728fce17027213b7f8
SHA1fabc57f742c82a1bc4b3ef5ca54e10c6f7a52131
SHA256197a14637f01415bf849e814c65476443ffdd31681daacb43e2476f7be6503ee
SHA512f2ba944d6fae2c058bc4af0cf1513a65d0ea71197b6b4f127720c3f349dfbc3c71069230a6bb3cee07a3b18ae9d5ba399db5cdeea8768b096451366a3c5320db
-
Filesize
277KB
MD56e55e4839edebd728fce17027213b7f8
SHA1fabc57f742c82a1bc4b3ef5ca54e10c6f7a52131
SHA256197a14637f01415bf849e814c65476443ffdd31681daacb43e2476f7be6503ee
SHA512f2ba944d6fae2c058bc4af0cf1513a65d0ea71197b6b4f127720c3f349dfbc3c71069230a6bb3cee07a3b18ae9d5ba399db5cdeea8768b096451366a3c5320db
-
Filesize
360KB
MD583a4bbe455c4a06ade7bf93576467695
SHA10e22e5fcf5b7e7197f8a37306a5ffd3796e2db58
SHA256fa175f2c8905f1a8f0b3a136e50fafd9b037b72e49f5b43ca76cac7197908d24
SHA5127226e6c2278894fa84b8700b64c56fb3848ca647281cda96573b18e9b97bbbc9af86a45e700fb573987b5e660d6a6726d64cb2f0a83c24b53f888871414a3b7a
-
Filesize
360KB
MD583a4bbe455c4a06ade7bf93576467695
SHA10e22e5fcf5b7e7197f8a37306a5ffd3796e2db58
SHA256fa175f2c8905f1a8f0b3a136e50fafd9b037b72e49f5b43ca76cac7197908d24
SHA5127226e6c2278894fa84b8700b64c56fb3848ca647281cda96573b18e9b97bbbc9af86a45e700fb573987b5e660d6a6726d64cb2f0a83c24b53f888871414a3b7a
-
Filesize
360KB
MD583a4bbe455c4a06ade7bf93576467695
SHA10e22e5fcf5b7e7197f8a37306a5ffd3796e2db58
SHA256fa175f2c8905f1a8f0b3a136e50fafd9b037b72e49f5b43ca76cac7197908d24
SHA5127226e6c2278894fa84b8700b64c56fb3848ca647281cda96573b18e9b97bbbc9af86a45e700fb573987b5e660d6a6726d64cb2f0a83c24b53f888871414a3b7a