Analysis
-
max time kernel
148s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 07:46
Static task
static1
Behavioral task
behavioral1
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win10v2004-20230220-en
General
-
Target
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
-
Size
706KB
-
MD5
a57eaa069601c17aff489167c2a819e5
-
SHA1
d9087bc4e79264a8a47324c0a373f3a101c083ee
-
SHA256
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a
-
SHA512
8cd870ca8dd9a5b1fca449d7e960efefd6428f8f71cb7112224a0b2701d2660d97661c208a4438a4423770fb897f8d786797ed42f6691fc72e199d7a47a51657
-
SSDEEP
12288:jy90TiPXDCcW9nLRnB3tcCHzU8j8y+Sr2dg2EoyzPqOzUpNdXtlWRKjp8S:jyQgE9nNB3Nw8WSr2ZTyhzcdXtAcjp8S
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr352157.exe -
Executes dropped EXE 3 IoCs
pid Process 1284 un460721.exe 1496 pr352157.exe 1068 qu619011.exe -
Loads dropped DLL 8 IoCs
pid Process 1716 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 1284 un460721.exe 1284 un460721.exe 1284 un460721.exe 1496 pr352157.exe 1284 un460721.exe 1284 un460721.exe 1068 qu619011.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr352157.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un460721.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un460721.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1496 pr352157.exe 1496 pr352157.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1496 pr352157.exe Token: SeDebugPrivilege 1068 qu619011.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1284 1716 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 28 PID 1716 wrote to memory of 1284 1716 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 28 PID 1716 wrote to memory of 1284 1716 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 28 PID 1716 wrote to memory of 1284 1716 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 28 PID 1716 wrote to memory of 1284 1716 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 28 PID 1716 wrote to memory of 1284 1716 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 28 PID 1716 wrote to memory of 1284 1716 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 28 PID 1284 wrote to memory of 1496 1284 un460721.exe 29 PID 1284 wrote to memory of 1496 1284 un460721.exe 29 PID 1284 wrote to memory of 1496 1284 un460721.exe 29 PID 1284 wrote to memory of 1496 1284 un460721.exe 29 PID 1284 wrote to memory of 1496 1284 un460721.exe 29 PID 1284 wrote to memory of 1496 1284 un460721.exe 29 PID 1284 wrote to memory of 1496 1284 un460721.exe 29 PID 1284 wrote to memory of 1068 1284 un460721.exe 30 PID 1284 wrote to memory of 1068 1284 un460721.exe 30 PID 1284 wrote to memory of 1068 1284 un460721.exe 30 PID 1284 wrote to memory of 1068 1284 un460721.exe 30 PID 1284 wrote to memory of 1068 1284 un460721.exe 30 PID 1284 wrote to memory of 1068 1284 un460721.exe 30 PID 1284 wrote to memory of 1068 1284 un460721.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe"C:\Users\Admin\AppData\Local\Temp\e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460721.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460721.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr352157.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr352157.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu619011.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu619011.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD5a4c8943c5d021f12d17f93c6328328c4
SHA168ea049990962d746b6a536ed674e1566c44ead3
SHA256baf59f967c98b99115168a74d1516e332573078399aff17ae49c1df8974db623
SHA512269c3aa7c3588303d1157a98de77a67fad3fac50f80241778977f965c0ba1cec961f69368ecb7f77a1f3c621e04e5d70bbec4477d3c9f1f1c31d3264882d8657
-
Filesize
551KB
MD5a4c8943c5d021f12d17f93c6328328c4
SHA168ea049990962d746b6a536ed674e1566c44ead3
SHA256baf59f967c98b99115168a74d1516e332573078399aff17ae49c1df8974db623
SHA512269c3aa7c3588303d1157a98de77a67fad3fac50f80241778977f965c0ba1cec961f69368ecb7f77a1f3c621e04e5d70bbec4477d3c9f1f1c31d3264882d8657
-
Filesize
286KB
MD5a3c21d10a14315f68dc2329de4977403
SHA14a3fc4564ecbec45ff388773a5ddad89280b26b7
SHA256382f2509df79a2fa34653bd0f9763971b0b4bc2bcb5142b9b1034b03a95fbed9
SHA5122ad2b31d462d0faf34027a896dbd9ceaef2febb133b4df932dd9db1007c177c9fa5cc8506b7f6c6bb9a88b410201661c8479adc8be85eff93ee1ba724922efbd
-
Filesize
286KB
MD5a3c21d10a14315f68dc2329de4977403
SHA14a3fc4564ecbec45ff388773a5ddad89280b26b7
SHA256382f2509df79a2fa34653bd0f9763971b0b4bc2bcb5142b9b1034b03a95fbed9
SHA5122ad2b31d462d0faf34027a896dbd9ceaef2febb133b4df932dd9db1007c177c9fa5cc8506b7f6c6bb9a88b410201661c8479adc8be85eff93ee1ba724922efbd
-
Filesize
286KB
MD5a3c21d10a14315f68dc2329de4977403
SHA14a3fc4564ecbec45ff388773a5ddad89280b26b7
SHA256382f2509df79a2fa34653bd0f9763971b0b4bc2bcb5142b9b1034b03a95fbed9
SHA5122ad2b31d462d0faf34027a896dbd9ceaef2febb133b4df932dd9db1007c177c9fa5cc8506b7f6c6bb9a88b410201661c8479adc8be85eff93ee1ba724922efbd
-
Filesize
369KB
MD54b4514014cf7f85a6bc70736dac74ab5
SHA1f1804216e8fbb186c377195b6afe78c1cb7266f1
SHA256a2e1a1f6f4635554a4d5dc9741f612d25284338d5ef80e43d609f722881886ad
SHA5123154e109f747fd30bb745a4236c1dc384e9a51a3ed90a2837cf39abed3cff9c3e6010e840a3834fe6dd6438c713e60e670028e82b8ec55e2576624463da377c0
-
Filesize
369KB
MD54b4514014cf7f85a6bc70736dac74ab5
SHA1f1804216e8fbb186c377195b6afe78c1cb7266f1
SHA256a2e1a1f6f4635554a4d5dc9741f612d25284338d5ef80e43d609f722881886ad
SHA5123154e109f747fd30bb745a4236c1dc384e9a51a3ed90a2837cf39abed3cff9c3e6010e840a3834fe6dd6438c713e60e670028e82b8ec55e2576624463da377c0
-
Filesize
369KB
MD54b4514014cf7f85a6bc70736dac74ab5
SHA1f1804216e8fbb186c377195b6afe78c1cb7266f1
SHA256a2e1a1f6f4635554a4d5dc9741f612d25284338d5ef80e43d609f722881886ad
SHA5123154e109f747fd30bb745a4236c1dc384e9a51a3ed90a2837cf39abed3cff9c3e6010e840a3834fe6dd6438c713e60e670028e82b8ec55e2576624463da377c0
-
Filesize
551KB
MD5a4c8943c5d021f12d17f93c6328328c4
SHA168ea049990962d746b6a536ed674e1566c44ead3
SHA256baf59f967c98b99115168a74d1516e332573078399aff17ae49c1df8974db623
SHA512269c3aa7c3588303d1157a98de77a67fad3fac50f80241778977f965c0ba1cec961f69368ecb7f77a1f3c621e04e5d70bbec4477d3c9f1f1c31d3264882d8657
-
Filesize
551KB
MD5a4c8943c5d021f12d17f93c6328328c4
SHA168ea049990962d746b6a536ed674e1566c44ead3
SHA256baf59f967c98b99115168a74d1516e332573078399aff17ae49c1df8974db623
SHA512269c3aa7c3588303d1157a98de77a67fad3fac50f80241778977f965c0ba1cec961f69368ecb7f77a1f3c621e04e5d70bbec4477d3c9f1f1c31d3264882d8657
-
Filesize
286KB
MD5a3c21d10a14315f68dc2329de4977403
SHA14a3fc4564ecbec45ff388773a5ddad89280b26b7
SHA256382f2509df79a2fa34653bd0f9763971b0b4bc2bcb5142b9b1034b03a95fbed9
SHA5122ad2b31d462d0faf34027a896dbd9ceaef2febb133b4df932dd9db1007c177c9fa5cc8506b7f6c6bb9a88b410201661c8479adc8be85eff93ee1ba724922efbd
-
Filesize
286KB
MD5a3c21d10a14315f68dc2329de4977403
SHA14a3fc4564ecbec45ff388773a5ddad89280b26b7
SHA256382f2509df79a2fa34653bd0f9763971b0b4bc2bcb5142b9b1034b03a95fbed9
SHA5122ad2b31d462d0faf34027a896dbd9ceaef2febb133b4df932dd9db1007c177c9fa5cc8506b7f6c6bb9a88b410201661c8479adc8be85eff93ee1ba724922efbd
-
Filesize
286KB
MD5a3c21d10a14315f68dc2329de4977403
SHA14a3fc4564ecbec45ff388773a5ddad89280b26b7
SHA256382f2509df79a2fa34653bd0f9763971b0b4bc2bcb5142b9b1034b03a95fbed9
SHA5122ad2b31d462d0faf34027a896dbd9ceaef2febb133b4df932dd9db1007c177c9fa5cc8506b7f6c6bb9a88b410201661c8479adc8be85eff93ee1ba724922efbd
-
Filesize
369KB
MD54b4514014cf7f85a6bc70736dac74ab5
SHA1f1804216e8fbb186c377195b6afe78c1cb7266f1
SHA256a2e1a1f6f4635554a4d5dc9741f612d25284338d5ef80e43d609f722881886ad
SHA5123154e109f747fd30bb745a4236c1dc384e9a51a3ed90a2837cf39abed3cff9c3e6010e840a3834fe6dd6438c713e60e670028e82b8ec55e2576624463da377c0
-
Filesize
369KB
MD54b4514014cf7f85a6bc70736dac74ab5
SHA1f1804216e8fbb186c377195b6afe78c1cb7266f1
SHA256a2e1a1f6f4635554a4d5dc9741f612d25284338d5ef80e43d609f722881886ad
SHA5123154e109f747fd30bb745a4236c1dc384e9a51a3ed90a2837cf39abed3cff9c3e6010e840a3834fe6dd6438c713e60e670028e82b8ec55e2576624463da377c0
-
Filesize
369KB
MD54b4514014cf7f85a6bc70736dac74ab5
SHA1f1804216e8fbb186c377195b6afe78c1cb7266f1
SHA256a2e1a1f6f4635554a4d5dc9741f612d25284338d5ef80e43d609f722881886ad
SHA5123154e109f747fd30bb745a4236c1dc384e9a51a3ed90a2837cf39abed3cff9c3e6010e840a3834fe6dd6438c713e60e670028e82b8ec55e2576624463da377c0