Analysis
-
max time kernel
126s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
04/10/2023, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
0502ca4d4b48c386a1041e9b9fc5990270f22de19baef4958b005d9381ee5453.exe
Resource
win10-20230915-en
General
-
Target
0502ca4d4b48c386a1041e9b9fc5990270f22de19baef4958b005d9381ee5453.exe
-
Size
1.5MB
-
MD5
28015be964c07433319685b9a33a44c1
-
SHA1
aa499e7114a3b694f3180acd0393b7fdd1314354
-
SHA256
0502ca4d4b48c386a1041e9b9fc5990270f22de19baef4958b005d9381ee5453
-
SHA512
d8bfc98f23b0652b6e4020e07581e274c294b1bb98a7f25d3013aaacbcbc395451b21d0737c8acb711fcc4af4bdb71cbb33b62e77d8b6ac08a85209a5a45e9e5
-
SSDEEP
24576:CyDa7dF1T/ftVEeO4VhgVbBa3lNu/ICyiHCfP1bR/fyAJkq6jmvnlV8leyufXbgu:p+RNVK4BPu/iiHCfXfyAJ8m3eMcI+Pu
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1Ml18Oh4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1Ml18Oh4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1Ml18Oh4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1Ml18Oh4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1Ml18Oh4.exe -
Executes dropped EXE 5 IoCs
pid Process 2936 yV7pW49.exe 852 Id0BX66.exe 3356 Cn6Iu18.exe 4444 1Ml18Oh4.exe 4964 2il4588.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1Ml18Oh4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1Ml18Oh4.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0502ca4d4b48c386a1041e9b9fc5990270f22de19baef4958b005d9381ee5453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" yV7pW49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Id0BX66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Cn6Iu18.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4964 set thread context of 4832 4964 2il4588.exe 76 -
Program crash 2 IoCs
pid pid_target Process procid_target 3496 4964 WerFault.exe 74 5104 4832 WerFault.exe 76 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4444 1Ml18Oh4.exe 4444 1Ml18Oh4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4444 1Ml18Oh4.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2936 2076 0502ca4d4b48c386a1041e9b9fc5990270f22de19baef4958b005d9381ee5453.exe 70 PID 2076 wrote to memory of 2936 2076 0502ca4d4b48c386a1041e9b9fc5990270f22de19baef4958b005d9381ee5453.exe 70 PID 2076 wrote to memory of 2936 2076 0502ca4d4b48c386a1041e9b9fc5990270f22de19baef4958b005d9381ee5453.exe 70 PID 2936 wrote to memory of 852 2936 yV7pW49.exe 71 PID 2936 wrote to memory of 852 2936 yV7pW49.exe 71 PID 2936 wrote to memory of 852 2936 yV7pW49.exe 71 PID 852 wrote to memory of 3356 852 Id0BX66.exe 72 PID 852 wrote to memory of 3356 852 Id0BX66.exe 72 PID 852 wrote to memory of 3356 852 Id0BX66.exe 72 PID 3356 wrote to memory of 4444 3356 Cn6Iu18.exe 73 PID 3356 wrote to memory of 4444 3356 Cn6Iu18.exe 73 PID 3356 wrote to memory of 4444 3356 Cn6Iu18.exe 73 PID 3356 wrote to memory of 4964 3356 Cn6Iu18.exe 74 PID 3356 wrote to memory of 4964 3356 Cn6Iu18.exe 74 PID 3356 wrote to memory of 4964 3356 Cn6Iu18.exe 74 PID 4964 wrote to memory of 4832 4964 2il4588.exe 76 PID 4964 wrote to memory of 4832 4964 2il4588.exe 76 PID 4964 wrote to memory of 4832 4964 2il4588.exe 76 PID 4964 wrote to memory of 4832 4964 2il4588.exe 76 PID 4964 wrote to memory of 4832 4964 2il4588.exe 76 PID 4964 wrote to memory of 4832 4964 2il4588.exe 76 PID 4964 wrote to memory of 4832 4964 2il4588.exe 76 PID 4964 wrote to memory of 4832 4964 2il4588.exe 76 PID 4964 wrote to memory of 4832 4964 2il4588.exe 76 PID 4964 wrote to memory of 4832 4964 2il4588.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\0502ca4d4b48c386a1041e9b9fc5990270f22de19baef4958b005d9381ee5453.exe"C:\Users\Admin\AppData\Local\Temp\0502ca4d4b48c386a1041e9b9fc5990270f22de19baef4958b005d9381ee5453.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yV7pW49.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yV7pW49.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Id0BX66.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Id0BX66.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Cn6Iu18.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Cn6Iu18.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ml18Oh4.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1Ml18Oh4.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2il4588.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2il4588.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 5687⤵
- Program crash
PID:5104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 5846⤵
- Program crash
PID:3496
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD56709d6b75b1b4e17f4efd23d47fca046
SHA12c43773aee74ee54a1caefbd70f3c6518a739987
SHA2569b83936ca3d20482c57cb4209b4564fb6e5cb7008785b23be55cb8517e63a6d4
SHA512fe5a5e6ed8b893fea9e8aec0c6d8fadb3e2596898e675cdcd51c58bf7d142f1650e0971a50968fb6f368f095f4653a08d0c36a025161f20ba8ade3cd2b8ed84c
-
Filesize
1.4MB
MD56709d6b75b1b4e17f4efd23d47fca046
SHA12c43773aee74ee54a1caefbd70f3c6518a739987
SHA2569b83936ca3d20482c57cb4209b4564fb6e5cb7008785b23be55cb8517e63a6d4
SHA512fe5a5e6ed8b893fea9e8aec0c6d8fadb3e2596898e675cdcd51c58bf7d142f1650e0971a50968fb6f368f095f4653a08d0c36a025161f20ba8ade3cd2b8ed84c
-
Filesize
985KB
MD573a498dfbd78463e525c4f82cb3469fa
SHA154a96b63802e768b88783aea356846bc4166cb18
SHA25671b217ccd3155697f9be4c3ff7fcf148554eb12c2aae8cc76d3503ed092b51bd
SHA512e6582ecfbc00492eeacefeafde3b739ad3c00da529bdcbc45f74e3abeaaea31cb5f3c3018598e10fc9f3378d7492a2ec54ee0f7211cb0df67aa677694a70d58d
-
Filesize
985KB
MD573a498dfbd78463e525c4f82cb3469fa
SHA154a96b63802e768b88783aea356846bc4166cb18
SHA25671b217ccd3155697f9be4c3ff7fcf148554eb12c2aae8cc76d3503ed092b51bd
SHA512e6582ecfbc00492eeacefeafde3b739ad3c00da529bdcbc45f74e3abeaaea31cb5f3c3018598e10fc9f3378d7492a2ec54ee0f7211cb0df67aa677694a70d58d
-
Filesize
598KB
MD56614aa84cd4f9d3476256f4b8fb9b43f
SHA1626a6b2990d9cb4a6b6e26243ad8f4b5aaf93318
SHA2569452fd4308bced51fb4f16693be3cae317dd71075f80ea6f486ca2976f0c44c7
SHA5121d211b07c28026967a6ca2dd09a1532449a6edf11fd7f33d1ca56727ede5d621f570f4a4aabbcc3c4828b6f66dd16642f76e9194ecdd96b9130c2c370aa3204f
-
Filesize
598KB
MD56614aa84cd4f9d3476256f4b8fb9b43f
SHA1626a6b2990d9cb4a6b6e26243ad8f4b5aaf93318
SHA2569452fd4308bced51fb4f16693be3cae317dd71075f80ea6f486ca2976f0c44c7
SHA5121d211b07c28026967a6ca2dd09a1532449a6edf11fd7f33d1ca56727ede5d621f570f4a4aabbcc3c4828b6f66dd16642f76e9194ecdd96b9130c2c370aa3204f
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
192KB
MD58904f85abd522c7d0cb5789d9583ccff
SHA15b34d8595b37c9e1fb9682b06dc5228efe07f0c6
SHA2567624b62fe97c8e370c82bc86f69c2f627328e701ce1f3d9bed92a1e5fe11fd7f
SHA51204dd0c4e612b6287af6a655425085d687538d756dcd639ecb6c62bcdafddde52c56ae305a6240ee1329a95d9cc59dee6de5000d273a5a560ad1adc3284e00e12
-
Filesize
1.4MB
MD50e27b44f7e884bbca7dbf46052d20154
SHA1b9cc7e40f72ce6f67bf8d745f9feddadea1caa09
SHA2560e118670fcc7015be4cc24f4dac4061e4d7652d2bfdf272822ef8d59b7972dfc
SHA512ab6132a85aaa1bb38a96905d9371460a44c4dd17cf6a623bf64395e4f35e32ac3d4d3053c3ad13dc3260b301e894ab1f911106845a7f1faf182f78956c8d97c1
-
Filesize
1.4MB
MD50e27b44f7e884bbca7dbf46052d20154
SHA1b9cc7e40f72ce6f67bf8d745f9feddadea1caa09
SHA2560e118670fcc7015be4cc24f4dac4061e4d7652d2bfdf272822ef8d59b7972dfc
SHA512ab6132a85aaa1bb38a96905d9371460a44c4dd17cf6a623bf64395e4f35e32ac3d4d3053c3ad13dc3260b301e894ab1f911106845a7f1faf182f78956c8d97c1