Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 15:47
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
3955957b031ea9843f41c06347ac7969
-
SHA1
19a727fcd73296590c4db3ce4202008c54c391af
-
SHA256
8b7a112a62f01637183b6989de75d8e9d6880e34d41fd137e32efa6aa8f3b111
-
SHA512
eab1ecb67fa43391967ee3a0958cd11647f9fae5ff25687f167e5772f1f7f855345c935777ac2d01eed802511e6c85fd85348dfc4780906f1d0203358f6466c0
-
SSDEEP
24576:4ytY02JNkmGVYBqOEzZNPTOyIAwNpHS4tYdppHMm2dSBeqg:/aPXHGskP6yIAOFtY7d97
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1oS04ci9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1oS04ci9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1oS04ci9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1oS04ci9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1oS04ci9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1oS04ci9.exe -
Executes dropped EXE 5 IoCs
pid Process 2668 Jk8Sx69.exe 2568 hJ2JT39.exe 2452 qk2xr67.exe 2948 1oS04ci9.exe 1996 2jq1595.exe -
Loads dropped DLL 14 IoCs
pid Process 2964 file.exe 2668 Jk8Sx69.exe 2668 Jk8Sx69.exe 2568 hJ2JT39.exe 2568 hJ2JT39.exe 2452 qk2xr67.exe 2452 qk2xr67.exe 2948 1oS04ci9.exe 2452 qk2xr67.exe 1996 2jq1595.exe 2792 WerFault.exe 2792 WerFault.exe 2792 WerFault.exe 2792 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1oS04ci9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1oS04ci9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Jk8Sx69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" hJ2JT39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" qk2xr67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1996 set thread context of 684 1996 2jq1595.exe 33 -
Program crash 1 IoCs
pid pid_target Process procid_target 2792 1996 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2948 1oS04ci9.exe 2948 1oS04ci9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2948 1oS04ci9.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2668 2964 file.exe 28 PID 2964 wrote to memory of 2668 2964 file.exe 28 PID 2964 wrote to memory of 2668 2964 file.exe 28 PID 2964 wrote to memory of 2668 2964 file.exe 28 PID 2964 wrote to memory of 2668 2964 file.exe 28 PID 2964 wrote to memory of 2668 2964 file.exe 28 PID 2964 wrote to memory of 2668 2964 file.exe 28 PID 2668 wrote to memory of 2568 2668 Jk8Sx69.exe 29 PID 2668 wrote to memory of 2568 2668 Jk8Sx69.exe 29 PID 2668 wrote to memory of 2568 2668 Jk8Sx69.exe 29 PID 2668 wrote to memory of 2568 2668 Jk8Sx69.exe 29 PID 2668 wrote to memory of 2568 2668 Jk8Sx69.exe 29 PID 2668 wrote to memory of 2568 2668 Jk8Sx69.exe 29 PID 2668 wrote to memory of 2568 2668 Jk8Sx69.exe 29 PID 2568 wrote to memory of 2452 2568 hJ2JT39.exe 30 PID 2568 wrote to memory of 2452 2568 hJ2JT39.exe 30 PID 2568 wrote to memory of 2452 2568 hJ2JT39.exe 30 PID 2568 wrote to memory of 2452 2568 hJ2JT39.exe 30 PID 2568 wrote to memory of 2452 2568 hJ2JT39.exe 30 PID 2568 wrote to memory of 2452 2568 hJ2JT39.exe 30 PID 2568 wrote to memory of 2452 2568 hJ2JT39.exe 30 PID 2452 wrote to memory of 2948 2452 qk2xr67.exe 31 PID 2452 wrote to memory of 2948 2452 qk2xr67.exe 31 PID 2452 wrote to memory of 2948 2452 qk2xr67.exe 31 PID 2452 wrote to memory of 2948 2452 qk2xr67.exe 31 PID 2452 wrote to memory of 2948 2452 qk2xr67.exe 31 PID 2452 wrote to memory of 2948 2452 qk2xr67.exe 31 PID 2452 wrote to memory of 2948 2452 qk2xr67.exe 31 PID 2452 wrote to memory of 1996 2452 qk2xr67.exe 32 PID 2452 wrote to memory of 1996 2452 qk2xr67.exe 32 PID 2452 wrote to memory of 1996 2452 qk2xr67.exe 32 PID 2452 wrote to memory of 1996 2452 qk2xr67.exe 32 PID 2452 wrote to memory of 1996 2452 qk2xr67.exe 32 PID 2452 wrote to memory of 1996 2452 qk2xr67.exe 32 PID 2452 wrote to memory of 1996 2452 qk2xr67.exe 32 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 684 1996 2jq1595.exe 33 PID 1996 wrote to memory of 2792 1996 2jq1595.exe 34 PID 1996 wrote to memory of 2792 1996 2jq1595.exe 34 PID 1996 wrote to memory of 2792 1996 2jq1595.exe 34 PID 1996 wrote to memory of 2792 1996 2jq1595.exe 34 PID 1996 wrote to memory of 2792 1996 2jq1595.exe 34 PID 1996 wrote to memory of 2792 1996 2jq1595.exe 34 PID 1996 wrote to memory of 2792 1996 2jq1595.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jk8Sx69.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jk8Sx69.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hJ2JT39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hJ2JT39.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qk2xr67.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qk2xr67.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1oS04ci9.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1oS04ci9.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jq1595.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jq1595.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:2792
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD57fde9b8168088a7472176d6250ae85e2
SHA107ac1e4ff2d1f8aba5f0d0421aef6db75f20f56a
SHA25678f101b48b99d75abd64a17b9a84f8da154ee718e0754cf2d6b51ada4dd1da07
SHA512e520c3b766a57c91165b1106beffcddc44ade71cc31de3523d23ccfd653cf92e59304c231998482d876f983cefb91208f98a51dc645be8b9bb1ac08a0d75bc54
-
Filesize
1.0MB
MD57fde9b8168088a7472176d6250ae85e2
SHA107ac1e4ff2d1f8aba5f0d0421aef6db75f20f56a
SHA25678f101b48b99d75abd64a17b9a84f8da154ee718e0754cf2d6b51ada4dd1da07
SHA512e520c3b766a57c91165b1106beffcddc44ade71cc31de3523d23ccfd653cf92e59304c231998482d876f983cefb91208f98a51dc645be8b9bb1ac08a0d75bc54
-
Filesize
745KB
MD575ea9db44d66446e08ed7a146fdf6f31
SHA18a7562bc86061584a532d01c052060dcc8879e28
SHA2565d2896bd213e90d4c63453478337bad56c4b9a393d5938b715de2c57546345e8
SHA5120f98d498c156cf0bcb92b62686937992bf675f4118924df64c1ab252ed46be161ac5f46e92b1fa8695f98c4e289f252877be320e4dc6b6d349e06e2f8ba874e4
-
Filesize
745KB
MD575ea9db44d66446e08ed7a146fdf6f31
SHA18a7562bc86061584a532d01c052060dcc8879e28
SHA2565d2896bd213e90d4c63453478337bad56c4b9a393d5938b715de2c57546345e8
SHA5120f98d498c156cf0bcb92b62686937992bf675f4118924df64c1ab252ed46be161ac5f46e92b1fa8695f98c4e289f252877be320e4dc6b6d349e06e2f8ba874e4
-
Filesize
492KB
MD55b392bbb729742f085a52f574b992975
SHA1f479ebc0fc3ba37ce31094a6531c0d292c09cb3e
SHA2569704e3c57a853e175f2800d6f6a84905e2ce971e6e27deddf71e962bb10d1e27
SHA512e5371036945c8f29f0f5d6519ce949df4fe796e08b2c01061ec10f75aea18c73c6ff643e9fabfdd9ceb57d6d90181e7bd53cc214243f6e34bcfc6100ebc8c066
-
Filesize
492KB
MD55b392bbb729742f085a52f574b992975
SHA1f479ebc0fc3ba37ce31094a6531c0d292c09cb3e
SHA2569704e3c57a853e175f2800d6f6a84905e2ce971e6e27deddf71e962bb10d1e27
SHA512e5371036945c8f29f0f5d6519ce949df4fe796e08b2c01061ec10f75aea18c73c6ff643e9fabfdd9ceb57d6d90181e7bd53cc214243f6e34bcfc6100ebc8c066
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
446KB
MD5e473a49257fac8fe7e60492989821002
SHA1ddbd6bd889f546534478f1253e33a068f361b5aa
SHA256ea0aebd49efdfe21481e2073c98a53c3d31020ada7451e940738024e093b6f7f
SHA512f286a4693c9388594303d31e16a79a0b568279e612379d6fe768ae9be7f759ee8f37562d6104d35b3c04e4b2307513d1e198f2eee9b48451f32b057c73559c7e
-
Filesize
446KB
MD5e473a49257fac8fe7e60492989821002
SHA1ddbd6bd889f546534478f1253e33a068f361b5aa
SHA256ea0aebd49efdfe21481e2073c98a53c3d31020ada7451e940738024e093b6f7f
SHA512f286a4693c9388594303d31e16a79a0b568279e612379d6fe768ae9be7f759ee8f37562d6104d35b3c04e4b2307513d1e198f2eee9b48451f32b057c73559c7e
-
Filesize
1.0MB
MD57fde9b8168088a7472176d6250ae85e2
SHA107ac1e4ff2d1f8aba5f0d0421aef6db75f20f56a
SHA25678f101b48b99d75abd64a17b9a84f8da154ee718e0754cf2d6b51ada4dd1da07
SHA512e520c3b766a57c91165b1106beffcddc44ade71cc31de3523d23ccfd653cf92e59304c231998482d876f983cefb91208f98a51dc645be8b9bb1ac08a0d75bc54
-
Filesize
1.0MB
MD57fde9b8168088a7472176d6250ae85e2
SHA107ac1e4ff2d1f8aba5f0d0421aef6db75f20f56a
SHA25678f101b48b99d75abd64a17b9a84f8da154ee718e0754cf2d6b51ada4dd1da07
SHA512e520c3b766a57c91165b1106beffcddc44ade71cc31de3523d23ccfd653cf92e59304c231998482d876f983cefb91208f98a51dc645be8b9bb1ac08a0d75bc54
-
Filesize
745KB
MD575ea9db44d66446e08ed7a146fdf6f31
SHA18a7562bc86061584a532d01c052060dcc8879e28
SHA2565d2896bd213e90d4c63453478337bad56c4b9a393d5938b715de2c57546345e8
SHA5120f98d498c156cf0bcb92b62686937992bf675f4118924df64c1ab252ed46be161ac5f46e92b1fa8695f98c4e289f252877be320e4dc6b6d349e06e2f8ba874e4
-
Filesize
745KB
MD575ea9db44d66446e08ed7a146fdf6f31
SHA18a7562bc86061584a532d01c052060dcc8879e28
SHA2565d2896bd213e90d4c63453478337bad56c4b9a393d5938b715de2c57546345e8
SHA5120f98d498c156cf0bcb92b62686937992bf675f4118924df64c1ab252ed46be161ac5f46e92b1fa8695f98c4e289f252877be320e4dc6b6d349e06e2f8ba874e4
-
Filesize
492KB
MD55b392bbb729742f085a52f574b992975
SHA1f479ebc0fc3ba37ce31094a6531c0d292c09cb3e
SHA2569704e3c57a853e175f2800d6f6a84905e2ce971e6e27deddf71e962bb10d1e27
SHA512e5371036945c8f29f0f5d6519ce949df4fe796e08b2c01061ec10f75aea18c73c6ff643e9fabfdd9ceb57d6d90181e7bd53cc214243f6e34bcfc6100ebc8c066
-
Filesize
492KB
MD55b392bbb729742f085a52f574b992975
SHA1f479ebc0fc3ba37ce31094a6531c0d292c09cb3e
SHA2569704e3c57a853e175f2800d6f6a84905e2ce971e6e27deddf71e962bb10d1e27
SHA512e5371036945c8f29f0f5d6519ce949df4fe796e08b2c01061ec10f75aea18c73c6ff643e9fabfdd9ceb57d6d90181e7bd53cc214243f6e34bcfc6100ebc8c066
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
446KB
MD5e473a49257fac8fe7e60492989821002
SHA1ddbd6bd889f546534478f1253e33a068f361b5aa
SHA256ea0aebd49efdfe21481e2073c98a53c3d31020ada7451e940738024e093b6f7f
SHA512f286a4693c9388594303d31e16a79a0b568279e612379d6fe768ae9be7f759ee8f37562d6104d35b3c04e4b2307513d1e198f2eee9b48451f32b057c73559c7e
-
Filesize
446KB
MD5e473a49257fac8fe7e60492989821002
SHA1ddbd6bd889f546534478f1253e33a068f361b5aa
SHA256ea0aebd49efdfe21481e2073c98a53c3d31020ada7451e940738024e093b6f7f
SHA512f286a4693c9388594303d31e16a79a0b568279e612379d6fe768ae9be7f759ee8f37562d6104d35b3c04e4b2307513d1e198f2eee9b48451f32b057c73559c7e
-
Filesize
446KB
MD5e473a49257fac8fe7e60492989821002
SHA1ddbd6bd889f546534478f1253e33a068f361b5aa
SHA256ea0aebd49efdfe21481e2073c98a53c3d31020ada7451e940738024e093b6f7f
SHA512f286a4693c9388594303d31e16a79a0b568279e612379d6fe768ae9be7f759ee8f37562d6104d35b3c04e4b2307513d1e198f2eee9b48451f32b057c73559c7e
-
Filesize
446KB
MD5e473a49257fac8fe7e60492989821002
SHA1ddbd6bd889f546534478f1253e33a068f361b5aa
SHA256ea0aebd49efdfe21481e2073c98a53c3d31020ada7451e940738024e093b6f7f
SHA512f286a4693c9388594303d31e16a79a0b568279e612379d6fe768ae9be7f759ee8f37562d6104d35b3c04e4b2307513d1e198f2eee9b48451f32b057c73559c7e
-
Filesize
446KB
MD5e473a49257fac8fe7e60492989821002
SHA1ddbd6bd889f546534478f1253e33a068f361b5aa
SHA256ea0aebd49efdfe21481e2073c98a53c3d31020ada7451e940738024e093b6f7f
SHA512f286a4693c9388594303d31e16a79a0b568279e612379d6fe768ae9be7f759ee8f37562d6104d35b3c04e4b2307513d1e198f2eee9b48451f32b057c73559c7e
-
Filesize
446KB
MD5e473a49257fac8fe7e60492989821002
SHA1ddbd6bd889f546534478f1253e33a068f361b5aa
SHA256ea0aebd49efdfe21481e2073c98a53c3d31020ada7451e940738024e093b6f7f
SHA512f286a4693c9388594303d31e16a79a0b568279e612379d6fe768ae9be7f759ee8f37562d6104d35b3c04e4b2307513d1e198f2eee9b48451f32b057c73559c7e