Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
0d15b6ebfb71f52439eb0ae7e7723966.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d15b6ebfb71f52439eb0ae7e7723966.exe
Resource
win10v2004-20231215-en
General
-
Target
0d15b6ebfb71f52439eb0ae7e7723966.exe
-
Size
392KB
-
MD5
0d15b6ebfb71f52439eb0ae7e7723966
-
SHA1
0468524683e41355b73fe76c9da080d5ad5ec831
-
SHA256
026e9befb7c30514cfb34763e83b7fb961e539eb995747e50d6770e36faa2025
-
SHA512
93305f281af8bab930bf42ea080c96d004dbd3ed5471e6e81d08a4d7ef2255bcd9e7b46480a9673943aa7522412b3d094fcd0ef182a219fba8e433a2b8e36be5
-
SSDEEP
6144:1Tc5LUkqkFwzgVq767LkLbv1P/AxrvNCBeq0fG5bfAYSR6VbysZk1dWyRr3dRK8O:1w5SCJibvNYJbxYYgbRke6DbK8UN
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000C4779B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 0d15b6ebfb71f52439eb0ae7e7723966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 0d15b6ebfb71f52439eb0ae7e7723966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 0d15b6ebfb71f52439eb0ae7e7723966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 0d15b6ebfb71f52439eb0ae7e7723966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000C4779B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 0d15b6ebfb71f52439eb0ae7e7723966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000C4779B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000C4779B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000C4779B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2756 043A6AEB00014973000C4779B4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 043A6AEB00014973000C4779B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1976 0d15b6ebfb71f52439eb0ae7e7723966.exe 1976 0d15b6ebfb71f52439eb0ae7e7723966.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 0d15b6ebfb71f52439eb0ae7e7723966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 0d15b6ebfb71f52439eb0ae7e7723966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 0d15b6ebfb71f52439eb0ae7e7723966.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 0d15b6ebfb71f52439eb0ae7e7723966.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000C4779B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 0d15b6ebfb71f52439eb0ae7e7723966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 0d15b6ebfb71f52439eb0ae7e7723966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000C4779B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000C4779B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000C4779B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 0d15b6ebfb71f52439eb0ae7e7723966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000C4779B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000C4779B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000C4779B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6AEB00014973000C4779B4EB2331 = "C:\\ProgramData\\043A6AEB00014973000C4779B4EB2331\\043A6AEB00014973000C4779B4EB2331.exe" 043A6AEB00014973000C4779B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1976 0d15b6ebfb71f52439eb0ae7e7723966.exe 1976 0d15b6ebfb71f52439eb0ae7e7723966.exe 1976 0d15b6ebfb71f52439eb0ae7e7723966.exe 1976 0d15b6ebfb71f52439eb0ae7e7723966.exe 1976 0d15b6ebfb71f52439eb0ae7e7723966.exe 1976 0d15b6ebfb71f52439eb0ae7e7723966.exe 1976 0d15b6ebfb71f52439eb0ae7e7723966.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2756 043A6AEB00014973000C4779B4EB2331.exe 2756 043A6AEB00014973000C4779B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2756 1976 0d15b6ebfb71f52439eb0ae7e7723966.exe 28 PID 1976 wrote to memory of 2756 1976 0d15b6ebfb71f52439eb0ae7e7723966.exe 28 PID 1976 wrote to memory of 2756 1976 0d15b6ebfb71f52439eb0ae7e7723966.exe 28 PID 1976 wrote to memory of 2756 1976 0d15b6ebfb71f52439eb0ae7e7723966.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d15b6ebfb71f52439eb0ae7e7723966.exe"C:\Users\Admin\AppData\Local\Temp\0d15b6ebfb71f52439eb0ae7e7723966.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\ProgramData\043A6AEB00014973000C4779B4EB2331\043A6AEB00014973000C4779B4EB2331.exe"C:\ProgramData\043A6AEB00014973000C4779B4EB2331\043A6AEB00014973000C4779B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\0d15b6ebfb71f52439eb0ae7e7723966.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD50d15b6ebfb71f52439eb0ae7e7723966
SHA10468524683e41355b73fe76c9da080d5ad5ec831
SHA256026e9befb7c30514cfb34763e83b7fb961e539eb995747e50d6770e36faa2025
SHA51293305f281af8bab930bf42ea080c96d004dbd3ed5471e6e81d08a4d7ef2255bcd9e7b46480a9673943aa7522412b3d094fcd0ef182a219fba8e433a2b8e36be5