Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 14:06

General

  • Target

    1af44d016dd4e2a2d061c7a3df809a9d.exe

  • Size

    41KB

  • MD5

    1af44d016dd4e2a2d061c7a3df809a9d

  • SHA1

    094c7e962fd5ae0298a9841d086406d5aa239fd3

  • SHA256

    46eddaa8a855e8ee7a5639971c6110a8379d55846abd2b9b347bbd0f911e6d60

  • SHA512

    ad9287ea6574db87be747066c4ad3990ac0e7d441b13b6f020596c1a5985b47def8c521c041776338ce16ab0ca452fa1f38045804457d7fb7cfe7349a6894a67

  • SSDEEP

    768:P2JVITlWzPjrpYbblzgArbodtyzZhUdq0WCZFVtM1VgefDdlF7eEf/L1l581R:P2wlzlrbodWiZFVt2nD7F7eE3L8

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1af44d016dd4e2a2d061c7a3df809a9d.exe
    "C:\Users\Admin\AppData\Local\Temp\1af44d016dd4e2a2d061c7a3df809a9d.exe"
    1⤵
    • Windows security bypass
    • Windows security modification
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "file.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall set opmode DISABLE
        3⤵
        • Modifies Windows Firewall
        PID:1352
    • C:\Windows\services.exe
      C:\Windows\services.exe
      2⤵
      • Modifies security service
      • Windows security bypass
      • Executes dropped EXE
      • Windows security modification
      • Adds Run key to start application
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "file.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall set opmode DISABLE
          4⤵
          • Modifies Windows Firewall
          PID:2644
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "file.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Windows\services.exe" services.exe ENABLE
          4⤵
          • Modifies Windows Firewall
          PID:3052
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 172
      2⤵
      • Program crash
      PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\file.bat

    Filesize

    40B

    MD5

    f5e059efe5ed14466033f1f4357a4a4b

    SHA1

    ccb28b2be69275c38738947e790c10a2382302c2

    SHA256

    c7d0b4156b557c67d3e758d86a45e31c70110c989e679097f52f3edaf4963e21

    SHA512

    d36ef9a9fe8b42951648933fdc41b9b61077bfb4221360f9308104f05e88d17ffdb07948a29858d2f4371db1def154cc4b4be57304c322934a763f6e8b8872de

  • C:\Windows\file.bat

    Filesize

    86B

    MD5

    0c37570e7decca15d0dcd5ee2957371d

    SHA1

    db5dd323003574a3f3c4932c1256bb792bedcfd2

    SHA256

    d493ab01e5d583d327bd94ba7403d4a73693b61f708752c6deb45f55477b0107

    SHA512

    ac2d818f7eb11fce1b4b84fd667213a9c392d064b13c1470f104ef815fa6920a8ffb7c1bdf00ef808604c00d7a8dd0916738256d231303ec3084b8d29ceaa3cd

  • C:\Windows\services.exe

    Filesize

    41KB

    MD5

    1af44d016dd4e2a2d061c7a3df809a9d

    SHA1

    094c7e962fd5ae0298a9841d086406d5aa239fd3

    SHA256

    46eddaa8a855e8ee7a5639971c6110a8379d55846abd2b9b347bbd0f911e6d60

    SHA512

    ad9287ea6574db87be747066c4ad3990ac0e7d441b13b6f020596c1a5985b47def8c521c041776338ce16ab0ca452fa1f38045804457d7fb7cfe7349a6894a67

  • memory/1732-0-0x00000000003E0000-0x0000000000419000-memory.dmp

    Filesize

    228KB