Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
1af44d016dd4e2a2d061c7a3df809a9d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1af44d016dd4e2a2d061c7a3df809a9d.exe
Resource
win10v2004-20231215-en
General
-
Target
1af44d016dd4e2a2d061c7a3df809a9d.exe
-
Size
41KB
-
MD5
1af44d016dd4e2a2d061c7a3df809a9d
-
SHA1
094c7e962fd5ae0298a9841d086406d5aa239fd3
-
SHA256
46eddaa8a855e8ee7a5639971c6110a8379d55846abd2b9b347bbd0f911e6d60
-
SHA512
ad9287ea6574db87be747066c4ad3990ac0e7d441b13b6f020596c1a5985b47def8c521c041776338ce16ab0ca452fa1f38045804457d7fb7cfe7349a6894a67
-
SSDEEP
768:P2JVITlWzPjrpYbblzgArbodtyzZhUdq0WCZFVtM1VgefDdlF7eEf/L1l581R:P2wlzlrbodWiZFVt2nD7F7eE3L8
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" services.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 1af44d016dd4e2a2d061c7a3df809a9d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 1af44d016dd4e2a2d061c7a3df809a9d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" services.exe -
Modifies Windows Firewall 1 TTPs 3 IoCs
pid Process 1352 netsh.exe 2644 netsh.exe 3052 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2728 services.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 1af44d016dd4e2a2d061c7a3df809a9d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 1af44d016dd4e2a2d061c7a3df809a9d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\file.bat 1af44d016dd4e2a2d061c7a3df809a9d.exe File created C:\Windows\services.exe 1af44d016dd4e2a2d061c7a3df809a9d.exe File opened for modification C:\Windows\services.exe 1af44d016dd4e2a2d061c7a3df809a9d.exe File created C:\Windows\file.bat services.exe File created C:\Windows\services.exe services.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2700 1732 WerFault.exe 21 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Desktop services.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Desktop\id = "268560425473" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Desktop\host = "66.232.105.54" services.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2000 1732 1af44d016dd4e2a2d061c7a3df809a9d.exe 28 PID 1732 wrote to memory of 2000 1732 1af44d016dd4e2a2d061c7a3df809a9d.exe 28 PID 1732 wrote to memory of 2000 1732 1af44d016dd4e2a2d061c7a3df809a9d.exe 28 PID 1732 wrote to memory of 2000 1732 1af44d016dd4e2a2d061c7a3df809a9d.exe 28 PID 2000 wrote to memory of 1352 2000 cmd.exe 30 PID 2000 wrote to memory of 1352 2000 cmd.exe 30 PID 2000 wrote to memory of 1352 2000 cmd.exe 30 PID 2000 wrote to memory of 1352 2000 cmd.exe 30 PID 1732 wrote to memory of 2728 1732 1af44d016dd4e2a2d061c7a3df809a9d.exe 31 PID 1732 wrote to memory of 2728 1732 1af44d016dd4e2a2d061c7a3df809a9d.exe 31 PID 1732 wrote to memory of 2728 1732 1af44d016dd4e2a2d061c7a3df809a9d.exe 31 PID 1732 wrote to memory of 2728 1732 1af44d016dd4e2a2d061c7a3df809a9d.exe 31 PID 1732 wrote to memory of 2700 1732 1af44d016dd4e2a2d061c7a3df809a9d.exe 32 PID 1732 wrote to memory of 2700 1732 1af44d016dd4e2a2d061c7a3df809a9d.exe 32 PID 1732 wrote to memory of 2700 1732 1af44d016dd4e2a2d061c7a3df809a9d.exe 32 PID 1732 wrote to memory of 2700 1732 1af44d016dd4e2a2d061c7a3df809a9d.exe 32 PID 2728 wrote to memory of 2720 2728 services.exe 33 PID 2728 wrote to memory of 2720 2728 services.exe 33 PID 2728 wrote to memory of 2720 2728 services.exe 33 PID 2728 wrote to memory of 2720 2728 services.exe 33 PID 2720 wrote to memory of 2644 2720 cmd.exe 35 PID 2720 wrote to memory of 2644 2720 cmd.exe 35 PID 2720 wrote to memory of 2644 2720 cmd.exe 35 PID 2720 wrote to memory of 2644 2720 cmd.exe 35 PID 2728 wrote to memory of 2704 2728 services.exe 36 PID 2728 wrote to memory of 2704 2728 services.exe 36 PID 2728 wrote to memory of 2704 2728 services.exe 36 PID 2728 wrote to memory of 2704 2728 services.exe 36 PID 2704 wrote to memory of 3052 2704 cmd.exe 38 PID 2704 wrote to memory of 3052 2704 cmd.exe 38 PID 2704 wrote to memory of 3052 2704 cmd.exe 38 PID 2704 wrote to memory of 3052 2704 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1af44d016dd4e2a2d061c7a3df809a9d.exe"C:\Users\Admin\AppData\Local\Temp\1af44d016dd4e2a2d061c7a3df809a9d.exe"1⤵
- Windows security bypass
- Windows security modification
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.execmd /c "file.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode DISABLE3⤵
- Modifies Windows Firewall
PID:1352
-
-
-
C:\Windows\services.exeC:\Windows\services.exe2⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c "file.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode DISABLE4⤵
- Modifies Windows Firewall
PID:2644
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "file.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\services.exe" services.exe ENABLE4⤵
- Modifies Windows Firewall
PID:3052
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 1722⤵
- Program crash
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5f5e059efe5ed14466033f1f4357a4a4b
SHA1ccb28b2be69275c38738947e790c10a2382302c2
SHA256c7d0b4156b557c67d3e758d86a45e31c70110c989e679097f52f3edaf4963e21
SHA512d36ef9a9fe8b42951648933fdc41b9b61077bfb4221360f9308104f05e88d17ffdb07948a29858d2f4371db1def154cc4b4be57304c322934a763f6e8b8872de
-
Filesize
86B
MD50c37570e7decca15d0dcd5ee2957371d
SHA1db5dd323003574a3f3c4932c1256bb792bedcfd2
SHA256d493ab01e5d583d327bd94ba7403d4a73693b61f708752c6deb45f55477b0107
SHA512ac2d818f7eb11fce1b4b84fd667213a9c392d064b13c1470f104ef815fa6920a8ffb7c1bdf00ef808604c00d7a8dd0916738256d231303ec3084b8d29ceaa3cd
-
Filesize
41KB
MD51af44d016dd4e2a2d061c7a3df809a9d
SHA1094c7e962fd5ae0298a9841d086406d5aa239fd3
SHA25646eddaa8a855e8ee7a5639971c6110a8379d55846abd2b9b347bbd0f911e6d60
SHA512ad9287ea6574db87be747066c4ad3990ac0e7d441b13b6f020596c1a5985b47def8c521c041776338ce16ab0ca452fa1f38045804457d7fb7cfe7349a6894a67