Analysis
-
max time kernel
10s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 09:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c621d69a4d1ba6c38cd085404d8e5721.exe
Resource
win7-20231129-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
c621d69a4d1ba6c38cd085404d8e5721.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c621d69a4d1ba6c38cd085404d8e5721.exe
-
Size
326KB
-
MD5
c621d69a4d1ba6c38cd085404d8e5721
-
SHA1
37785d792b598be9a264d38c3d9b09960b5a61f9
-
SHA256
806100a854f42224f26ac21b75f36839a1bf67f2756b9838e8de0cd5214d4d48
-
SHA512
6daf7e59d4e3eedff38d7b84afd7d01694b253127c21b418fa12a169b5d08bd1203de8ce5b94e9aa55e298bbd777ef8ff8afb6ea18353c442bf9c8fec33943d2
-
SSDEEP
6144:pqwD+X1xQatU+1CEJp4XEt8l3aw9Y6zfJvkeitTDYWMtrDVmCfNuI2RINhoDPnrt:PO1xm+QoK0t4K3gCTDYWGrYzt+NSTc
Score
10/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" c621d69a4d1ba6c38cd085404d8e5721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" c621d69a4d1ba6c38cd085404d8e5721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" c621d69a4d1ba6c38cd085404d8e5721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000AFC62B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000AFC62B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000AFC62B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000AFC62B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000AFC62B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" c621d69a4d1ba6c38cd085404d8e5721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" c621d69a4d1ba6c38cd085404d8e5721.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 3044 043A6A5B00014973000AFC62B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000AFC62B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" c621d69a4d1ba6c38cd085404d8e5721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" c621d69a4d1ba6c38cd085404d8e5721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" c621d69a4d1ba6c38cd085404d8e5721.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc c621d69a4d1ba6c38cd085404d8e5721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000AFC62B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" c621d69a4d1ba6c38cd085404d8e5721.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc c621d69a4d1ba6c38cd085404d8e5721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000AFC62B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000AFC62B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000AFC62B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" c621d69a4d1ba6c38cd085404d8e5721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000AFC62B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000AFC62B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6A5B00014973000AFC62B4EB2331 = "C:\\ProgramData\\043A6A5B00014973000AFC62B4EB2331\\043A6A5B00014973000AFC62B4EB2331.exe" 043A6A5B00014973000AFC62B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 2552 c621d69a4d1ba6c38cd085404d8e5721.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3044 043A6A5B00014973000AFC62B4EB2331.exe 3044 043A6A5B00014973000AFC62B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3044 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 16 PID 2552 wrote to memory of 3044 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 16 PID 2552 wrote to memory of 3044 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 16 PID 2552 wrote to memory of 3044 2552 c621d69a4d1ba6c38cd085404d8e5721.exe 16
Processes
-
C:\ProgramData\043A6A5B00014973000AFC62B4EB2331\043A6A5B00014973000AFC62B4EB2331.exe"C:\ProgramData\043A6A5B00014973000AFC62B4EB2331\043A6A5B00014973000AFC62B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\c621d69a4d1ba6c38cd085404d8e5721.exe"1⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3044
-
C:\Users\Admin\AppData\Local\Temp\c621d69a4d1ba6c38cd085404d8e5721.exe"C:\Users\Admin\AppData\Local\Temp\c621d69a4d1ba6c38cd085404d8e5721.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552