Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
78204685676d9376988e4facf7ce8cfa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
78204685676d9376988e4facf7ce8cfa.exe
Resource
win10v2004-20231215-en
General
-
Target
78204685676d9376988e4facf7ce8cfa.exe
-
Size
392KB
-
MD5
78204685676d9376988e4facf7ce8cfa
-
SHA1
d632e8209cda6bae0867567a1f4a68550202ae06
-
SHA256
761814353b34311adb1a097533ebfa96c1e865dc0843dcf7fac0d8b4b67cdd8b
-
SHA512
005db8116a218600b024f8f5dfd5a5f989e361fe5b8f3bfc23f158abf465432012aa4041b11462725569e3161a235c748e83c6c295057e86aada3f44a4ad2121
-
SSDEEP
6144:3h1wG0fljKQIZhzc7HVHtf5vuyh+ajZCsuAMXMzFHCD/yr07oAH4DPq:x/ApUvsfRh+ajZCBAMXoUK0VHMq
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 78204685676d9376988e4facf7ce8cfa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 78204685676d9376988e4facf7ce8cfa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 78204685676d9376988e4facf7ce8cfa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 78204685676d9376988e4facf7ce8cfa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 78204685676d9376988e4facf7ce8cfa.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2264 043A6AEB00014973000A4136B4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2264 043A6AEB00014973000A4136B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1220 78204685676d9376988e4facf7ce8cfa.exe 1220 78204685676d9376988e4facf7ce8cfa.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 78204685676d9376988e4facf7ce8cfa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 78204685676d9376988e4facf7ce8cfa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 78204685676d9376988e4facf7ce8cfa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 78204685676d9376988e4facf7ce8cfa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 78204685676d9376988e4facf7ce8cfa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 78204685676d9376988e4facf7ce8cfa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 78204685676d9376988e4facf7ce8cfa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6AEB00014973000A4136B4EB2331 = "C:\\ProgramData\\043A6AEB00014973000A4136B4EB2331\\043A6AEB00014973000A4136B4EB2331.exe" 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1220 78204685676d9376988e4facf7ce8cfa.exe 1220 78204685676d9376988e4facf7ce8cfa.exe 1220 78204685676d9376988e4facf7ce8cfa.exe 1220 78204685676d9376988e4facf7ce8cfa.exe 1220 78204685676d9376988e4facf7ce8cfa.exe 1220 78204685676d9376988e4facf7ce8cfa.exe 1220 78204685676d9376988e4facf7ce8cfa.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2264 043A6AEB00014973000A4136B4EB2331.exe 2264 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2264 1220 78204685676d9376988e4facf7ce8cfa.exe 28 PID 1220 wrote to memory of 2264 1220 78204685676d9376988e4facf7ce8cfa.exe 28 PID 1220 wrote to memory of 2264 1220 78204685676d9376988e4facf7ce8cfa.exe 28 PID 1220 wrote to memory of 2264 1220 78204685676d9376988e4facf7ce8cfa.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\78204685676d9376988e4facf7ce8cfa.exe"C:\Users\Admin\AppData\Local\Temp\78204685676d9376988e4facf7ce8cfa.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\ProgramData\043A6AEB00014973000A4136B4EB2331\043A6AEB00014973000A4136B4EB2331.exe"C:\ProgramData\043A6AEB00014973000A4136B4EB2331\043A6AEB00014973000A4136B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\78204685676d9376988e4facf7ce8cfa.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5de67ed3f7d555f4fd01fd9d60ae05e4c
SHA19c4d4a88ab2ab9c5c8af00c19277e7c4ff1256d0
SHA256d36f4878d76880e2f6c7f792a8df18f4598b3843d37e2d07cd68ca6cab1428a6
SHA5120f722bf4ab7a1d583aee86bb56bbdc627744cc0708cf51af5d0edbaf02819dd2da5028ef31e697d593df4392c6dfb0b7e200f9286ee9ea9b8ccfb6d442a4a920
-
Filesize
64KB
MD590fbd17bb753130269b4ed62b3042bd7
SHA1ef36aa7f4af5a3d9dc135b0083671a90d020ad7d
SHA2565a9b3a655126f517f9bc116dd9c2ab6ced4f2893732544e47b6b741016629853
SHA5124254e68db89a6ec6d7a03daf076b936737075bcc50ebd9eb1a01f30c27923b216b49ba80078ab0a19caedd303d678ee530e7c2cf920a55bca256735f81c94a58
-
Filesize
392KB
MD578204685676d9376988e4facf7ce8cfa
SHA1d632e8209cda6bae0867567a1f4a68550202ae06
SHA256761814353b34311adb1a097533ebfa96c1e865dc0843dcf7fac0d8b4b67cdd8b
SHA512005db8116a218600b024f8f5dfd5a5f989e361fe5b8f3bfc23f158abf465432012aa4041b11462725569e3161a235c748e83c6c295057e86aada3f44a4ad2121
-
Filesize
192KB
MD5d4d3cc23aaacf7287d55633eed05fb64
SHA1759d13e21c66f3296876d8eb280709ab53ad0e8e
SHA25676db3b364bcf977538fa84d6c87a8a0b82aa1b5750000bea1aa5d5742d224dbd
SHA5124ce1a575fc309a41c8777418a71bd28f35873688b757a0ac1bc55ecd62337d8a00c60117c81b37602a3acfaee0ecc6544b799a5324c734ab088a6356b7cd6323