Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
96155a38b593acdb933a649fbf07be1b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96155a38b593acdb933a649fbf07be1b.exe
Resource
win10v2004-20231215-en
General
-
Target
96155a38b593acdb933a649fbf07be1b.exe
-
Size
392KB
-
MD5
96155a38b593acdb933a649fbf07be1b
-
SHA1
af0605118462a16f89ad861e615c23a786882876
-
SHA256
75bd52d6b6849bfc8d064f900aab47229e34773c3fd6c7a824ab4c9d4392197e
-
SHA512
b32374d45c16cf6ca1304924f2a23fda9f1f4296907fbeed2a0819d5a6f515c090ac570c4c0ff9d6771bb3d846a2a155e2c4b9432b8c8eac76f1aa49dc9db1f9
-
SSDEEP
6144:htiBUkqkFwzgVq767LkLbv1P/AxrvNCBeq0fG5bfAYSR6VbysZk1dWyRr3dm7HO2:qgCJibvNYJbxYYgbRke6DBu
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000C5A72B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 96155a38b593acdb933a649fbf07be1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000C5A72B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000C5A72B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000C5A72B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000C5A72B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 96155a38b593acdb933a649fbf07be1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 96155a38b593acdb933a649fbf07be1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 96155a38b593acdb933a649fbf07be1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 96155a38b593acdb933a649fbf07be1b.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2692 043A6AEB00014973000C5A72B4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 043A6AEB00014973000C5A72B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2408 96155a38b593acdb933a649fbf07be1b.exe 2408 96155a38b593acdb933a649fbf07be1b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000C5A72B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000C5A72B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000C5A72B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000C5A72B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 96155a38b593acdb933a649fbf07be1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 96155a38b593acdb933a649fbf07be1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 96155a38b593acdb933a649fbf07be1b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 96155a38b593acdb933a649fbf07be1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000C5A72B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000C5A72B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000C5A72B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 96155a38b593acdb933a649fbf07be1b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 96155a38b593acdb933a649fbf07be1b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 96155a38b593acdb933a649fbf07be1b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6AEB00014973000C5A72B4EB2331 = "C:\\ProgramData\\043A6AEB00014973000C5A72B4EB2331\\043A6AEB00014973000C5A72B4EB2331.exe" 043A6AEB00014973000C5A72B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2408 96155a38b593acdb933a649fbf07be1b.exe 2408 96155a38b593acdb933a649fbf07be1b.exe 2408 96155a38b593acdb933a649fbf07be1b.exe 2408 96155a38b593acdb933a649fbf07be1b.exe 2408 96155a38b593acdb933a649fbf07be1b.exe 2408 96155a38b593acdb933a649fbf07be1b.exe 2408 96155a38b593acdb933a649fbf07be1b.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2692 043A6AEB00014973000C5A72B4EB2331.exe 2692 043A6AEB00014973000C5A72B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2692 2408 96155a38b593acdb933a649fbf07be1b.exe 28 PID 2408 wrote to memory of 2692 2408 96155a38b593acdb933a649fbf07be1b.exe 28 PID 2408 wrote to memory of 2692 2408 96155a38b593acdb933a649fbf07be1b.exe 28 PID 2408 wrote to memory of 2692 2408 96155a38b593acdb933a649fbf07be1b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\96155a38b593acdb933a649fbf07be1b.exe"C:\Users\Admin\AppData\Local\Temp\96155a38b593acdb933a649fbf07be1b.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\ProgramData\043A6AEB00014973000C5A72B4EB2331\043A6AEB00014973000C5A72B4EB2331.exe"C:\ProgramData\043A6AEB00014973000C5A72B4EB2331\043A6AEB00014973000C5A72B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\96155a38b593acdb933a649fbf07be1b.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD596155a38b593acdb933a649fbf07be1b
SHA1af0605118462a16f89ad861e615c23a786882876
SHA25675bd52d6b6849bfc8d064f900aab47229e34773c3fd6c7a824ab4c9d4392197e
SHA512b32374d45c16cf6ca1304924f2a23fda9f1f4296907fbeed2a0819d5a6f515c090ac570c4c0ff9d6771bb3d846a2a155e2c4b9432b8c8eac76f1aa49dc9db1f9
-
Filesize
355KB
MD5ed03c306325bf97bc1e8c6251cc226fe
SHA11326a99151b42643d2cfb0ffd0abd2a0b70af933
SHA25654008bd937617caf50e024db7d2c72adaca7e1b0009c90ec45891d3fb57964c4
SHA512c2e9af18522dfafd9363b51723a89e0fbd393ba7eba8116863ce7f71eb714b04b371a91a3eaa4aec6c939a6c5e079593fbe99f0cb296ac37a47ea9d03de478ed
-
Filesize
321KB
MD532e86321759e96351900458a5bb8779b
SHA157a6ea6ce6abf1618215482843919f27218a13cb
SHA256efeddd09d933743407752a1dcb3679c99d3f09a2e28e48b008071e2b100b1603
SHA5128a2966d276a395ba5ff52f38fe6ef0def5ef492b2e90e1268359fa5fe31a9c6e2e77a8388817d7a31069ba7a75d57a09f01917939feb2298a99d10c35b25d17d
-
Filesize
361KB
MD5c6c6b104d7114a0dd598bb68487e3711
SHA15b8650e9fa851e76b715861ed7ea78d2acf672d4
SHA256592c1d9285e7b91567cbe70cb0b1d721661d437d4fe30b228d603eae957dc67d
SHA51250878c35553d4f87465f27ba07d3c5f9c350b984478f77cef0fa47c14f1df602f657958b93f519c2eba9666073498badba67f98340ce3dc7706dabcfa3e7cddc