Analysis
-
max time kernel
163s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
99d3fb07df9e8763089cdbb2eff70c97.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99d3fb07df9e8763089cdbb2eff70c97.exe
Resource
win10v2004-20231222-en
General
-
Target
99d3fb07df9e8763089cdbb2eff70c97.exe
-
Size
396KB
-
MD5
99d3fb07df9e8763089cdbb2eff70c97
-
SHA1
ee8cedb03ae002485bb72ffaf8ccf70230d77e66
-
SHA256
c1b13e2651403de595e5519386ab9baa50c3c5f2eece90a41b5b6c0b0625c6c3
-
SHA512
e6514d2bfb960167e7db2b44850a663e930d9971c8302afe6b367565674975cf5043b39d187ff7d9e3363b8150e70760823fd9709dc630cab95c62d1d9dfef83
-
SSDEEP
6144:3nMirGyGQBBVOJnptAHDKKo/VaShM4D4JzVPHd6DSNNTXWGCDu/:9rBxsptlK8D2JPHcGHXWVu
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 99d3fb07df9e8763089cdbb2eff70c97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 99d3fb07df9e8763089cdbb2eff70c97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 99d3fb07df9e8763089cdbb2eff70c97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 99d3fb07df9e8763089cdbb2eff70c97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 99d3fb07df9e8763089cdbb2eff70c97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000A4136B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2340 043A6AEB00014973000A4136B4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2340 043A6AEB00014973000A4136B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2732 99d3fb07df9e8763089cdbb2eff70c97.exe 2732 99d3fb07df9e8763089cdbb2eff70c97.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 99d3fb07df9e8763089cdbb2eff70c97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 99d3fb07df9e8763089cdbb2eff70c97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 99d3fb07df9e8763089cdbb2eff70c97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 99d3fb07df9e8763089cdbb2eff70c97.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 99d3fb07df9e8763089cdbb2eff70c97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000A4136B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 99d3fb07df9e8763089cdbb2eff70c97.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 99d3fb07df9e8763089cdbb2eff70c97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000A4136B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6AEB00014973000A4136B4EB2331 = "C:\\ProgramData\\043A6AEB00014973000A4136B4EB2331\\043A6AEB00014973000A4136B4EB2331.exe" 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2732 99d3fb07df9e8763089cdbb2eff70c97.exe 2732 99d3fb07df9e8763089cdbb2eff70c97.exe 2732 99d3fb07df9e8763089cdbb2eff70c97.exe 2732 99d3fb07df9e8763089cdbb2eff70c97.exe 2732 99d3fb07df9e8763089cdbb2eff70c97.exe 2732 99d3fb07df9e8763089cdbb2eff70c97.exe 2732 99d3fb07df9e8763089cdbb2eff70c97.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2340 043A6AEB00014973000A4136B4EB2331.exe 2340 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2340 2732 99d3fb07df9e8763089cdbb2eff70c97.exe 27 PID 2732 wrote to memory of 2340 2732 99d3fb07df9e8763089cdbb2eff70c97.exe 27 PID 2732 wrote to memory of 2340 2732 99d3fb07df9e8763089cdbb2eff70c97.exe 27 PID 2732 wrote to memory of 2340 2732 99d3fb07df9e8763089cdbb2eff70c97.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\99d3fb07df9e8763089cdbb2eff70c97.exe"C:\Users\Admin\AppData\Local\Temp\99d3fb07df9e8763089cdbb2eff70c97.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\ProgramData\043A6AEB00014973000A4136B4EB2331\043A6AEB00014973000A4136B4EB2331.exe"C:\ProgramData\043A6AEB00014973000A4136B4EB2331\043A6AEB00014973000A4136B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\99d3fb07df9e8763089cdbb2eff70c97.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD599d3fb07df9e8763089cdbb2eff70c97
SHA1ee8cedb03ae002485bb72ffaf8ccf70230d77e66
SHA256c1b13e2651403de595e5519386ab9baa50c3c5f2eece90a41b5b6c0b0625c6c3
SHA512e6514d2bfb960167e7db2b44850a663e930d9971c8302afe6b367565674975cf5043b39d187ff7d9e3363b8150e70760823fd9709dc630cab95c62d1d9dfef83