Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
a12574f2d87cda760478635ea7c40f2c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a12574f2d87cda760478635ea7c40f2c.exe
Resource
win10v2004-20240221-en
General
-
Target
a12574f2d87cda760478635ea7c40f2c.exe
-
Size
414KB
-
MD5
a12574f2d87cda760478635ea7c40f2c
-
SHA1
5bd5c4dc729a209c3f23019d941780cbd96c2f5d
-
SHA256
3416ea741c24a7e12d0a37e124a8acf016395e3fd67f1a02a34747695f96b22f
-
SHA512
ed5ba03a6fbb3666bf8f39b918ec84ccbdd4a4d2cc1676cb2eaa9a324f84b6dd0d2b26cd5154bee4adb633f8d6fd06d4e5bf3081f502d28a160641a8e3db4985
-
SSDEEP
12288:qngo1xkNkVhkkuK2Qtm98oQ8wUDXVzwl:ro1xCkPz2EG8opHlw
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000B41D1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000B41D1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000B41D1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000B41D1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a12574f2d87cda760478635ea7c40f2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a12574f2d87cda760478635ea7c40f2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" a12574f2d87cda760478635ea7c40f2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a12574f2d87cda760478635ea7c40f2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a12574f2d87cda760478635ea7c40f2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000B41D1B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2544 043A6AEB00014973000B41D1B4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2544 043A6AEB00014973000B41D1B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000B41D1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000B41D1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000B41D1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a12574f2d87cda760478635ea7c40f2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a12574f2d87cda760478635ea7c40f2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000B41D1B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000B41D1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a12574f2d87cda760478635ea7c40f2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000B41D1B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000B41D1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a12574f2d87cda760478635ea7c40f2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" a12574f2d87cda760478635ea7c40f2c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc a12574f2d87cda760478635ea7c40f2c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc a12574f2d87cda760478635ea7c40f2c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6AEB00014973000B41D1B4EB2331 = "C:\\ProgramData\\043A6AEB00014973000B41D1B4EB2331\\043A6AEB00014973000B41D1B4EB2331.exe" 043A6AEB00014973000B41D1B4EB2331.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe 2136 a12574f2d87cda760478635ea7c40f2c.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2544 043A6AEB00014973000B41D1B4EB2331.exe 2544 043A6AEB00014973000B41D1B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2544 2136 a12574f2d87cda760478635ea7c40f2c.exe 28 PID 2136 wrote to memory of 2544 2136 a12574f2d87cda760478635ea7c40f2c.exe 28 PID 2136 wrote to memory of 2544 2136 a12574f2d87cda760478635ea7c40f2c.exe 28 PID 2136 wrote to memory of 2544 2136 a12574f2d87cda760478635ea7c40f2c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a12574f2d87cda760478635ea7c40f2c.exe"C:\Users\Admin\AppData\Local\Temp\a12574f2d87cda760478635ea7c40f2c.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\ProgramData\043A6AEB00014973000B41D1B4EB2331\043A6AEB00014973000B41D1B4EB2331.exe"C:\ProgramData\043A6AEB00014973000B41D1B4EB2331\043A6AEB00014973000B41D1B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\a12574f2d87cda760478635ea7c40f2c.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD5a12574f2d87cda760478635ea7c40f2c
SHA15bd5c4dc729a209c3f23019d941780cbd96c2f5d
SHA2563416ea741c24a7e12d0a37e124a8acf016395e3fd67f1a02a34747695f96b22f
SHA512ed5ba03a6fbb3666bf8f39b918ec84ccbdd4a4d2cc1676cb2eaa9a324f84b6dd0d2b26cd5154bee4adb633f8d6fd06d4e5bf3081f502d28a160641a8e3db4985