Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 18:59
Behavioral task
behavioral1
Sample
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe
Resource
win11-20240412-en
General
-
Target
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe
-
Size
78KB
-
MD5
efc57ed49a29d9c43f780ac57d9383ea
-
SHA1
6feb772dab15a7004cccefd6e77aa47cafbb89ed
-
SHA256
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749
-
SHA512
37f09dc9adf4b554d604f35ce7a4d5527acbe9d6d3b6cdcb7a81c5e4d06bc22131cb42a5c611abf9088b61a9ce7b01b64b5328401abaec73471d2555d3e1c9b3
-
SSDEEP
1536:zITaqTFmav82AzaF1Pwr4xpimiwgaRS3B7A4HK:EutO4kwsamiRW2q4HK
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe -
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe -
Executes dropped EXE 2 IoCs
Processes:
1640427011.exe131020522.exepid process 4804 1640427011.exe 1372 131020522.exe -
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\systrlvnxs.exe" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\systrlvnxs.exe" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe -
Drops file in Windows directory 2 IoCs
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription ioc process File created C:\Windows\systrlvnxs.exe 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe File opened for modification C:\Windows\systrlvnxs.exe 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription pid process target process PID 3972 wrote to memory of 4804 3972 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 1640427011.exe PID 3972 wrote to memory of 4804 3972 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 1640427011.exe PID 3972 wrote to memory of 4804 3972 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 1640427011.exe PID 3972 wrote to memory of 1372 3972 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 131020522.exe PID 3972 wrote to memory of 1372 3972 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 131020522.exe PID 3972 wrote to memory of 1372 3972 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 131020522.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe"C:\Users\Admin\AppData\Local\Temp\12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe"1⤵
- Modifies security service
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\1640427011.exeC:\Users\Admin\AppData\Local\Temp\1640427011.exe2⤵
- Executes dropped EXE
PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\131020522.exeC:\Users\Admin\AppData\Local\Temp\131020522.exe2⤵
- Executes dropped EXE
PID:1372
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5fe1e93f12cca3f7c0c897ef2084e1778
SHA1fb588491ddad8b24ea555a6a2727e76cec1fade3
SHA2562ebc4a92f4fdc27d4ab56e57058575a8b18adb076cbd30feea2ecdc8b7fcd41f
SHA51236e0524c465187ae9ad207c724aee45bcd61cfd3fa66a79f9434d24fcbadc0a743834d5e808e6041f3bd88e75deb5afd34193574f005ed97e4b17c6b0388cb93
-
Filesize
8KB
MD5c34a248f132e739652407b0aa8c978cd
SHA1f7f05357fd6ab2d1a11e3427ee46626bb6ad94ee
SHA2564c9c53256ff65c9930c38b193537ad510930c25052231c7eef3715057b79e578
SHA512f7999e8b903fbc2e715d6d7e7bb0bc421cef79dbd61f6d94f18fa63c99a420d2a70d4b23fa0b8ec05d073c954aec718be588ada718bb0f5aacd618ad815f2703
-
Filesize
78KB
MD5efc57ed49a29d9c43f780ac57d9383ea
SHA16feb772dab15a7004cccefd6e77aa47cafbb89ed
SHA25612a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749
SHA51237f09dc9adf4b554d604f35ce7a4d5527acbe9d6d3b6cdcb7a81c5e4d06bc22131cb42a5c611abf9088b61a9ce7b01b64b5328401abaec73471d2555d3e1c9b3