Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-04-2024 18:59
Behavioral task
behavioral1
Sample
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe
Resource
win11-20240412-en
General
-
Target
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe
-
Size
78KB
-
MD5
efc57ed49a29d9c43f780ac57d9383ea
-
SHA1
6feb772dab15a7004cccefd6e77aa47cafbb89ed
-
SHA256
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749
-
SHA512
37f09dc9adf4b554d604f35ce7a4d5527acbe9d6d3b6cdcb7a81c5e4d06bc22131cb42a5c611abf9088b61a9ce7b01b64b5328401abaec73471d2555d3e1c9b3
-
SSDEEP
1536:zITaqTFmav82AzaF1Pwr4xpimiwgaRS3B7A4HK:EutO4kwsamiRW2q4HK
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe -
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe -
Executes dropped EXE 2 IoCs
Processes:
462022633.exe3061717420.exepid process 1172 462022633.exe 3800 3061717420.exe -
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-834482027-582050234-2368284635-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\systrlvnxs.exe" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\systrlvnxs.exe" 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe -
Drops file in Windows directory 2 IoCs
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription ioc process File created C:\Windows\systrlvnxs.exe 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe File opened for modification C:\Windows\systrlvnxs.exe 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exedescription pid process target process PID 3252 wrote to memory of 1172 3252 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 462022633.exe PID 3252 wrote to memory of 1172 3252 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 462022633.exe PID 3252 wrote to memory of 1172 3252 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 462022633.exe PID 3252 wrote to memory of 3800 3252 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 3061717420.exe PID 3252 wrote to memory of 3800 3252 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 3061717420.exe PID 3252 wrote to memory of 3800 3252 12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe 3061717420.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe"C:\Users\Admin\AppData\Local\Temp\12a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749.exe"1⤵
- Modifies security service
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\462022633.exeC:\Users\Admin\AppData\Local\Temp\462022633.exe2⤵
- Executes dropped EXE
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\3061717420.exeC:\Users\Admin\AppData\Local\Temp\3061717420.exe2⤵
- Executes dropped EXE
PID:3800
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5c34a248f132e739652407b0aa8c978cd
SHA1f7f05357fd6ab2d1a11e3427ee46626bb6ad94ee
SHA2564c9c53256ff65c9930c38b193537ad510930c25052231c7eef3715057b79e578
SHA512f7999e8b903fbc2e715d6d7e7bb0bc421cef79dbd61f6d94f18fa63c99a420d2a70d4b23fa0b8ec05d073c954aec718be588ada718bb0f5aacd618ad815f2703
-
Filesize
78KB
MD5efc57ed49a29d9c43f780ac57d9383ea
SHA16feb772dab15a7004cccefd6e77aa47cafbb89ed
SHA25612a8944b51b66b76945d6e39e43d551bc242691bb03467db608f047c2d5a7749
SHA51237f09dc9adf4b554d604f35ce7a4d5527acbe9d6d3b6cdcb7a81c5e4d06bc22131cb42a5c611abf9088b61a9ce7b01b64b5328401abaec73471d2555d3e1c9b3