Analysis
-
max time kernel
6s -
max time network
9s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-04-2024 16:59
Static task
static1
Errors
General
-
Target
Internet Explorer 12.exe
-
Size
220KB
-
MD5
2002b30f06c2bbdf6a7905515f8d32dc
-
SHA1
60741e53d90b4f31f963ed81b4596c45e7d1b3af
-
SHA256
876d5a0ef1d614da558feacb146d4418973925ede951f514538dd4ffd15cabce
-
SHA512
c7859f59b3b3b51da67794afc064371fc9f60818d5b8363b61061cb5a1e64fb04b2e2e8050cd6a7d67a4bb396bc12fa2a278579b1814e696d990735da384fafe
-
SSDEEP
1536:N7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfVwgjSZkKvnoHfhb:Z7DhdC6kzWypvaQ0FxyNTBfV3j7b
Malware Config
Signatures
-
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
shutdown.exedescription pid process Token: SeShutdownPrivilege 2556 shutdown.exe Token: SeRemoteShutdownPrivilege 2556 shutdown.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Internet Explorer 12.execmd.exedescription pid process target process PID 2036 wrote to memory of 3060 2036 Internet Explorer 12.exe cmd.exe PID 2036 wrote to memory of 3060 2036 Internet Explorer 12.exe cmd.exe PID 2036 wrote to memory of 3060 2036 Internet Explorer 12.exe cmd.exe PID 2036 wrote to memory of 3060 2036 Internet Explorer 12.exe cmd.exe PID 3060 wrote to memory of 2992 3060 cmd.exe reg.exe PID 3060 wrote to memory of 2992 3060 cmd.exe reg.exe PID 3060 wrote to memory of 2992 3060 cmd.exe reg.exe PID 3060 wrote to memory of 3024 3060 cmd.exe reg.exe PID 3060 wrote to memory of 3024 3060 cmd.exe reg.exe PID 3060 wrote to memory of 3024 3060 cmd.exe reg.exe PID 3060 wrote to memory of 2556 3060 cmd.exe shutdown.exe PID 3060 wrote to memory of 2556 3060 cmd.exe shutdown.exe PID 3060 wrote to memory of 2556 3060 cmd.exe shutdown.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Internet Explorer 12.exe"C:\Users\Admin\AppData\Local\Temp\Internet Explorer 12.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\14D8.tmp\14D9.tmp\14DA.bat "C:\Users\Admin\AppData\Local\Temp\Internet Explorer 12.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2992
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3024 -
C:\Windows\system32\shutdown.exeshutdown /r /f /t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2640
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
487B
MD554a5c8660d3fea6134e80c2a24588dbb
SHA1348ab739f3ace57a0b2cc083827027d7d4980670
SHA256bc9e2f77ec56979805d62d66692c8b6719fdf7c25dc891838d8c29e56303f667
SHA51256223fbea25c6e16a715b9299966be4bc9a744910b9ae37c9b4dd17b230f51e1ab8a88711a66458d9663cc7a5c8f5e92eea25bc52d3b946f108949defaeb9b70