Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 08:26
Static task
static1
Behavioral task
behavioral1
Sample
99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe
Resource
win11-20240419-en
General
-
Target
99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe
-
Size
84KB
-
MD5
36010b83bccfcd1032971df9fc5082a1
-
SHA1
9967b83065e3ad82cd6c0c3b02cf08ab707fde3e
-
SHA256
99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98
-
SHA512
c8008923315d86c06b57e47d9bf81cec47cda0dec6d9f8aa57d7b4c57c7138997486a6f60eb0015bc99755afeb3d943bc8d9ba83dbb8c9219fa4990296de1def
-
SSDEEP
1536:gEKh/S0Fmav8242worjs0nGxMvrEl3/AEHK:bKlWOpsG8MviYEHK
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 146382163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 146382163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 146382163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 146382163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 146382163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 146382163.exe -
Executes dropped EXE 5 IoCs
pid Process 3236 2184910233.exe 3716 146382163.exe 1892 1238011613.exe 2796 2703536258.exe 2424 1447127469.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 146382163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 146382163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 146382163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 146382163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" 146382163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 146382163.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 146382163.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysvratrel.exe" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\sysvratrel.exe" 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Service = "C:\\Windows\\winploravr.exe" 146382163.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Service = "C:\\Users\\Admin\\winploravr.exe" 146382163.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\winploravr.exe 146382163.exe File opened for modification C:\Windows\winploravr.exe 146382163.exe File created C:\Windows\sysvratrel.exe 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe File opened for modification C:\Windows\sysvratrel.exe 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2136 wrote to memory of 3236 2136 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe 86 PID 2136 wrote to memory of 3236 2136 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe 86 PID 2136 wrote to memory of 3236 2136 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe 86 PID 2136 wrote to memory of 3716 2136 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe 87 PID 2136 wrote to memory of 3716 2136 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe 87 PID 2136 wrote to memory of 3716 2136 99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe 87 PID 3716 wrote to memory of 1892 3716 146382163.exe 90 PID 3716 wrote to memory of 1892 3716 146382163.exe 90 PID 3716 wrote to memory of 1892 3716 146382163.exe 90 PID 3716 wrote to memory of 2796 3716 146382163.exe 92 PID 3716 wrote to memory of 2796 3716 146382163.exe 92 PID 3716 wrote to memory of 2796 3716 146382163.exe 92 PID 3716 wrote to memory of 2424 3716 146382163.exe 93 PID 3716 wrote to memory of 2424 3716 146382163.exe 93 PID 3716 wrote to memory of 2424 3716 146382163.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe"C:\Users\Admin\AppData\Local\Temp\99c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98.exe"1⤵
- Modifies security service
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\2184910233.exeC:\Users\Admin\AppData\Local\Temp\2184910233.exe2⤵
- Executes dropped EXE
PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\146382163.exeC:\Users\Admin\AppData\Local\Temp\146382163.exe2⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\1238011613.exeC:\Users\Admin\AppData\Local\Temp\1238011613.exe3⤵
- Executes dropped EXE
PID:1892
-
-
C:\Users\Admin\AppData\Local\Temp\2703536258.exeC:\Users\Admin\AppData\Local\Temp\2703536258.exe3⤵
- Executes dropped EXE
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\1447127469.exeC:\Users\Admin\AppData\Local\Temp\1447127469.exe3⤵
- Executes dropped EXE
PID:2424
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD536010b83bccfcd1032971df9fc5082a1
SHA19967b83065e3ad82cd6c0c3b02cf08ab707fde3e
SHA25699c140f3dbd18b65457bc398730516f3a8c1d0e5ba68aa46c194505bf0f12a98
SHA512c8008923315d86c06b57e47d9bf81cec47cda0dec6d9f8aa57d7b4c57c7138997486a6f60eb0015bc99755afeb3d943bc8d9ba83dbb8c9219fa4990296de1def
-
Filesize
80KB
MD52ff2bb06682812eeb76628bfbe817fbb
SHA118e86614d0f4904e1fe97198ccda34b25aab7dae
SHA256985da56fb594bf65d8bb993e8e37cd6e78535da6c834945068040faf67e91e7d
SHA5125cd3b5a1e16202893b08c0ae70d3bcd9e7a49197ebf1ded08e01395202022b3b6c2d8837196ef0415fea6497d928b44e03544b934f8e062ddbb6c6f79fb6f440
-
Filesize
14KB
MD5d085f41fe497a63dc2a4882b485a2caf
SHA19dc111412129833495f19d7b8a5500cf7284ad68
SHA256fb11b4e2d26812e26ea7428f3b0b9bb8a16814188250fa60697c7aec40a49bd0
SHA512ed4d8e297094248fb536154ed0427f4cc1832f339ce29d0f782971ede42fa2b9e5f953f73e71d0cfc026e5fd2ec0f7062410af359fd940a14f277adca37fc106
-
Filesize
84KB
MD5cd1d9c0ed8763e6bb3ee7efb133dc60e
SHA1f6f3bea085ba7c13a2956fc0810c2034792f2ddf
SHA25619ee79b7852c54de5883404f049f9e85cb0085bae8132ada3e46d6f75b24b100
SHA51277b675fdbfc11bff45e2438cb1bd73b7fbfa03771c600e37171f684141c82f356e392ba2694285390aedbb3ecd3306a3c0f8687d0a1940d8d44cae3a7fc41591
-
Filesize
7KB
MD52ab59125912f1b9c7372f91b731c8078
SHA19bc6425022f0a76c83a1d8209892dfbdaf8e8036
SHA256f9683cc6906a3b454dd3f334a86fa9afadc49ce58d823c5374bee8f0cf00b1a8
SHA51269c418aca3b75c5d79948188c93495557f57d41e424c701a7ae702e37f1f5f77f6c5880b52ea8292ee73b5693a9aaab3cd5a520af0d3ba1067c6fe81d54e0863