Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab.exe
Resource
win10v2004-20240426-en
General
-
Target
a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab.exe
-
Size
72KB
-
MD5
1e57bfe9b8d6adbccae220e1cad3089e
-
SHA1
3e31dd29675b4be9c28a88768be66973f8410611
-
SHA256
a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab
-
SHA512
776323a61de8805dbd371f074700abe977b3a7bd9ea33cdc8ff8352c3fa0bcc523d40514376a228a0e14c682673341d486beef0479635e65164b88f3ef2339a8
-
SSDEEP
1536:xAyToPledgGkAlSt9yzkwUk6Nr5kEHIwA4:3hgRAlStYzkrJNFkEH9
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ohfokev-atat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ohfokev-atat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ohfokev-atat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ohfokev-atat.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5549424E-514e-4d41-5549-424E514E4d41} ohfokev-atat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5549424E-514e-4d41-5549-424E514E4d41}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" ohfokev-atat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5549424E-514e-4d41-5549-424E514E4d41}\IsInstalled = "1" ohfokev-atat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5549424E-514e-4d41-5549-424E514E4d41}\StubPath = "C:\\Windows\\system32\\eambeanig.exe" ohfokev-atat.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe ohfokev-atat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" ohfokev-atat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\ocgacoob.exe" ohfokev-atat.exe -
Executes dropped EXE 2 IoCs
pid Process 3048 ohfokev-atat.exe 1572 ohfokev-atat.exe -
Loads dropped DLL 3 IoCs
pid Process 3024 a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab.exe 3024 a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab.exe 3048 ohfokev-atat.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ohfokev-atat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ohfokev-atat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ohfokev-atat.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ohfokev-atat.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" ohfokev-atat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\ouvheket.dll" ohfokev-atat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" ohfokev-atat.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} ohfokev-atat.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify ohfokev-atat.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ohfokev-atat.exe ohfokev-atat.exe File opened for modification C:\Windows\SysWOW64\ohfokev-atat.exe a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab.exe File opened for modification C:\Windows\SysWOW64\ouvheket.dll ohfokev-atat.exe File created C:\Windows\SysWOW64\ouvheket.dll ohfokev-atat.exe File opened for modification C:\Windows\SysWOW64\eambeanig.exe ohfokev-atat.exe File created C:\Windows\SysWOW64\eambeanig.exe ohfokev-atat.exe File created C:\Windows\SysWOW64\ohfokev-atat.exe a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab.exe File opened for modification C:\Windows\SysWOW64\ocgacoob.exe ohfokev-atat.exe File created C:\Windows\SysWOW64\ocgacoob.exe ohfokev-atat.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 1572 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe 3048 ohfokev-atat.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3048 ohfokev-atat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3048 3024 a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab.exe 28 PID 3024 wrote to memory of 3048 3024 a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab.exe 28 PID 3024 wrote to memory of 3048 3024 a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab.exe 28 PID 3024 wrote to memory of 3048 3024 a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab.exe 28 PID 3048 wrote to memory of 432 3048 ohfokev-atat.exe 5 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1572 3048 ohfokev-atat.exe 29 PID 3048 wrote to memory of 1572 3048 ohfokev-atat.exe 29 PID 3048 wrote to memory of 1572 3048 ohfokev-atat.exe 29 PID 3048 wrote to memory of 1572 3048 ohfokev-atat.exe 29 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21 PID 3048 wrote to memory of 1192 3048 ohfokev-atat.exe 21
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab.exe"C:\Users\Admin\AppData\Local\Temp\a2b02ba38dff258acae67438e2dc428e7a59fae6925ac0bf0e5da9e50eefaeab.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\ohfokev-atat.exe"C:\Windows\SysWOW64\ohfokev-atat.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\ohfokev-atat.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD51d26cbcffe1b473971b30e73a94da8ce
SHA19733f9974b1a9d06999283ce36f9a83973c488d8
SHA2566110a5db61698cd9bbc65f718077d369447da4227114ac17dd2381e5874d6f6d
SHA5122905914651b5ea7ea86070faf9d33183a307b79f5c6cbe7243f857a9e1bd2e5c35db6b7c3fbca3e0fd8ff43d5fcdacee783930eb0628563fac8b04bece0cf97a
-
Filesize
73KB
MD5320d7629a8719cb1461dd47410685b8a
SHA16d728c6b964aab077c53ad9b20a768c91d58c4b1
SHA25607c181a10ee9371dca0444f786bb29206598577f07abba9b48bd07c1b6eadb1c
SHA512a52f1eb2ef1c82cff4271e4293568b22e2b372abf9686ddd89c1fec48152dbe33dce95ab9d9315dbe0c39334a0e598d8ac895047e1f0e26e525531493e58dc06
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
70KB
MD5be86e6ea1d575a488521b29065e0adb0
SHA191ca25bf222840c7337b60d870385e122405bec7
SHA25648e8e5a596d86a18f5c1ff13b8d80f75c6decb5f956b4168f77efcc2c2b154cf
SHA512b51b17f0fe1608a9940b3227f5c37ea48577c94984cf5cbc4f45485a27898724f22329b002cc675076a0ad59351672f64969a3a646fa8a33d5522fd2687b25f1