Analysis
-
max time kernel
116s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe
Resource
win10v2004-20240802-en
General
-
Target
c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe
-
Size
370KB
-
MD5
fa03b35d5c7c536717c2ed16c0a4a130
-
SHA1
b0d14dd7f88da56803e274ce69dec97bdd5849e9
-
SHA256
c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03
-
SHA512
0839cff6b3fa29b236e25ec6e00dd263dee241514c086a05e0fa4dafb21d60b6389845cf5d7b8aa76ad8c3f45fb6666648e41210f44b5ada81fc9c093fd96547
-
SSDEEP
6144:UuDeBKecBsNEgXtYtaTexGGRA+VSQl0WgaBmh2Rmg1KBqcAK3q:fDe0zsNEgXtrOGcA+YQl05EX1KBRAK3
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000C902AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000C902AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000C902AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000C902AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000C902AB4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 1940 043A6A5B00014973000C902AB4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 1940 043A6A5B00014973000C902AB4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2308 c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe 2308 c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000C902AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000C902AB4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000C902AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000C902AB4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000C902AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000C902AB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000C902AB4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6A5B00014973000C902AB4EB2331 = "C:\\ProgramData\\043A6A5B00014973000C902AB4EB2331\\043A6A5B00014973000C902AB4EB2331.exe" 043A6A5B00014973000C902AB4EB2331.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 043A6A5B00014973000C902AB4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2308 c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe 2308 c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe 2308 c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe 2308 c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe 2308 c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe 2308 c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe 2308 c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1940 043A6A5B00014973000C902AB4EB2331.exe 1940 043A6A5B00014973000C902AB4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1940 2308 c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe 31 PID 2308 wrote to memory of 1940 2308 c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe 31 PID 2308 wrote to memory of 1940 2308 c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe 31 PID 2308 wrote to memory of 1940 2308 c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe"C:\Users\Admin\AppData\Local\Temp\c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\ProgramData\043A6A5B00014973000C902AB4EB2331\043A6A5B00014973000C902AB4EB2331.exe"C:\ProgramData\043A6A5B00014973000C902AB4EB2331\043A6A5B00014973000C902AB4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03N.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD5fa03b35d5c7c536717c2ed16c0a4a130
SHA1b0d14dd7f88da56803e274ce69dec97bdd5849e9
SHA256c185b54f03f61b906707dc1b2126fe4d190ac830c9c2da17a3e1a6d4557f9d03
SHA5120839cff6b3fa29b236e25ec6e00dd263dee241514c086a05e0fa4dafb21d60b6389845cf5d7b8aa76ad8c3f45fb6666648e41210f44b5ada81fc9c093fd96547