Overview
overview
10Static
static
100eac1dd90f...0d.exe
windows7-x64
100eac1dd90f...0d.exe
windows10-2004-x64
10119f9287f4...9c.exe
windows7-x64
10119f9287f4...9c.exe
windows10-2004-x64
10202588cc1d...10.exe
windows7-x64
10202588cc1d...10.exe
windows10-2004-x64
1028b51218b1...09.exe
windows7-x64
1028b51218b1...09.exe
windows10-2004-x64
10583c56547b...6a.exe
windows7-x64
3583c56547b...6a.exe
windows10-2004-x64
373782bd2a7...e8.exe
windows7-x64
1073782bd2a7...e8.exe
windows10-2004-x64
10d279fb4121...d7.exe
windows7-x64
10d279fb4121...d7.exe
windows10-2004-x64
10Analysis
-
max time kernel
91s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 23:55
Behavioral task
behavioral1
Sample
0eac1dd90fbafb505a3b627d166d9ef62db4e2df68da9bbc2e39db0573ecd00d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0eac1dd90fbafb505a3b627d166d9ef62db4e2df68da9bbc2e39db0573ecd00d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
583c56547b1a00fcb4c0f4920998e0c0ee812691c2bfae7a643dab639e7faa6a.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
583c56547b1a00fcb4c0f4920998e0c0ee812691c2bfae7a643dab639e7faa6a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
d279fb4121b6a7e552133823a497b4d2502b1494bc0864e2c8689fe92eef7fd7.exe
Resource
win7-20240903-en
General
-
Target
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe
-
Size
4.6MB
-
MD5
c7620b77d05f9dac8105469b7d0c854f
-
SHA1
5368819b5aa8db1ee7f5cc5b4b50ecb6aa6faf55
-
SHA256
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10
-
SHA512
0fb1e57e2fd053bacbba7a0aabc00c162432c33a9332bac2c45036173fccbe5bebc2906568d2facea4fcf0963dcfcb557bff932dbb2dc2ec5b8cd736213101d3
-
SSDEEP
98304:I1qaURDb8PNfMVNnlqKL0T/46KhPLQYVVW4G1jOUc/hItwGn:I1zsf8PNfkl/m4zdLQYPZGNI/hmVn
Malware Config
Signatures
-
Processes:
reg.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" reg.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 812 powershell.exe 3656 powershell.exe 4600 powershell.exe 2112 powershell.exe 5056 powershell.exe 2960 powershell.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DEFENDERSERVICE = "C:\\Users\\Admin\\AppData\\Local\\NEWDRIVERS2\\WindowsDefender.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 2960 powershell.exe 2960 powershell.exe 812 powershell.exe 812 powershell.exe 3656 powershell.exe 3656 powershell.exe 4600 powershell.exe 4600 powershell.exe 2112 powershell.exe 2112 powershell.exe 5056 powershell.exe 5056 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 2960 powershell.exe Token: SeDebugPrivilege 812 powershell.exe Token: SeDebugPrivilege 3656 powershell.exe Token: SeDebugPrivilege 4600 powershell.exe Token: SeDebugPrivilege 2112 powershell.exe Token: SeDebugPrivilege 5056 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.execmd.exedescription pid Process procid_target PID 4312 wrote to memory of 4028 4312 202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe 86 PID 4312 wrote to memory of 4028 4312 202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe 86 PID 4028 wrote to memory of 2960 4028 cmd.exe 89 PID 4028 wrote to memory of 2960 4028 cmd.exe 89 PID 4028 wrote to memory of 812 4028 cmd.exe 90 PID 4028 wrote to memory of 812 4028 cmd.exe 90 PID 4028 wrote to memory of 3656 4028 cmd.exe 91 PID 4028 wrote to memory of 3656 4028 cmd.exe 91 PID 4028 wrote to memory of 4600 4028 cmd.exe 92 PID 4028 wrote to memory of 4600 4028 cmd.exe 92 PID 4028 wrote to memory of 2112 4028 cmd.exe 93 PID 4028 wrote to memory of 2112 4028 cmd.exe 93 PID 4028 wrote to memory of 5056 4028 cmd.exe 96 PID 4028 wrote to memory of 5056 4028 cmd.exe 96 PID 4028 wrote to memory of 4536 4028 cmd.exe 97 PID 4028 wrote to memory of 4536 4028 cmd.exe 97 PID 4028 wrote to memory of 2532 4028 cmd.exe 98 PID 4028 wrote to memory of 2532 4028 cmd.exe 98 PID 4028 wrote to memory of 1500 4028 cmd.exe 99 PID 4028 wrote to memory of 1500 4028 cmd.exe 99 PID 4028 wrote to memory of 1740 4028 cmd.exe 100 PID 4028 wrote to memory of 1740 4028 cmd.exe 100 PID 4028 wrote to memory of 4404 4028 cmd.exe 101 PID 4028 wrote to memory of 4404 4028 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe"C:\Users\Admin\AppData\Local\Temp\202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\NEWDRIVERS2\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "D:"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:/NEWDRIVERS"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\NEWDRIVERS2"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /f /v DisableTaskMgr /t REG_DWORD /d 03⤵PID:4536
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Policies\Microsoft\Windows\Explorer" /f /v DisableNotificationCenter /t REG_DWORD /d 13⤵PID:2532
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /f /v DisableEnhancedNotifications /t REG_DWORD /d 13⤵
- Modifies Windows Defender notification settings
PID:1500
-
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v DEFENDERSERVICE /t REG_SZ /d "C:\Users\Admin\AppData\Local\NEWDRIVERS2\WindowsDefender.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:1740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\NEWDRIVERS2\rar.bat3⤵PID:4404
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
64B
MD57274a07d1b80de6f66290b47588cee3b
SHA1d926b384806c755fe6b9d03f68852765aabb5703
SHA2565eba7517357473e4d5d7ede75c3768069c578d2b0023473fd67f76b373430de8
SHA512b7813fea9091298d48c87b259b0d4473ddc4480667f82ed6b5f8bdfa600590dcbfb1d62cbaca649dcf321d85cb786bf62d48826ab04297a22b7c88439b94bcf3
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
3KB
MD5d3c39da2d7207deda43b50b864d711a6
SHA1524e21299fbd42ec1a615a5d67117312996c7922
SHA2568f803b854c5ae49b6529e08a507a575b695adf826d995ecddd55a315e12d8da7
SHA512f9e1337a2bf229bc454ff1972b50886baac93ea5f4bb0f8482eb4f9aa1183876973cc00ff9bc19e0cd067576e71224f70de9d27b04407087be5ef89180518cc7
-
Filesize
351B
MD5ce7ef89a43335bb80b9e9b0b67d1a904
SHA1d1abb8760f3f95744c457825ce89a6686dd094d6
SHA2568819312c4d6d83836551a96f3ba8f793db1b6caf573a4fdfc1f26cfc71a3116f
SHA512b03e4f0a3fb727a63583699e7b8a4735edc607d00ada573bc8c7eb6e03a3c386fbc94610a80ea78df857f345f2756a8bdd2e42e6236911f214ee15bf92984ac0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82