Overview
overview
10Static
static
100eac1dd90f...0d.exe
windows7-x64
100eac1dd90f...0d.exe
windows10-2004-x64
10119f9287f4...9c.exe
windows7-x64
10119f9287f4...9c.exe
windows10-2004-x64
10202588cc1d...10.exe
windows7-x64
10202588cc1d...10.exe
windows10-2004-x64
1028b51218b1...09.exe
windows7-x64
1028b51218b1...09.exe
windows10-2004-x64
10583c56547b...6a.exe
windows7-x64
3583c56547b...6a.exe
windows10-2004-x64
373782bd2a7...e8.exe
windows7-x64
1073782bd2a7...e8.exe
windows10-2004-x64
10d279fb4121...d7.exe
windows7-x64
10d279fb4121...d7.exe
windows10-2004-x64
10Analysis
-
max time kernel
90s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 23:55
Behavioral task
behavioral1
Sample
0eac1dd90fbafb505a3b627d166d9ef62db4e2df68da9bbc2e39db0573ecd00d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0eac1dd90fbafb505a3b627d166d9ef62db4e2df68da9bbc2e39db0573ecd00d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
119f9287f46d3ed3888403c3c21054974a0e8926ef247fc065164a8d58303c9c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
202588cc1d6cebb32b5888f7e9bbbfa9aa1d5e3ab6a116892cb90486ac4e7d10.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
583c56547b1a00fcb4c0f4920998e0c0ee812691c2bfae7a643dab639e7faa6a.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
583c56547b1a00fcb4c0f4920998e0c0ee812691c2bfae7a643dab639e7faa6a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
d279fb4121b6a7e552133823a497b4d2502b1494bc0864e2c8689fe92eef7fd7.exe
Resource
win7-20240903-en
General
-
Target
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe
-
Size
4.6MB
-
MD5
6c8e7b9edb130c9dab130f66f9bad1c3
-
SHA1
332e1d7efdf2dc5ecaf6349db417f143b48d60e3
-
SHA256
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209
-
SHA512
74998f93ff487d554c7734e5e7be148a0811d71164447c2a6816469338cc1b00b201e28b2ae01aa3162f63f8908782626206d84a8d62bb64960d0aa8ef38f6c3
-
SSDEEP
98304:N1Mie3EZD4qxp6QQ7Xs/Vd28BfkFsIjfxVFms:N17ZDxpFQ7XYZfkFsEf8s
Malware Config
Signatures
-
Processes:
reg.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" reg.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 4288 powershell.exe 2924 powershell.exe 3516 powershell.exe 3124 powershell.exe 1720 powershell.exe 4360 powershell.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DEFENDERSERVICE = "C:\\Users\\Admin\\AppData\\Local\\NEWDRIVERS2\\WindowsDefender.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 4288 powershell.exe 4288 powershell.exe 2924 powershell.exe 2924 powershell.exe 3516 powershell.exe 3516 powershell.exe 3124 powershell.exe 3124 powershell.exe 1720 powershell.exe 1720 powershell.exe 4360 powershell.exe 4360 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 4288 powershell.exe Token: SeDebugPrivilege 2924 powershell.exe Token: SeDebugPrivilege 3516 powershell.exe Token: SeDebugPrivilege 3124 powershell.exe Token: SeDebugPrivilege 1720 powershell.exe Token: SeDebugPrivilege 4360 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.execmd.exedescription pid Process procid_target PID 4768 wrote to memory of 936 4768 28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe 86 PID 4768 wrote to memory of 936 4768 28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe 86 PID 936 wrote to memory of 4288 936 cmd.exe 89 PID 936 wrote to memory of 4288 936 cmd.exe 89 PID 936 wrote to memory of 2924 936 cmd.exe 90 PID 936 wrote to memory of 2924 936 cmd.exe 90 PID 936 wrote to memory of 3516 936 cmd.exe 91 PID 936 wrote to memory of 3516 936 cmd.exe 91 PID 936 wrote to memory of 3124 936 cmd.exe 92 PID 936 wrote to memory of 3124 936 cmd.exe 92 PID 936 wrote to memory of 1720 936 cmd.exe 95 PID 936 wrote to memory of 1720 936 cmd.exe 95 PID 936 wrote to memory of 4360 936 cmd.exe 97 PID 936 wrote to memory of 4360 936 cmd.exe 97 PID 936 wrote to memory of 3872 936 cmd.exe 99 PID 936 wrote to memory of 3872 936 cmd.exe 99 PID 936 wrote to memory of 4456 936 cmd.exe 100 PID 936 wrote to memory of 4456 936 cmd.exe 100 PID 936 wrote to memory of 4432 936 cmd.exe 101 PID 936 wrote to memory of 4432 936 cmd.exe 101 PID 936 wrote to memory of 2168 936 cmd.exe 102 PID 936 wrote to memory of 2168 936 cmd.exe 102 PID 936 wrote to memory of 976 936 cmd.exe 103 PID 936 wrote to memory of 976 936 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe"C:\Users\Admin\AppData\Local\Temp\28b51218b1f1a5250f851180c3bca3c79397a9fc36089a2e356f45b667881209.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\NEWDRIVERS2\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "D:"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:/NEWDRIVERS"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\NEWDRIVERS2"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /f /v DisableTaskMgr /t REG_DWORD /d 03⤵PID:3872
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Policies\Microsoft\Windows\Explorer" /f /v DisableNotificationCenter /t REG_DWORD /d 13⤵PID:4456
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /f /v DisableEnhancedNotifications /t REG_DWORD /d 13⤵
- Modifies Windows Defender notification settings
PID:4432
-
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v DEFENDERSERVICE /t REG_SZ /d "C:\Users\Admin\AppData\Local\NEWDRIVERS2\WindowsDefender.exe"3⤵
- Adds Run key to start application
- Modifies registry key
PID:2168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\NEWDRIVERS2\rar.bat3⤵PID:976
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
64B
MD50ff7e1af4cc86e108eef582452b35523
SHA1c2ccf2811d56c3a3a58dced2b07f95076c6b5b96
SHA25662ed8ef2250f9f744852cb67df0286c80f94e26aed646989b76e5b78f2f1f0d0
SHA512374675fd36cd8bc38acaec44d4cc855b85feece548d99616496d498e61e943fd695fec7c57550a58a32455e8b21b41bafa18cd1dadac69676fff1de1a56da937
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
3KB
MD5d3c39da2d7207deda43b50b864d711a6
SHA1524e21299fbd42ec1a615a5d67117312996c7922
SHA2568f803b854c5ae49b6529e08a507a575b695adf826d995ecddd55a315e12d8da7
SHA512f9e1337a2bf229bc454ff1972b50886baac93ea5f4bb0f8482eb4f9aa1183876973cc00ff9bc19e0cd067576e71224f70de9d27b04407087be5ef89180518cc7
-
Filesize
351B
MD5ce7ef89a43335bb80b9e9b0b67d1a904
SHA1d1abb8760f3f95744c457825ce89a6686dd094d6
SHA2568819312c4d6d83836551a96f3ba8f793db1b6caf573a4fdfc1f26cfc71a3116f
SHA512b03e4f0a3fb727a63583699e7b8a4735edc607d00ada573bc8c7eb6e03a3c386fbc94610a80ea78df857f345f2756a8bdd2e42e6236911f214ee15bf92984ac0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82