Analysis

  • max time kernel
    150s
  • max time network
    174s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2023 18:28

General

  • Target

    cefe93b3e0ddf18ee27c9e015d5a281f439ac2c011bda00ae9daeac2a40b0796.exe

  • Size

    697KB

  • MD5

    310f87bf300cd7f9e3facc9cdd3c62e5

  • SHA1

    3c5d02995b2fc64f73be6323e34f50f2c32745f6

  • SHA256

    cefe93b3e0ddf18ee27c9e015d5a281f439ac2c011bda00ae9daeac2a40b0796

  • SHA512

    7c6d2f57ac003faa24f9e90fe14f95ecfc19066d4edb82cceed1d85f53cef475a06ba2d0a858ab5753cf9cac88d56b81956ad66c07b86a3f170268cfba20f959

  • SSDEEP

    12288:Qy90Sk8BNjbyTX7TGgTlJNd240p0lAf3wHiroKUkw40vCrrOUlEf5fP:QyNBRy7a2F240pDf3wHiKirrOUKf5fP

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cefe93b3e0ddf18ee27c9e015d5a281f439ac2c011bda00ae9daeac2a40b0796.exe
    "C:\Users\Admin\AppData\Local\Temp\cefe93b3e0ddf18ee27c9e015d5a281f439ac2c011bda00ae9daeac2a40b0796.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un906325.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un906325.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:852
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73199934.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73199934.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk974750.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk974750.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un906325.exe

    Filesize

    543KB

    MD5

    c340a5a315dc9a4763de5e3439d42b2a

    SHA1

    ee0d41784d3dcbb1add1cf10316f6a796eb1bade

    SHA256

    938c8342fb500963a2ee815ff05dee43e68d61001bf0757809ad70f7deca1b21

    SHA512

    33ea6f90ec30f8106ec9fbbe46d25b80c16177940e9e55fe8b78d2260ecf41c512b2845e64cac25a96c73fbae5fa3b224069679ef5a1bf7e8febfd430ab4f771

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un906325.exe

    Filesize

    543KB

    MD5

    c340a5a315dc9a4763de5e3439d42b2a

    SHA1

    ee0d41784d3dcbb1add1cf10316f6a796eb1bade

    SHA256

    938c8342fb500963a2ee815ff05dee43e68d61001bf0757809ad70f7deca1b21

    SHA512

    33ea6f90ec30f8106ec9fbbe46d25b80c16177940e9e55fe8b78d2260ecf41c512b2845e64cac25a96c73fbae5fa3b224069679ef5a1bf7e8febfd430ab4f771

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73199934.exe

    Filesize

    265KB

    MD5

    36b4110606df7ece8547abff4435f15c

    SHA1

    6348fbf5f984d13d44fbb507c8524a185fd975a3

    SHA256

    85fd98a9f460882dda7e5a4a7760e22d2e67df102c0f947e3d1a1c23d86c0262

    SHA512

    c59f9fd451cc6cf2b5b5ff935da9f069c3a1ffd76e0a9471b5b9608a7cf6a89c1c3eccc280ae6b29509cd95a2e50ac30ac1d26502d48cdac531b4066e244fc7b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73199934.exe

    Filesize

    265KB

    MD5

    36b4110606df7ece8547abff4435f15c

    SHA1

    6348fbf5f984d13d44fbb507c8524a185fd975a3

    SHA256

    85fd98a9f460882dda7e5a4a7760e22d2e67df102c0f947e3d1a1c23d86c0262

    SHA512

    c59f9fd451cc6cf2b5b5ff935da9f069c3a1ffd76e0a9471b5b9608a7cf6a89c1c3eccc280ae6b29509cd95a2e50ac30ac1d26502d48cdac531b4066e244fc7b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73199934.exe

    Filesize

    265KB

    MD5

    36b4110606df7ece8547abff4435f15c

    SHA1

    6348fbf5f984d13d44fbb507c8524a185fd975a3

    SHA256

    85fd98a9f460882dda7e5a4a7760e22d2e67df102c0f947e3d1a1c23d86c0262

    SHA512

    c59f9fd451cc6cf2b5b5ff935da9f069c3a1ffd76e0a9471b5b9608a7cf6a89c1c3eccc280ae6b29509cd95a2e50ac30ac1d26502d48cdac531b4066e244fc7b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk974750.exe

    Filesize

    347KB

    MD5

    6cd9522ba9db48589e0085f47aeb717e

    SHA1

    9daeda7fabd61ab5b7bb5b948b0a2c3731dc75dc

    SHA256

    059f3d438caa8805d3396d80a8a34f13cb95d388585832cf3553431174e716b1

    SHA512

    162667738664ed8a3dc23c16f8a51e60d1625933a67b51cdadf1407d508dc5a003da2c8809742f491f7455ca18083d35d5489577a1927303464756d787375a45

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk974750.exe

    Filesize

    347KB

    MD5

    6cd9522ba9db48589e0085f47aeb717e

    SHA1

    9daeda7fabd61ab5b7bb5b948b0a2c3731dc75dc

    SHA256

    059f3d438caa8805d3396d80a8a34f13cb95d388585832cf3553431174e716b1

    SHA512

    162667738664ed8a3dc23c16f8a51e60d1625933a67b51cdadf1407d508dc5a003da2c8809742f491f7455ca18083d35d5489577a1927303464756d787375a45

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk974750.exe

    Filesize

    347KB

    MD5

    6cd9522ba9db48589e0085f47aeb717e

    SHA1

    9daeda7fabd61ab5b7bb5b948b0a2c3731dc75dc

    SHA256

    059f3d438caa8805d3396d80a8a34f13cb95d388585832cf3553431174e716b1

    SHA512

    162667738664ed8a3dc23c16f8a51e60d1625933a67b51cdadf1407d508dc5a003da2c8809742f491f7455ca18083d35d5489577a1927303464756d787375a45

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un906325.exe

    Filesize

    543KB

    MD5

    c340a5a315dc9a4763de5e3439d42b2a

    SHA1

    ee0d41784d3dcbb1add1cf10316f6a796eb1bade

    SHA256

    938c8342fb500963a2ee815ff05dee43e68d61001bf0757809ad70f7deca1b21

    SHA512

    33ea6f90ec30f8106ec9fbbe46d25b80c16177940e9e55fe8b78d2260ecf41c512b2845e64cac25a96c73fbae5fa3b224069679ef5a1bf7e8febfd430ab4f771

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un906325.exe

    Filesize

    543KB

    MD5

    c340a5a315dc9a4763de5e3439d42b2a

    SHA1

    ee0d41784d3dcbb1add1cf10316f6a796eb1bade

    SHA256

    938c8342fb500963a2ee815ff05dee43e68d61001bf0757809ad70f7deca1b21

    SHA512

    33ea6f90ec30f8106ec9fbbe46d25b80c16177940e9e55fe8b78d2260ecf41c512b2845e64cac25a96c73fbae5fa3b224069679ef5a1bf7e8febfd430ab4f771

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\73199934.exe

    Filesize

    265KB

    MD5

    36b4110606df7ece8547abff4435f15c

    SHA1

    6348fbf5f984d13d44fbb507c8524a185fd975a3

    SHA256

    85fd98a9f460882dda7e5a4a7760e22d2e67df102c0f947e3d1a1c23d86c0262

    SHA512

    c59f9fd451cc6cf2b5b5ff935da9f069c3a1ffd76e0a9471b5b9608a7cf6a89c1c3eccc280ae6b29509cd95a2e50ac30ac1d26502d48cdac531b4066e244fc7b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\73199934.exe

    Filesize

    265KB

    MD5

    36b4110606df7ece8547abff4435f15c

    SHA1

    6348fbf5f984d13d44fbb507c8524a185fd975a3

    SHA256

    85fd98a9f460882dda7e5a4a7760e22d2e67df102c0f947e3d1a1c23d86c0262

    SHA512

    c59f9fd451cc6cf2b5b5ff935da9f069c3a1ffd76e0a9471b5b9608a7cf6a89c1c3eccc280ae6b29509cd95a2e50ac30ac1d26502d48cdac531b4066e244fc7b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\73199934.exe

    Filesize

    265KB

    MD5

    36b4110606df7ece8547abff4435f15c

    SHA1

    6348fbf5f984d13d44fbb507c8524a185fd975a3

    SHA256

    85fd98a9f460882dda7e5a4a7760e22d2e67df102c0f947e3d1a1c23d86c0262

    SHA512

    c59f9fd451cc6cf2b5b5ff935da9f069c3a1ffd76e0a9471b5b9608a7cf6a89c1c3eccc280ae6b29509cd95a2e50ac30ac1d26502d48cdac531b4066e244fc7b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk974750.exe

    Filesize

    347KB

    MD5

    6cd9522ba9db48589e0085f47aeb717e

    SHA1

    9daeda7fabd61ab5b7bb5b948b0a2c3731dc75dc

    SHA256

    059f3d438caa8805d3396d80a8a34f13cb95d388585832cf3553431174e716b1

    SHA512

    162667738664ed8a3dc23c16f8a51e60d1625933a67b51cdadf1407d508dc5a003da2c8809742f491f7455ca18083d35d5489577a1927303464756d787375a45

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk974750.exe

    Filesize

    347KB

    MD5

    6cd9522ba9db48589e0085f47aeb717e

    SHA1

    9daeda7fabd61ab5b7bb5b948b0a2c3731dc75dc

    SHA256

    059f3d438caa8805d3396d80a8a34f13cb95d388585832cf3553431174e716b1

    SHA512

    162667738664ed8a3dc23c16f8a51e60d1625933a67b51cdadf1407d508dc5a003da2c8809742f491f7455ca18083d35d5489577a1927303464756d787375a45

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk974750.exe

    Filesize

    347KB

    MD5

    6cd9522ba9db48589e0085f47aeb717e

    SHA1

    9daeda7fabd61ab5b7bb5b948b0a2c3731dc75dc

    SHA256

    059f3d438caa8805d3396d80a8a34f13cb95d388585832cf3553431174e716b1

    SHA512

    162667738664ed8a3dc23c16f8a51e60d1625933a67b51cdadf1407d508dc5a003da2c8809742f491f7455ca18083d35d5489577a1927303464756d787375a45

  • memory/1784-147-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-133-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-151-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-145-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-143-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-141-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-139-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-137-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-135-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-149-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-131-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-130-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-129-0x0000000000300000-0x0000000000346000-memory.dmp

    Filesize

    280KB

  • memory/1784-128-0x0000000004760000-0x000000000479A000-memory.dmp

    Filesize

    232KB

  • memory/1784-127-0x00000000032E0000-0x000000000331C000-memory.dmp

    Filesize

    240KB

  • memory/1784-153-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-155-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-157-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-159-0x0000000004760000-0x0000000004795000-memory.dmp

    Filesize

    212KB

  • memory/1784-923-0x00000000047F0000-0x0000000004830000-memory.dmp

    Filesize

    256KB

  • memory/1908-82-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-116-0x0000000000400000-0x0000000002B9D000-memory.dmp

    Filesize

    39.6MB

  • memory/1908-111-0x0000000000400000-0x0000000002B9D000-memory.dmp

    Filesize

    39.6MB

  • memory/1908-110-0x0000000007270000-0x00000000072B0000-memory.dmp

    Filesize

    256KB

  • memory/1908-109-0x0000000007270000-0x00000000072B0000-memory.dmp

    Filesize

    256KB

  • memory/1908-108-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-104-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-106-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-100-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-102-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-96-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-98-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-92-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-94-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-88-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-90-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-84-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-86-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-81-0x0000000004780000-0x0000000004793000-memory.dmp

    Filesize

    76KB

  • memory/1908-80-0x0000000004780000-0x0000000004798000-memory.dmp

    Filesize

    96KB

  • memory/1908-79-0x0000000003240000-0x000000000325A000-memory.dmp

    Filesize

    104KB

  • memory/1908-78-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB