Analysis

  • max time kernel
    191s
  • max time network
    221s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2023, 19:25

General

  • Target

    fb2fea52147f2fae6ab0be4b0a48887ba924826547858f65fa870fe490e442c1.exe

  • Size

    691KB

  • MD5

    29b40358b0c7266e8c11d8487e972eea

  • SHA1

    0a2fcffdb0aa792a45ef05004f810940fef292dc

  • SHA256

    fb2fea52147f2fae6ab0be4b0a48887ba924826547858f65fa870fe490e442c1

  • SHA512

    449f09645a2566010f4d005adf34b0be041fd05a32beca3915d157c313e031f5aa62a646b1f555248a6ad1cf3f07580e869731c7af0987e7bef7b339a40cfcf0

  • SSDEEP

    12288:ay900bUUcekt7K07hmDkX/SETqQgeiCYMvQz7trDe207ShcANBg+lePIG7SZKAND:ayzbtCKyYoXKETbghCYMqtrq2UANu8KO

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 12 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb2fea52147f2fae6ab0be4b0a48887ba924826547858f65fa870fe490e442c1.exe
    "C:\Users\Admin\AppData\Local\Temp\fb2fea52147f2fae6ab0be4b0a48887ba924826547858f65fa870fe490e442c1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un255172.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un255172.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51593139.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51593139.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk575995.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk575995.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1916
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk575995.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk575995.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si157445.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si157445.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1556

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si157445.exe

          Filesize

          136KB

          MD5

          e1c805d3cefe221689da30b8a2d944f2

          SHA1

          a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

          SHA256

          32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

          SHA512

          7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si157445.exe

          Filesize

          136KB

          MD5

          e1c805d3cefe221689da30b8a2d944f2

          SHA1

          a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

          SHA256

          32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

          SHA512

          7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un255172.exe

          Filesize

          537KB

          MD5

          8703ae699b6b7025467d0c2a8a223102

          SHA1

          6f5544d6e718de33257be2f4b3c45afe187742d2

          SHA256

          2b1f87a53d65c18cee0f4682f3078e2ba092d651932c0a34d780e5ab9d6395df

          SHA512

          584191cca4cba1cb0b35ead701a363723d039c1340517e5a5f1c9ceecfad7097f837d120426baa1422280a600fc8357457f7d1e0cf3f2ee27b401532bbe69e6e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un255172.exe

          Filesize

          537KB

          MD5

          8703ae699b6b7025467d0c2a8a223102

          SHA1

          6f5544d6e718de33257be2f4b3c45afe187742d2

          SHA256

          2b1f87a53d65c18cee0f4682f3078e2ba092d651932c0a34d780e5ab9d6395df

          SHA512

          584191cca4cba1cb0b35ead701a363723d039c1340517e5a5f1c9ceecfad7097f837d120426baa1422280a600fc8357457f7d1e0cf3f2ee27b401532bbe69e6e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51593139.exe

          Filesize

          259KB

          MD5

          8094a3586d9c45eca9f38499312b2d38

          SHA1

          919032480ff35763613e87cb4619d7d72c4d996d

          SHA256

          45e5a15b23f6c09721e5efc2d651ca922af5cde864e99e65edcf4dbae1f5dc3b

          SHA512

          ceea89a25afb59562e77a55554ecce66fe3a536302f3ecb40a779f98039a7c2fc39cb2aaee5cc9aa1772fe6548d6e2417bd69c23c7fab4f23c7304f109b217ad

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51593139.exe

          Filesize

          259KB

          MD5

          8094a3586d9c45eca9f38499312b2d38

          SHA1

          919032480ff35763613e87cb4619d7d72c4d996d

          SHA256

          45e5a15b23f6c09721e5efc2d651ca922af5cde864e99e65edcf4dbae1f5dc3b

          SHA512

          ceea89a25afb59562e77a55554ecce66fe3a536302f3ecb40a779f98039a7c2fc39cb2aaee5cc9aa1772fe6548d6e2417bd69c23c7fab4f23c7304f109b217ad

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51593139.exe

          Filesize

          259KB

          MD5

          8094a3586d9c45eca9f38499312b2d38

          SHA1

          919032480ff35763613e87cb4619d7d72c4d996d

          SHA256

          45e5a15b23f6c09721e5efc2d651ca922af5cde864e99e65edcf4dbae1f5dc3b

          SHA512

          ceea89a25afb59562e77a55554ecce66fe3a536302f3ecb40a779f98039a7c2fc39cb2aaee5cc9aa1772fe6548d6e2417bd69c23c7fab4f23c7304f109b217ad

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk575995.exe

          Filesize

          342KB

          MD5

          4917f0ea51212be79d676877a568eced

          SHA1

          0f71e179d494dfb71d0a5aeb7c6c0fab9cfa76fb

          SHA256

          5d0ce5748792cb7c1b56cb3a9b899aed9c513dc31a6eff8c1a76999c0de15cce

          SHA512

          c81cc1ca501290130d2dbe78981feae0ca896b51f774722940b47e7c2d3455f05236f85d197593feea502973aee267caa509e0dc9173e1ff834d275bb84975c5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk575995.exe

          Filesize

          342KB

          MD5

          4917f0ea51212be79d676877a568eced

          SHA1

          0f71e179d494dfb71d0a5aeb7c6c0fab9cfa76fb

          SHA256

          5d0ce5748792cb7c1b56cb3a9b899aed9c513dc31a6eff8c1a76999c0de15cce

          SHA512

          c81cc1ca501290130d2dbe78981feae0ca896b51f774722940b47e7c2d3455f05236f85d197593feea502973aee267caa509e0dc9173e1ff834d275bb84975c5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk575995.exe

          Filesize

          342KB

          MD5

          4917f0ea51212be79d676877a568eced

          SHA1

          0f71e179d494dfb71d0a5aeb7c6c0fab9cfa76fb

          SHA256

          5d0ce5748792cb7c1b56cb3a9b899aed9c513dc31a6eff8c1a76999c0de15cce

          SHA512

          c81cc1ca501290130d2dbe78981feae0ca896b51f774722940b47e7c2d3455f05236f85d197593feea502973aee267caa509e0dc9173e1ff834d275bb84975c5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk575995.exe

          Filesize

          342KB

          MD5

          4917f0ea51212be79d676877a568eced

          SHA1

          0f71e179d494dfb71d0a5aeb7c6c0fab9cfa76fb

          SHA256

          5d0ce5748792cb7c1b56cb3a9b899aed9c513dc31a6eff8c1a76999c0de15cce

          SHA512

          c81cc1ca501290130d2dbe78981feae0ca896b51f774722940b47e7c2d3455f05236f85d197593feea502973aee267caa509e0dc9173e1ff834d275bb84975c5

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si157445.exe

          Filesize

          136KB

          MD5

          e1c805d3cefe221689da30b8a2d944f2

          SHA1

          a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

          SHA256

          32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

          SHA512

          7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si157445.exe

          Filesize

          136KB

          MD5

          e1c805d3cefe221689da30b8a2d944f2

          SHA1

          a9a94fd89ed22c2a127c81f6e57f822eae1d9f26

          SHA256

          32023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a

          SHA512

          7801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un255172.exe

          Filesize

          537KB

          MD5

          8703ae699b6b7025467d0c2a8a223102

          SHA1

          6f5544d6e718de33257be2f4b3c45afe187742d2

          SHA256

          2b1f87a53d65c18cee0f4682f3078e2ba092d651932c0a34d780e5ab9d6395df

          SHA512

          584191cca4cba1cb0b35ead701a363723d039c1340517e5a5f1c9ceecfad7097f837d120426baa1422280a600fc8357457f7d1e0cf3f2ee27b401532bbe69e6e

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un255172.exe

          Filesize

          537KB

          MD5

          8703ae699b6b7025467d0c2a8a223102

          SHA1

          6f5544d6e718de33257be2f4b3c45afe187742d2

          SHA256

          2b1f87a53d65c18cee0f4682f3078e2ba092d651932c0a34d780e5ab9d6395df

          SHA512

          584191cca4cba1cb0b35ead701a363723d039c1340517e5a5f1c9ceecfad7097f837d120426baa1422280a600fc8357457f7d1e0cf3f2ee27b401532bbe69e6e

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\51593139.exe

          Filesize

          259KB

          MD5

          8094a3586d9c45eca9f38499312b2d38

          SHA1

          919032480ff35763613e87cb4619d7d72c4d996d

          SHA256

          45e5a15b23f6c09721e5efc2d651ca922af5cde864e99e65edcf4dbae1f5dc3b

          SHA512

          ceea89a25afb59562e77a55554ecce66fe3a536302f3ecb40a779f98039a7c2fc39cb2aaee5cc9aa1772fe6548d6e2417bd69c23c7fab4f23c7304f109b217ad

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\51593139.exe

          Filesize

          259KB

          MD5

          8094a3586d9c45eca9f38499312b2d38

          SHA1

          919032480ff35763613e87cb4619d7d72c4d996d

          SHA256

          45e5a15b23f6c09721e5efc2d651ca922af5cde864e99e65edcf4dbae1f5dc3b

          SHA512

          ceea89a25afb59562e77a55554ecce66fe3a536302f3ecb40a779f98039a7c2fc39cb2aaee5cc9aa1772fe6548d6e2417bd69c23c7fab4f23c7304f109b217ad

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\51593139.exe

          Filesize

          259KB

          MD5

          8094a3586d9c45eca9f38499312b2d38

          SHA1

          919032480ff35763613e87cb4619d7d72c4d996d

          SHA256

          45e5a15b23f6c09721e5efc2d651ca922af5cde864e99e65edcf4dbae1f5dc3b

          SHA512

          ceea89a25afb59562e77a55554ecce66fe3a536302f3ecb40a779f98039a7c2fc39cb2aaee5cc9aa1772fe6548d6e2417bd69c23c7fab4f23c7304f109b217ad

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk575995.exe

          Filesize

          342KB

          MD5

          4917f0ea51212be79d676877a568eced

          SHA1

          0f71e179d494dfb71d0a5aeb7c6c0fab9cfa76fb

          SHA256

          5d0ce5748792cb7c1b56cb3a9b899aed9c513dc31a6eff8c1a76999c0de15cce

          SHA512

          c81cc1ca501290130d2dbe78981feae0ca896b51f774722940b47e7c2d3455f05236f85d197593feea502973aee267caa509e0dc9173e1ff834d275bb84975c5

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk575995.exe

          Filesize

          342KB

          MD5

          4917f0ea51212be79d676877a568eced

          SHA1

          0f71e179d494dfb71d0a5aeb7c6c0fab9cfa76fb

          SHA256

          5d0ce5748792cb7c1b56cb3a9b899aed9c513dc31a6eff8c1a76999c0de15cce

          SHA512

          c81cc1ca501290130d2dbe78981feae0ca896b51f774722940b47e7c2d3455f05236f85d197593feea502973aee267caa509e0dc9173e1ff834d275bb84975c5

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk575995.exe

          Filesize

          342KB

          MD5

          4917f0ea51212be79d676877a568eced

          SHA1

          0f71e179d494dfb71d0a5aeb7c6c0fab9cfa76fb

          SHA256

          5d0ce5748792cb7c1b56cb3a9b899aed9c513dc31a6eff8c1a76999c0de15cce

          SHA512

          c81cc1ca501290130d2dbe78981feae0ca896b51f774722940b47e7c2d3455f05236f85d197593feea502973aee267caa509e0dc9173e1ff834d275bb84975c5

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk575995.exe

          Filesize

          342KB

          MD5

          4917f0ea51212be79d676877a568eced

          SHA1

          0f71e179d494dfb71d0a5aeb7c6c0fab9cfa76fb

          SHA256

          5d0ce5748792cb7c1b56cb3a9b899aed9c513dc31a6eff8c1a76999c0de15cce

          SHA512

          c81cc1ca501290130d2dbe78981feae0ca896b51f774722940b47e7c2d3455f05236f85d197593feea502973aee267caa509e0dc9173e1ff834d275bb84975c5

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk575995.exe

          Filesize

          342KB

          MD5

          4917f0ea51212be79d676877a568eced

          SHA1

          0f71e179d494dfb71d0a5aeb7c6c0fab9cfa76fb

          SHA256

          5d0ce5748792cb7c1b56cb3a9b899aed9c513dc31a6eff8c1a76999c0de15cce

          SHA512

          c81cc1ca501290130d2dbe78981feae0ca896b51f774722940b47e7c2d3455f05236f85d197593feea502973aee267caa509e0dc9173e1ff834d275bb84975c5

        • memory/1180-90-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-78-0x00000000003E0000-0x00000000003FA000-memory.dmp

          Filesize

          104KB

        • memory/1180-102-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-104-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-106-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-108-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-110-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-111-0x0000000000400000-0x0000000000455000-memory.dmp

          Filesize

          340KB

        • memory/1180-112-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

          Filesize

          256KB

        • memory/1180-114-0x0000000000400000-0x0000000000455000-memory.dmp

          Filesize

          340KB

        • memory/1180-98-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-96-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-94-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-92-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-88-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-86-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-84-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-100-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-79-0x0000000000520000-0x0000000000538000-memory.dmp

          Filesize

          96KB

        • memory/1180-83-0x0000000000520000-0x0000000000533000-memory.dmp

          Filesize

          76KB

        • memory/1180-81-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

          Filesize

          256KB

        • memory/1180-82-0x0000000004BB0000-0x0000000004BF0000-memory.dmp

          Filesize

          256KB

        • memory/1180-80-0x0000000000250000-0x000000000027D000-memory.dmp

          Filesize

          180KB

        • memory/1492-160-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-819-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/1492-130-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/1492-126-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1492-127-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/1492-141-0x0000000002170000-0x00000000021AA000-memory.dmp

          Filesize

          232KB

        • memory/1492-946-0x0000000004B30000-0x0000000004B70000-memory.dmp

          Filesize

          256KB

        • memory/1492-143-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-942-0x0000000004B30000-0x0000000004B70000-memory.dmp

          Filesize

          256KB

        • memory/1492-146-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-148-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-150-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-152-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-154-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-136-0x0000000000C10000-0x0000000000C4C000-memory.dmp

          Filesize

          240KB

        • memory/1492-162-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-144-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-158-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-164-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-166-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-168-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-170-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-156-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1492-821-0x0000000004B30000-0x0000000004B70000-memory.dmp

          Filesize

          256KB

        • memory/1492-823-0x0000000004B30000-0x0000000004B70000-memory.dmp

          Filesize

          256KB

        • memory/1492-825-0x0000000004B30000-0x0000000004B70000-memory.dmp

          Filesize

          256KB

        • memory/1492-940-0x0000000004B30000-0x0000000004B70000-memory.dmp

          Filesize

          256KB

        • memory/1492-941-0x0000000004B30000-0x0000000004B70000-memory.dmp

          Filesize

          256KB

        • memory/1556-943-0x0000000006F10000-0x0000000006F50000-memory.dmp

          Filesize

          256KB

        • memory/1556-142-0x00000000011A0000-0x00000000011C8000-memory.dmp

          Filesize

          160KB

        • memory/1556-947-0x0000000006F10000-0x0000000006F50000-memory.dmp

          Filesize

          256KB

        • memory/1916-131-0x0000000000970000-0x00000000009B7000-memory.dmp

          Filesize

          284KB