Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2023, 18:40

General

  • Target

    d7bf8882c77a203b7cbde72028cefd843a8812352bcff31d14a0f56b95e9d8f3.exe

  • Size

    723KB

  • MD5

    4f14f36cc1ac368ae8715ee9fc868bbf

  • SHA1

    a0ae0157afb8d1370e27cf6018149389a9ae0a52

  • SHA256

    d7bf8882c77a203b7cbde72028cefd843a8812352bcff31d14a0f56b95e9d8f3

  • SHA512

    8863ac773a9e2622cc0b4b8800baebf13288c2b7d38eb6569e6185b7788d8c382751ff08d5cb9ef3923b9a0f8ea47145e54830c6edb90a749b03a08596d70ac6

  • SSDEEP

    12288:Ofy90GVq2Dl9kDe4+Qnq25Y0P5cX7RRTvYFE09UYZAA/8pkI432ms:eyxplaDe4Q2Ha3sFEQaA/oms

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7bf8882c77a203b7cbde72028cefd843a8812352bcff31d14a0f56b95e9d8f3.exe
    "C:\Users\Admin\AppData\Local\Temp\d7bf8882c77a203b7cbde72028cefd843a8812352bcff31d14a0f56b95e9d8f3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769999.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769999.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90862277.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90862277.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk667131.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk667131.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:784

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769999.exe

          Filesize

          569KB

          MD5

          fedc9317399af6248e2ede66c2c9cabc

          SHA1

          203702c4673ae2e9b79ba65ffccfb635fade797d

          SHA256

          d6dff85c404a0863760423acd0d1872838a62c5ab29b7461a796010489c05658

          SHA512

          6be858148227ab31d91de3fd504f38e56df96d31a5cfa83a297c6588b3726eb0b1134731dd38e8e58cee981571c320afead9550b17f566edb6c10ca637c807c9

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769999.exe

          Filesize

          569KB

          MD5

          fedc9317399af6248e2ede66c2c9cabc

          SHA1

          203702c4673ae2e9b79ba65ffccfb635fade797d

          SHA256

          d6dff85c404a0863760423acd0d1872838a62c5ab29b7461a796010489c05658

          SHA512

          6be858148227ab31d91de3fd504f38e56df96d31a5cfa83a297c6588b3726eb0b1134731dd38e8e58cee981571c320afead9550b17f566edb6c10ca637c807c9

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90862277.exe

          Filesize

          282KB

          MD5

          89696d5a9cc06f2f759c0e7665e5b638

          SHA1

          ce609dcae46fec3554fcb64f6e1185248f1a7409

          SHA256

          96dddf03c36e6238fb14b75b52a584bede588505af423fea9d1500e9dcdf8ffb

          SHA512

          78788e47db66a104ecb977f9ba072d10cfaaa539afcb125c374ebc87c186ef27d54750d82d065d159a22135605e7e1892ef937fe277c0162856c58e88565e628

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90862277.exe

          Filesize

          282KB

          MD5

          89696d5a9cc06f2f759c0e7665e5b638

          SHA1

          ce609dcae46fec3554fcb64f6e1185248f1a7409

          SHA256

          96dddf03c36e6238fb14b75b52a584bede588505af423fea9d1500e9dcdf8ffb

          SHA512

          78788e47db66a104ecb977f9ba072d10cfaaa539afcb125c374ebc87c186ef27d54750d82d065d159a22135605e7e1892ef937fe277c0162856c58e88565e628

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\90862277.exe

          Filesize

          282KB

          MD5

          89696d5a9cc06f2f759c0e7665e5b638

          SHA1

          ce609dcae46fec3554fcb64f6e1185248f1a7409

          SHA256

          96dddf03c36e6238fb14b75b52a584bede588505af423fea9d1500e9dcdf8ffb

          SHA512

          78788e47db66a104ecb977f9ba072d10cfaaa539afcb125c374ebc87c186ef27d54750d82d065d159a22135605e7e1892ef937fe277c0162856c58e88565e628

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk667131.exe

          Filesize

          416KB

          MD5

          a1cd84f0587a141363a7ae5d48063bc6

          SHA1

          1feb6332fff98a3999e934310268f287250caa23

          SHA256

          086a2a4dfe1d7e65737ccf5805acda8bce1f11075b684fb49b87fdfb5d0bb559

          SHA512

          88e2d9663f504e529c0dd1c4602bdff103e498aa39f0293a9a5377b35971d1480ad8656e7b8438fa3ed73e121d49dfbdaa4047b43e188ef2c4fd7741d409de68

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk667131.exe

          Filesize

          416KB

          MD5

          a1cd84f0587a141363a7ae5d48063bc6

          SHA1

          1feb6332fff98a3999e934310268f287250caa23

          SHA256

          086a2a4dfe1d7e65737ccf5805acda8bce1f11075b684fb49b87fdfb5d0bb559

          SHA512

          88e2d9663f504e529c0dd1c4602bdff103e498aa39f0293a9a5377b35971d1480ad8656e7b8438fa3ed73e121d49dfbdaa4047b43e188ef2c4fd7741d409de68

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk667131.exe

          Filesize

          416KB

          MD5

          a1cd84f0587a141363a7ae5d48063bc6

          SHA1

          1feb6332fff98a3999e934310268f287250caa23

          SHA256

          086a2a4dfe1d7e65737ccf5805acda8bce1f11075b684fb49b87fdfb5d0bb559

          SHA512

          88e2d9663f504e529c0dd1c4602bdff103e498aa39f0293a9a5377b35971d1480ad8656e7b8438fa3ed73e121d49dfbdaa4047b43e188ef2c4fd7741d409de68

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un769999.exe

          Filesize

          569KB

          MD5

          fedc9317399af6248e2ede66c2c9cabc

          SHA1

          203702c4673ae2e9b79ba65ffccfb635fade797d

          SHA256

          d6dff85c404a0863760423acd0d1872838a62c5ab29b7461a796010489c05658

          SHA512

          6be858148227ab31d91de3fd504f38e56df96d31a5cfa83a297c6588b3726eb0b1134731dd38e8e58cee981571c320afead9550b17f566edb6c10ca637c807c9

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un769999.exe

          Filesize

          569KB

          MD5

          fedc9317399af6248e2ede66c2c9cabc

          SHA1

          203702c4673ae2e9b79ba65ffccfb635fade797d

          SHA256

          d6dff85c404a0863760423acd0d1872838a62c5ab29b7461a796010489c05658

          SHA512

          6be858148227ab31d91de3fd504f38e56df96d31a5cfa83a297c6588b3726eb0b1134731dd38e8e58cee981571c320afead9550b17f566edb6c10ca637c807c9

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\90862277.exe

          Filesize

          282KB

          MD5

          89696d5a9cc06f2f759c0e7665e5b638

          SHA1

          ce609dcae46fec3554fcb64f6e1185248f1a7409

          SHA256

          96dddf03c36e6238fb14b75b52a584bede588505af423fea9d1500e9dcdf8ffb

          SHA512

          78788e47db66a104ecb977f9ba072d10cfaaa539afcb125c374ebc87c186ef27d54750d82d065d159a22135605e7e1892ef937fe277c0162856c58e88565e628

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\90862277.exe

          Filesize

          282KB

          MD5

          89696d5a9cc06f2f759c0e7665e5b638

          SHA1

          ce609dcae46fec3554fcb64f6e1185248f1a7409

          SHA256

          96dddf03c36e6238fb14b75b52a584bede588505af423fea9d1500e9dcdf8ffb

          SHA512

          78788e47db66a104ecb977f9ba072d10cfaaa539afcb125c374ebc87c186ef27d54750d82d065d159a22135605e7e1892ef937fe277c0162856c58e88565e628

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\90862277.exe

          Filesize

          282KB

          MD5

          89696d5a9cc06f2f759c0e7665e5b638

          SHA1

          ce609dcae46fec3554fcb64f6e1185248f1a7409

          SHA256

          96dddf03c36e6238fb14b75b52a584bede588505af423fea9d1500e9dcdf8ffb

          SHA512

          78788e47db66a104ecb977f9ba072d10cfaaa539afcb125c374ebc87c186ef27d54750d82d065d159a22135605e7e1892ef937fe277c0162856c58e88565e628

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk667131.exe

          Filesize

          416KB

          MD5

          a1cd84f0587a141363a7ae5d48063bc6

          SHA1

          1feb6332fff98a3999e934310268f287250caa23

          SHA256

          086a2a4dfe1d7e65737ccf5805acda8bce1f11075b684fb49b87fdfb5d0bb559

          SHA512

          88e2d9663f504e529c0dd1c4602bdff103e498aa39f0293a9a5377b35971d1480ad8656e7b8438fa3ed73e121d49dfbdaa4047b43e188ef2c4fd7741d409de68

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk667131.exe

          Filesize

          416KB

          MD5

          a1cd84f0587a141363a7ae5d48063bc6

          SHA1

          1feb6332fff98a3999e934310268f287250caa23

          SHA256

          086a2a4dfe1d7e65737ccf5805acda8bce1f11075b684fb49b87fdfb5d0bb559

          SHA512

          88e2d9663f504e529c0dd1c4602bdff103e498aa39f0293a9a5377b35971d1480ad8656e7b8438fa3ed73e121d49dfbdaa4047b43e188ef2c4fd7741d409de68

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk667131.exe

          Filesize

          416KB

          MD5

          a1cd84f0587a141363a7ae5d48063bc6

          SHA1

          1feb6332fff98a3999e934310268f287250caa23

          SHA256

          086a2a4dfe1d7e65737ccf5805acda8bce1f11075b684fb49b87fdfb5d0bb559

          SHA512

          88e2d9663f504e529c0dd1c4602bdff103e498aa39f0293a9a5377b35971d1480ad8656e7b8438fa3ed73e121d49dfbdaa4047b43e188ef2c4fd7741d409de68

        • memory/784-141-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-151-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-927-0x0000000002020000-0x0000000002060000-memory.dmp

          Filesize

          256KB

        • memory/784-925-0x0000000002020000-0x0000000002060000-memory.dmp

          Filesize

          256KB

        • memory/784-924-0x0000000002020000-0x0000000002060000-memory.dmp

          Filesize

          256KB

        • memory/784-922-0x0000000002020000-0x0000000002060000-memory.dmp

          Filesize

          256KB

        • memory/784-749-0x0000000002020000-0x0000000002060000-memory.dmp

          Filesize

          256KB

        • memory/784-747-0x0000000002020000-0x0000000002060000-memory.dmp

          Filesize

          256KB

        • memory/784-745-0x0000000002020000-0x0000000002060000-memory.dmp

          Filesize

          256KB

        • memory/784-743-0x00000000002A0000-0x00000000002E6000-memory.dmp

          Filesize

          280KB

        • memory/784-157-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-155-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-153-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-149-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-147-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-145-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-143-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-139-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-137-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-135-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-133-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-131-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-124-0x00000000009B0000-0x00000000009EC000-memory.dmp

          Filesize

          240KB

        • memory/784-125-0x0000000001FB0000-0x0000000001FEA000-memory.dmp

          Filesize

          232KB

        • memory/784-126-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-127-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/784-129-0x0000000001FB0000-0x0000000001FE5000-memory.dmp

          Filesize

          212KB

        • memory/1276-87-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-109-0x0000000004C30000-0x0000000004C70000-memory.dmp

          Filesize

          256KB

        • memory/1276-81-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-83-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-85-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-78-0x00000000003E0000-0x00000000003FA000-memory.dmp

          Filesize

          104KB

        • memory/1276-89-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-113-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/1276-111-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/1276-108-0x0000000000300000-0x000000000032D000-memory.dmp

          Filesize

          180KB

        • memory/1276-80-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-79-0x0000000000700000-0x0000000000718000-memory.dmp

          Filesize

          96KB

        • memory/1276-110-0x0000000004C30000-0x0000000004C70000-memory.dmp

          Filesize

          256KB

        • memory/1276-107-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-103-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-105-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-99-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-101-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-95-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-97-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-91-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB

        • memory/1276-93-0x0000000000700000-0x0000000000713000-memory.dmp

          Filesize

          76KB