Analysis

  • max time kernel
    152s
  • max time network
    186s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2023, 18:47

General

  • Target

    df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe

  • Size

    674KB

  • MD5

    7440ff76fa12b307497d81a9ab9cd1c7

  • SHA1

    31de0c1438cede9766194bcda8bcc2b77cd07ed8

  • SHA256

    df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4

  • SHA512

    8e28f67ab47050ab3fb55f00c10b08917904aa835d1091f1f801d1fd00e910d8bb327fbbcc7103af99d3b6a4c48926cb26e6f5f84504400e38c7bef765bb102f

  • SSDEEP

    12288:Ey90VWPMB7TgeLNvzTAo/PLeNg0s3OuVvGWITSvDWphO82875h:EybPYd8o/P25KOOiTS6phO828T

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe
    "C:\Users\Admin\AppData\Local\Temp\df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:924

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exe

          Filesize

          519KB

          MD5

          411df1ab1a708202f347d5af552b9a58

          SHA1

          0cdc36cab112173b8527f82110ecc16f792902f2

          SHA256

          50e5440679e1056d8f8b868e46b7e0b6c779ad2f2362654382fcae718773aa6e

          SHA512

          9b4f8be9a04f843f942dd7ef0bd062319f44ca97d6d9fd6fb45eb60578b74f716916d4aff0aefff904cee7660749fe8695a2b7f227ed4c461c907be8610fca24

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exe

          Filesize

          519KB

          MD5

          411df1ab1a708202f347d5af552b9a58

          SHA1

          0cdc36cab112173b8527f82110ecc16f792902f2

          SHA256

          50e5440679e1056d8f8b868e46b7e0b6c779ad2f2362654382fcae718773aa6e

          SHA512

          9b4f8be9a04f843f942dd7ef0bd062319f44ca97d6d9fd6fb45eb60578b74f716916d4aff0aefff904cee7660749fe8695a2b7f227ed4c461c907be8610fca24

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exe

          Filesize

          175KB

          MD5

          a165b5f6b0a4bdf808b71de57bf9347d

          SHA1

          39a7b301e819e386c162a47e046fa384bb5ab437

          SHA256

          68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

          SHA512

          3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exe

          Filesize

          175KB

          MD5

          a165b5f6b0a4bdf808b71de57bf9347d

          SHA1

          39a7b301e819e386c162a47e046fa384bb5ab437

          SHA256

          68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

          SHA512

          3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe

          Filesize

          415KB

          MD5

          c8646ad71b08f3d1380a6be0537f281c

          SHA1

          1eab0e05dffb4a72be200dc4fad9cc1ce297fd36

          SHA256

          7d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a

          SHA512

          a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe

          Filesize

          415KB

          MD5

          c8646ad71b08f3d1380a6be0537f281c

          SHA1

          1eab0e05dffb4a72be200dc4fad9cc1ce297fd36

          SHA256

          7d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a

          SHA512

          a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe

          Filesize

          415KB

          MD5

          c8646ad71b08f3d1380a6be0537f281c

          SHA1

          1eab0e05dffb4a72be200dc4fad9cc1ce297fd36

          SHA256

          7d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a

          SHA512

          a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exe

          Filesize

          519KB

          MD5

          411df1ab1a708202f347d5af552b9a58

          SHA1

          0cdc36cab112173b8527f82110ecc16f792902f2

          SHA256

          50e5440679e1056d8f8b868e46b7e0b6c779ad2f2362654382fcae718773aa6e

          SHA512

          9b4f8be9a04f843f942dd7ef0bd062319f44ca97d6d9fd6fb45eb60578b74f716916d4aff0aefff904cee7660749fe8695a2b7f227ed4c461c907be8610fca24

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exe

          Filesize

          519KB

          MD5

          411df1ab1a708202f347d5af552b9a58

          SHA1

          0cdc36cab112173b8527f82110ecc16f792902f2

          SHA256

          50e5440679e1056d8f8b868e46b7e0b6c779ad2f2362654382fcae718773aa6e

          SHA512

          9b4f8be9a04f843f942dd7ef0bd062319f44ca97d6d9fd6fb45eb60578b74f716916d4aff0aefff904cee7660749fe8695a2b7f227ed4c461c907be8610fca24

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exe

          Filesize

          175KB

          MD5

          a165b5f6b0a4bdf808b71de57bf9347d

          SHA1

          39a7b301e819e386c162a47e046fa384bb5ab437

          SHA256

          68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

          SHA512

          3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exe

          Filesize

          175KB

          MD5

          a165b5f6b0a4bdf808b71de57bf9347d

          SHA1

          39a7b301e819e386c162a47e046fa384bb5ab437

          SHA256

          68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

          SHA512

          3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe

          Filesize

          415KB

          MD5

          c8646ad71b08f3d1380a6be0537f281c

          SHA1

          1eab0e05dffb4a72be200dc4fad9cc1ce297fd36

          SHA256

          7d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a

          SHA512

          a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe

          Filesize

          415KB

          MD5

          c8646ad71b08f3d1380a6be0537f281c

          SHA1

          1eab0e05dffb4a72be200dc4fad9cc1ce297fd36

          SHA256

          7d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a

          SHA512

          a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe

          Filesize

          415KB

          MD5

          c8646ad71b08f3d1380a6be0537f281c

          SHA1

          1eab0e05dffb4a72be200dc4fad9cc1ce297fd36

          SHA256

          7d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a

          SHA512

          a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0

        • memory/924-132-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-143-0x0000000000270000-0x00000000002B6000-memory.dmp

          Filesize

          280KB

        • memory/924-916-0x0000000004AE0000-0x0000000004B20000-memory.dmp

          Filesize

          256KB

        • memory/924-914-0x0000000004AE0000-0x0000000004B20000-memory.dmp

          Filesize

          256KB

        • memory/924-912-0x0000000004AE0000-0x0000000004B20000-memory.dmp

          Filesize

          256KB

        • memory/924-155-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-153-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-149-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-151-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-147-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-146-0x0000000004AE0000-0x0000000004B20000-memory.dmp

          Filesize

          256KB

        • memory/924-144-0x0000000004AE0000-0x0000000004B20000-memory.dmp

          Filesize

          256KB

        • memory/924-142-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-134-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-136-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-138-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-140-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-130-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-115-0x0000000002130000-0x000000000216C000-memory.dmp

          Filesize

          240KB

        • memory/924-116-0x0000000002170000-0x00000000021AA000-memory.dmp

          Filesize

          232KB

        • memory/924-117-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-118-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-120-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-122-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-124-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-126-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/924-128-0x0000000002170000-0x00000000021A5000-memory.dmp

          Filesize

          212KB

        • memory/1056-102-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-98-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-76-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-79-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-77-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-81-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-84-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-83-0x0000000004A90000-0x0000000004AD0000-memory.dmp

          Filesize

          256KB

        • memory/1056-74-0x00000000003E0000-0x00000000003FA000-memory.dmp

          Filesize

          104KB

        • memory/1056-75-0x0000000001FE0000-0x0000000001FF8000-memory.dmp

          Filesize

          96KB

        • memory/1056-104-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-100-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-96-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-94-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-90-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-92-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-88-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB

        • memory/1056-86-0x0000000001FE0000-0x0000000001FF3000-memory.dmp

          Filesize

          76KB