Analysis

  • max time kernel
    152s
  • max time network
    182s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2023 18:56

General

  • Target

    e795c98c1ab06d557a1e27908c22d84975ff0468adc2c478b1296c4dfb5ebdab.exe

  • Size

    687KB

  • MD5

    58045f5e71753e9b472e1ed78c6c8bf7

  • SHA1

    8f587fc22fa00d39db747956f97cee0356dfcf52

  • SHA256

    e795c98c1ab06d557a1e27908c22d84975ff0468adc2c478b1296c4dfb5ebdab

  • SHA512

    9cbdf63127e1a554b582b797f8f31821222abc76cb09837d2c5b3444d95ceb671b833499105928c42c8ae0bbc260d9be537d6b9d6e89faf3b53498e757ef80f1

  • SSDEEP

    12288:py90CEkLzyDql2b0oFGyCSeMAV18zEPKOuYQOJ5Nxuj/IAgEPa/UPQD7Ziue:py1zWql2bxISO84SOuLOfNCLgYPK7MH

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e795c98c1ab06d557a1e27908c22d84975ff0468adc2c478b1296c4dfb5ebdab.exe
    "C:\Users\Admin\AppData\Local\Temp\e795c98c1ab06d557a1e27908c22d84975ff0468adc2c478b1296c4dfb5ebdab.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un798846.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un798846.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80579313.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80579313.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk622675.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk622675.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un798846.exe

    Filesize

    533KB

    MD5

    f37afb8e845c4ddcfa14b2a27026d48b

    SHA1

    975e205e06174467bad4bb93640f5d9e3e053003

    SHA256

    ac7dc89a6d9eb04430797d187bb80ed055d88b258519557ad0fc54d21ed5b594

    SHA512

    3822732c150b4657b64a291c7f3a121b831bbe4f5e192c88c11e0f59b4f2d03d9fb4fec8d2e243b3be8ddd74f8044aaa3d30a50b0718ec2033b44e38f1d00961

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un798846.exe

    Filesize

    533KB

    MD5

    f37afb8e845c4ddcfa14b2a27026d48b

    SHA1

    975e205e06174467bad4bb93640f5d9e3e053003

    SHA256

    ac7dc89a6d9eb04430797d187bb80ed055d88b258519557ad0fc54d21ed5b594

    SHA512

    3822732c150b4657b64a291c7f3a121b831bbe4f5e192c88c11e0f59b4f2d03d9fb4fec8d2e243b3be8ddd74f8044aaa3d30a50b0718ec2033b44e38f1d00961

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80579313.exe

    Filesize

    249KB

    MD5

    6646bdd84af25fd68a0efeef5b0e344d

    SHA1

    adcdacb7e61a8f2fa0d6bd95c76add1935690dea

    SHA256

    d192f3cb7cd3016052d950a4c09313c9ffd46b99407bcdceec0b87370869b556

    SHA512

    1c0026cb55b95a06accec43c74b4635c73b14033971f87ac9934f1546ec7b1746b5f1a6d24ed1feb10a3bd436aa9bb916800c5af96a9d603052cd9d129da5f17

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80579313.exe

    Filesize

    249KB

    MD5

    6646bdd84af25fd68a0efeef5b0e344d

    SHA1

    adcdacb7e61a8f2fa0d6bd95c76add1935690dea

    SHA256

    d192f3cb7cd3016052d950a4c09313c9ffd46b99407bcdceec0b87370869b556

    SHA512

    1c0026cb55b95a06accec43c74b4635c73b14033971f87ac9934f1546ec7b1746b5f1a6d24ed1feb10a3bd436aa9bb916800c5af96a9d603052cd9d129da5f17

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\80579313.exe

    Filesize

    249KB

    MD5

    6646bdd84af25fd68a0efeef5b0e344d

    SHA1

    adcdacb7e61a8f2fa0d6bd95c76add1935690dea

    SHA256

    d192f3cb7cd3016052d950a4c09313c9ffd46b99407bcdceec0b87370869b556

    SHA512

    1c0026cb55b95a06accec43c74b4635c73b14033971f87ac9934f1546ec7b1746b5f1a6d24ed1feb10a3bd436aa9bb916800c5af96a9d603052cd9d129da5f17

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk622675.exe

    Filesize

    332KB

    MD5

    6403952f6a5d08650ad41d294a7f1197

    SHA1

    639303f66338dcd62835fcad646679c5d1c6ce4f

    SHA256

    3b382a242b2af5e5bc95c5bf7d95746a499c6d51e7889f7d19a68cb408ebcce3

    SHA512

    3c4549f2bff8d973b23c9cb72595385e6922c993dd7af8e2b6c848140a18f02e1cda3dc0119e3e39eb16af7863ac5c5596a9407ada6ee0848b55bf7ec9779546

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk622675.exe

    Filesize

    332KB

    MD5

    6403952f6a5d08650ad41d294a7f1197

    SHA1

    639303f66338dcd62835fcad646679c5d1c6ce4f

    SHA256

    3b382a242b2af5e5bc95c5bf7d95746a499c6d51e7889f7d19a68cb408ebcce3

    SHA512

    3c4549f2bff8d973b23c9cb72595385e6922c993dd7af8e2b6c848140a18f02e1cda3dc0119e3e39eb16af7863ac5c5596a9407ada6ee0848b55bf7ec9779546

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk622675.exe

    Filesize

    332KB

    MD5

    6403952f6a5d08650ad41d294a7f1197

    SHA1

    639303f66338dcd62835fcad646679c5d1c6ce4f

    SHA256

    3b382a242b2af5e5bc95c5bf7d95746a499c6d51e7889f7d19a68cb408ebcce3

    SHA512

    3c4549f2bff8d973b23c9cb72595385e6922c993dd7af8e2b6c848140a18f02e1cda3dc0119e3e39eb16af7863ac5c5596a9407ada6ee0848b55bf7ec9779546

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un798846.exe

    Filesize

    533KB

    MD5

    f37afb8e845c4ddcfa14b2a27026d48b

    SHA1

    975e205e06174467bad4bb93640f5d9e3e053003

    SHA256

    ac7dc89a6d9eb04430797d187bb80ed055d88b258519557ad0fc54d21ed5b594

    SHA512

    3822732c150b4657b64a291c7f3a121b831bbe4f5e192c88c11e0f59b4f2d03d9fb4fec8d2e243b3be8ddd74f8044aaa3d30a50b0718ec2033b44e38f1d00961

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un798846.exe

    Filesize

    533KB

    MD5

    f37afb8e845c4ddcfa14b2a27026d48b

    SHA1

    975e205e06174467bad4bb93640f5d9e3e053003

    SHA256

    ac7dc89a6d9eb04430797d187bb80ed055d88b258519557ad0fc54d21ed5b594

    SHA512

    3822732c150b4657b64a291c7f3a121b831bbe4f5e192c88c11e0f59b4f2d03d9fb4fec8d2e243b3be8ddd74f8044aaa3d30a50b0718ec2033b44e38f1d00961

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\80579313.exe

    Filesize

    249KB

    MD5

    6646bdd84af25fd68a0efeef5b0e344d

    SHA1

    adcdacb7e61a8f2fa0d6bd95c76add1935690dea

    SHA256

    d192f3cb7cd3016052d950a4c09313c9ffd46b99407bcdceec0b87370869b556

    SHA512

    1c0026cb55b95a06accec43c74b4635c73b14033971f87ac9934f1546ec7b1746b5f1a6d24ed1feb10a3bd436aa9bb916800c5af96a9d603052cd9d129da5f17

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\80579313.exe

    Filesize

    249KB

    MD5

    6646bdd84af25fd68a0efeef5b0e344d

    SHA1

    adcdacb7e61a8f2fa0d6bd95c76add1935690dea

    SHA256

    d192f3cb7cd3016052d950a4c09313c9ffd46b99407bcdceec0b87370869b556

    SHA512

    1c0026cb55b95a06accec43c74b4635c73b14033971f87ac9934f1546ec7b1746b5f1a6d24ed1feb10a3bd436aa9bb916800c5af96a9d603052cd9d129da5f17

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\80579313.exe

    Filesize

    249KB

    MD5

    6646bdd84af25fd68a0efeef5b0e344d

    SHA1

    adcdacb7e61a8f2fa0d6bd95c76add1935690dea

    SHA256

    d192f3cb7cd3016052d950a4c09313c9ffd46b99407bcdceec0b87370869b556

    SHA512

    1c0026cb55b95a06accec43c74b4635c73b14033971f87ac9934f1546ec7b1746b5f1a6d24ed1feb10a3bd436aa9bb916800c5af96a9d603052cd9d129da5f17

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk622675.exe

    Filesize

    332KB

    MD5

    6403952f6a5d08650ad41d294a7f1197

    SHA1

    639303f66338dcd62835fcad646679c5d1c6ce4f

    SHA256

    3b382a242b2af5e5bc95c5bf7d95746a499c6d51e7889f7d19a68cb408ebcce3

    SHA512

    3c4549f2bff8d973b23c9cb72595385e6922c993dd7af8e2b6c848140a18f02e1cda3dc0119e3e39eb16af7863ac5c5596a9407ada6ee0848b55bf7ec9779546

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk622675.exe

    Filesize

    332KB

    MD5

    6403952f6a5d08650ad41d294a7f1197

    SHA1

    639303f66338dcd62835fcad646679c5d1c6ce4f

    SHA256

    3b382a242b2af5e5bc95c5bf7d95746a499c6d51e7889f7d19a68cb408ebcce3

    SHA512

    3c4549f2bff8d973b23c9cb72595385e6922c993dd7af8e2b6c848140a18f02e1cda3dc0119e3e39eb16af7863ac5c5596a9407ada6ee0848b55bf7ec9779546

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk622675.exe

    Filesize

    332KB

    MD5

    6403952f6a5d08650ad41d294a7f1197

    SHA1

    639303f66338dcd62835fcad646679c5d1c6ce4f

    SHA256

    3b382a242b2af5e5bc95c5bf7d95746a499c6d51e7889f7d19a68cb408ebcce3

    SHA512

    3c4549f2bff8d973b23c9cb72595385e6922c993dd7af8e2b6c848140a18f02e1cda3dc0119e3e39eb16af7863ac5c5596a9407ada6ee0848b55bf7ec9779546

  • memory/752-93-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-86-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-88-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-84-0x0000000000400000-0x0000000002B9A000-memory.dmp

    Filesize

    39.6MB

  • memory/752-90-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-91-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/752-99-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-101-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-107-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-113-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-111-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-109-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-105-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-103-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-97-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-95-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-85-0x0000000002FA0000-0x0000000002FB3000-memory.dmp

    Filesize

    76KB

  • memory/752-115-0x00000000049F0000-0x0000000004A30000-memory.dmp

    Filesize

    256KB

  • memory/752-117-0x0000000000400000-0x0000000002B9A000-memory.dmp

    Filesize

    39.6MB

  • memory/752-83-0x0000000002FA0000-0x0000000002FB8000-memory.dmp

    Filesize

    96KB

  • memory/752-81-0x00000000049F0000-0x0000000004A30000-memory.dmp

    Filesize

    256KB

  • memory/752-82-0x00000000049F0000-0x0000000004A30000-memory.dmp

    Filesize

    256KB

  • memory/752-80-0x00000000003E0000-0x00000000003FA000-memory.dmp

    Filesize

    104KB

  • memory/752-79-0x0000000000400000-0x0000000002B9A000-memory.dmp

    Filesize

    39.6MB

  • memory/752-78-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/1340-128-0x0000000004920000-0x000000000495C000-memory.dmp

    Filesize

    240KB

  • memory/1340-129-0x0000000004960000-0x000000000499A000-memory.dmp

    Filesize

    232KB

  • memory/1340-130-0x0000000000260000-0x00000000002A6000-memory.dmp

    Filesize

    280KB

  • memory/1340-131-0x0000000007310000-0x0000000007350000-memory.dmp

    Filesize

    256KB

  • memory/1340-132-0x0000000007310000-0x0000000007350000-memory.dmp

    Filesize

    256KB

  • memory/1340-133-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-134-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-136-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-138-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-140-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-142-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-144-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-146-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-148-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-150-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-152-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-154-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-156-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-158-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-160-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-162-0x0000000004960000-0x0000000004995000-memory.dmp

    Filesize

    212KB

  • memory/1340-925-0x0000000007310000-0x0000000007350000-memory.dmp

    Filesize

    256KB

  • memory/1340-927-0x0000000007310000-0x0000000007350000-memory.dmp

    Filesize

    256KB

  • memory/1340-929-0x0000000007310000-0x0000000007350000-memory.dmp

    Filesize

    256KB