Analysis

  • max time kernel
    170s
  • max time network
    175s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2023, 19:35

General

  • Target

    fcf6613a3454512e24632047ce20c9ad3098ac76511b2f2abc68d42c4667b0e9.exe

  • Size

    690KB

  • MD5

    8cb991d44f83950d56b05c5513480254

  • SHA1

    91861e9496f01a1681d9c1239f3ac4d7803c6883

  • SHA256

    fcf6613a3454512e24632047ce20c9ad3098ac76511b2f2abc68d42c4667b0e9

  • SHA512

    75e97aa1adc0a96f21816fee16a821fbd2e10921f0a989eb509274284da2b8017758e76369829438d1e25e8bc288d1b4536c2320258c7ae5b00fe8a84eab5336

  • SSDEEP

    12288:3y90dmJsQJUcyKb+/83yb1E/VIE80qKR2ymJOD7zLSvuH:3yrOc7+QdIZk2ycO//H

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcf6613a3454512e24632047ce20c9ad3098ac76511b2f2abc68d42c4667b0e9.exe
    "C:\Users\Admin\AppData\Local\Temp\fcf6613a3454512e24632047ce20c9ad3098ac76511b2f2abc68d42c4667b0e9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un302444.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un302444.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94857262.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94857262.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:572
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk139230.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk139230.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1404

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un302444.exe

    Filesize

    536KB

    MD5

    5b573a4889bcbb8b0ad137a2fd9ec438

    SHA1

    4ea6de70e2655e92864e229e5aa6c833d214a907

    SHA256

    efec0406db2fe14f8c3e976c0ff96a7acd01cfb7b7ccf5bba8e26498659e81ea

    SHA512

    1c9ff76d42095f0c2951643e01edf91d27290c69c6b55fae6f08cdd7bbc6c92929fb81f4e881c543de0ecc46765a9d16dc27fa01ecb9e8e6026dd111ae782231

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un302444.exe

    Filesize

    536KB

    MD5

    5b573a4889bcbb8b0ad137a2fd9ec438

    SHA1

    4ea6de70e2655e92864e229e5aa6c833d214a907

    SHA256

    efec0406db2fe14f8c3e976c0ff96a7acd01cfb7b7ccf5bba8e26498659e81ea

    SHA512

    1c9ff76d42095f0c2951643e01edf91d27290c69c6b55fae6f08cdd7bbc6c92929fb81f4e881c543de0ecc46765a9d16dc27fa01ecb9e8e6026dd111ae782231

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94857262.exe

    Filesize

    259KB

    MD5

    086fdf0ed9298523e0e464c697a83d9b

    SHA1

    f01b5e2a786ee2dd6d9c4b5b6d0e4eabe97d87c1

    SHA256

    c6f2cc98fa6815449d730618fa1ef41a81a0fe7bdebcc5f41b11a22d1ce5839a

    SHA512

    c4849d796beb812eeddbb984976c6bf9350ac0822c0ed49fb332909fb094943c9485d4147eedbc2ab95e9ded09f9dc91c0233a88a5d6baa813eb3988704b2091

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94857262.exe

    Filesize

    259KB

    MD5

    086fdf0ed9298523e0e464c697a83d9b

    SHA1

    f01b5e2a786ee2dd6d9c4b5b6d0e4eabe97d87c1

    SHA256

    c6f2cc98fa6815449d730618fa1ef41a81a0fe7bdebcc5f41b11a22d1ce5839a

    SHA512

    c4849d796beb812eeddbb984976c6bf9350ac0822c0ed49fb332909fb094943c9485d4147eedbc2ab95e9ded09f9dc91c0233a88a5d6baa813eb3988704b2091

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94857262.exe

    Filesize

    259KB

    MD5

    086fdf0ed9298523e0e464c697a83d9b

    SHA1

    f01b5e2a786ee2dd6d9c4b5b6d0e4eabe97d87c1

    SHA256

    c6f2cc98fa6815449d730618fa1ef41a81a0fe7bdebcc5f41b11a22d1ce5839a

    SHA512

    c4849d796beb812eeddbb984976c6bf9350ac0822c0ed49fb332909fb094943c9485d4147eedbc2ab95e9ded09f9dc91c0233a88a5d6baa813eb3988704b2091

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk139230.exe

    Filesize

    341KB

    MD5

    661c757d3f34b1ada0fef0b536f263fc

    SHA1

    66d9cc199fe247540d730db57eaeab7fea3c6cc2

    SHA256

    02d5a4364bb851f2688b58b60d56b009f0b2c50c3cdce9be505842a11dcce7c0

    SHA512

    acb6f126a66d2aa7abaf65cecf5c3e29c1ff9b4f7f6c49e0a2794123383fc0fe55374d848ae522d6a0212318020f08bf962ba894ab3dd5e36e78a32ddd6ff5f2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk139230.exe

    Filesize

    341KB

    MD5

    661c757d3f34b1ada0fef0b536f263fc

    SHA1

    66d9cc199fe247540d730db57eaeab7fea3c6cc2

    SHA256

    02d5a4364bb851f2688b58b60d56b009f0b2c50c3cdce9be505842a11dcce7c0

    SHA512

    acb6f126a66d2aa7abaf65cecf5c3e29c1ff9b4f7f6c49e0a2794123383fc0fe55374d848ae522d6a0212318020f08bf962ba894ab3dd5e36e78a32ddd6ff5f2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk139230.exe

    Filesize

    341KB

    MD5

    661c757d3f34b1ada0fef0b536f263fc

    SHA1

    66d9cc199fe247540d730db57eaeab7fea3c6cc2

    SHA256

    02d5a4364bb851f2688b58b60d56b009f0b2c50c3cdce9be505842a11dcce7c0

    SHA512

    acb6f126a66d2aa7abaf65cecf5c3e29c1ff9b4f7f6c49e0a2794123383fc0fe55374d848ae522d6a0212318020f08bf962ba894ab3dd5e36e78a32ddd6ff5f2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un302444.exe

    Filesize

    536KB

    MD5

    5b573a4889bcbb8b0ad137a2fd9ec438

    SHA1

    4ea6de70e2655e92864e229e5aa6c833d214a907

    SHA256

    efec0406db2fe14f8c3e976c0ff96a7acd01cfb7b7ccf5bba8e26498659e81ea

    SHA512

    1c9ff76d42095f0c2951643e01edf91d27290c69c6b55fae6f08cdd7bbc6c92929fb81f4e881c543de0ecc46765a9d16dc27fa01ecb9e8e6026dd111ae782231

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un302444.exe

    Filesize

    536KB

    MD5

    5b573a4889bcbb8b0ad137a2fd9ec438

    SHA1

    4ea6de70e2655e92864e229e5aa6c833d214a907

    SHA256

    efec0406db2fe14f8c3e976c0ff96a7acd01cfb7b7ccf5bba8e26498659e81ea

    SHA512

    1c9ff76d42095f0c2951643e01edf91d27290c69c6b55fae6f08cdd7bbc6c92929fb81f4e881c543de0ecc46765a9d16dc27fa01ecb9e8e6026dd111ae782231

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\94857262.exe

    Filesize

    259KB

    MD5

    086fdf0ed9298523e0e464c697a83d9b

    SHA1

    f01b5e2a786ee2dd6d9c4b5b6d0e4eabe97d87c1

    SHA256

    c6f2cc98fa6815449d730618fa1ef41a81a0fe7bdebcc5f41b11a22d1ce5839a

    SHA512

    c4849d796beb812eeddbb984976c6bf9350ac0822c0ed49fb332909fb094943c9485d4147eedbc2ab95e9ded09f9dc91c0233a88a5d6baa813eb3988704b2091

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\94857262.exe

    Filesize

    259KB

    MD5

    086fdf0ed9298523e0e464c697a83d9b

    SHA1

    f01b5e2a786ee2dd6d9c4b5b6d0e4eabe97d87c1

    SHA256

    c6f2cc98fa6815449d730618fa1ef41a81a0fe7bdebcc5f41b11a22d1ce5839a

    SHA512

    c4849d796beb812eeddbb984976c6bf9350ac0822c0ed49fb332909fb094943c9485d4147eedbc2ab95e9ded09f9dc91c0233a88a5d6baa813eb3988704b2091

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\94857262.exe

    Filesize

    259KB

    MD5

    086fdf0ed9298523e0e464c697a83d9b

    SHA1

    f01b5e2a786ee2dd6d9c4b5b6d0e4eabe97d87c1

    SHA256

    c6f2cc98fa6815449d730618fa1ef41a81a0fe7bdebcc5f41b11a22d1ce5839a

    SHA512

    c4849d796beb812eeddbb984976c6bf9350ac0822c0ed49fb332909fb094943c9485d4147eedbc2ab95e9ded09f9dc91c0233a88a5d6baa813eb3988704b2091

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk139230.exe

    Filesize

    341KB

    MD5

    661c757d3f34b1ada0fef0b536f263fc

    SHA1

    66d9cc199fe247540d730db57eaeab7fea3c6cc2

    SHA256

    02d5a4364bb851f2688b58b60d56b009f0b2c50c3cdce9be505842a11dcce7c0

    SHA512

    acb6f126a66d2aa7abaf65cecf5c3e29c1ff9b4f7f6c49e0a2794123383fc0fe55374d848ae522d6a0212318020f08bf962ba894ab3dd5e36e78a32ddd6ff5f2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk139230.exe

    Filesize

    341KB

    MD5

    661c757d3f34b1ada0fef0b536f263fc

    SHA1

    66d9cc199fe247540d730db57eaeab7fea3c6cc2

    SHA256

    02d5a4364bb851f2688b58b60d56b009f0b2c50c3cdce9be505842a11dcce7c0

    SHA512

    acb6f126a66d2aa7abaf65cecf5c3e29c1ff9b4f7f6c49e0a2794123383fc0fe55374d848ae522d6a0212318020f08bf962ba894ab3dd5e36e78a32ddd6ff5f2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk139230.exe

    Filesize

    341KB

    MD5

    661c757d3f34b1ada0fef0b536f263fc

    SHA1

    66d9cc199fe247540d730db57eaeab7fea3c6cc2

    SHA256

    02d5a4364bb851f2688b58b60d56b009f0b2c50c3cdce9be505842a11dcce7c0

    SHA512

    acb6f126a66d2aa7abaf65cecf5c3e29c1ff9b4f7f6c49e0a2794123383fc0fe55374d848ae522d6a0212318020f08bf962ba894ab3dd5e36e78a32ddd6ff5f2

  • memory/572-112-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/572-93-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-91-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-95-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-97-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-89-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-101-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-99-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-105-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-107-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-103-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-108-0x0000000000250000-0x000000000027D000-memory.dmp

    Filesize

    180KB

  • memory/572-109-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB

  • memory/572-110-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB

  • memory/572-111-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB

  • memory/572-87-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-113-0x0000000000400000-0x0000000000455000-memory.dmp

    Filesize

    340KB

  • memory/572-80-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-85-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-83-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-81-0x0000000000850000-0x0000000000863000-memory.dmp

    Filesize

    76KB

  • memory/572-79-0x0000000000850000-0x0000000000868000-memory.dmp

    Filesize

    96KB

  • memory/572-78-0x00000000005F0000-0x000000000060A000-memory.dmp

    Filesize

    104KB

  • memory/1404-126-0x0000000000330000-0x0000000000376000-memory.dmp

    Filesize

    280KB

  • memory/1404-144-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-124-0x0000000002150000-0x000000000218C000-memory.dmp

    Filesize

    240KB

  • memory/1404-127-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB

  • memory/1404-128-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB

  • memory/1404-129-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-130-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-132-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-134-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-136-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-138-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-140-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-142-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-125-0x0000000002200000-0x000000000223A000-memory.dmp

    Filesize

    232KB

  • memory/1404-146-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-148-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-150-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-152-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-154-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-156-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-158-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-160-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-162-0x0000000002200000-0x0000000002235000-memory.dmp

    Filesize

    212KB

  • memory/1404-922-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB

  • memory/1404-923-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB

  • memory/1404-924-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB

  • memory/1404-926-0x0000000004A90000-0x0000000004AD0000-memory.dmp

    Filesize

    256KB