Analysis

  • max time kernel
    157s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2023, 19:36

General

  • Target

    fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe

  • Size

    644KB

  • MD5

    add745b6e38654a1d0ee8566fc29d363

  • SHA1

    7719eae533b94ad44c26cb84daecad37b0a65f5d

  • SHA256

    fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940

  • SHA512

    dfe898d59ed0284c665f056fab6aa289de82bdb2cf975a2b716abe20f2628662ff78ddc696ee8fe5f5cc15cca643dee49d6269847d10b51cf3d64f65fbaa71be

  • SSDEEP

    12288:2y9078xzKp3xtWSKGNZqWt6QuV7lrqQPZRlu8qx0iSPe7XfyXZND:2y1xzKmikK2pWwj0uve7XqND

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe
    "C:\Users\Admin\AppData\Local\Temp\fe3b1ed46f48fedf189d82841757339f75d4b9ed69eb18ddd2ffc2e57928f940.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st618533.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st618533.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18326323.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18326323.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp433506.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp433506.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st618533.exe

    Filesize

    489KB

    MD5

    79cff599fcc2b79dd55645595fd36963

    SHA1

    993f5ba1be7d12150246ed191093687c5d8c6eee

    SHA256

    2a95c9b1701b5549eddddc93c93e7f113dabffb6f762c271c0a8075001243e62

    SHA512

    b2f4ef976eece8b6dee53f5c4236c2c18623b43a5f87f1a3fe4e894b52cf5b2dd865edc37c822f9100f6ccc383dbc92a68e6202cf5ce679524a7bb2aa0ea5005

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st618533.exe

    Filesize

    489KB

    MD5

    79cff599fcc2b79dd55645595fd36963

    SHA1

    993f5ba1be7d12150246ed191093687c5d8c6eee

    SHA256

    2a95c9b1701b5549eddddc93c93e7f113dabffb6f762c271c0a8075001243e62

    SHA512

    b2f4ef976eece8b6dee53f5c4236c2c18623b43a5f87f1a3fe4e894b52cf5b2dd865edc37c822f9100f6ccc383dbc92a68e6202cf5ce679524a7bb2aa0ea5005

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18326323.exe

    Filesize

    175KB

    MD5

    3d10b67208452d7a91d7bd7066067676

    SHA1

    e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

    SHA256

    5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

    SHA512

    b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18326323.exe

    Filesize

    175KB

    MD5

    3d10b67208452d7a91d7bd7066067676

    SHA1

    e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

    SHA256

    5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

    SHA512

    b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp433506.exe

    Filesize

    348KB

    MD5

    1b6b914aec47b0255742b156456229f0

    SHA1

    0fb2ad395dfda1227922af244c2323dced6f25fc

    SHA256

    2bbc822303bd5a1f6a4b00ccd5c9f82d3ed7cb931d973d27bf1f9ac14efd9ed7

    SHA512

    d00d9675d54627e3fedc457b902dd4edeb73144f14b3202c775c5ebba6a1c027f0675126e35d0129b5ccf866f09ce354a1499848a8e6ae8392b23c62ff49156e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp433506.exe

    Filesize

    348KB

    MD5

    1b6b914aec47b0255742b156456229f0

    SHA1

    0fb2ad395dfda1227922af244c2323dced6f25fc

    SHA256

    2bbc822303bd5a1f6a4b00ccd5c9f82d3ed7cb931d973d27bf1f9ac14efd9ed7

    SHA512

    d00d9675d54627e3fedc457b902dd4edeb73144f14b3202c775c5ebba6a1c027f0675126e35d0129b5ccf866f09ce354a1499848a8e6ae8392b23c62ff49156e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp433506.exe

    Filesize

    348KB

    MD5

    1b6b914aec47b0255742b156456229f0

    SHA1

    0fb2ad395dfda1227922af244c2323dced6f25fc

    SHA256

    2bbc822303bd5a1f6a4b00ccd5c9f82d3ed7cb931d973d27bf1f9ac14efd9ed7

    SHA512

    d00d9675d54627e3fedc457b902dd4edeb73144f14b3202c775c5ebba6a1c027f0675126e35d0129b5ccf866f09ce354a1499848a8e6ae8392b23c62ff49156e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st618533.exe

    Filesize

    489KB

    MD5

    79cff599fcc2b79dd55645595fd36963

    SHA1

    993f5ba1be7d12150246ed191093687c5d8c6eee

    SHA256

    2a95c9b1701b5549eddddc93c93e7f113dabffb6f762c271c0a8075001243e62

    SHA512

    b2f4ef976eece8b6dee53f5c4236c2c18623b43a5f87f1a3fe4e894b52cf5b2dd865edc37c822f9100f6ccc383dbc92a68e6202cf5ce679524a7bb2aa0ea5005

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st618533.exe

    Filesize

    489KB

    MD5

    79cff599fcc2b79dd55645595fd36963

    SHA1

    993f5ba1be7d12150246ed191093687c5d8c6eee

    SHA256

    2a95c9b1701b5549eddddc93c93e7f113dabffb6f762c271c0a8075001243e62

    SHA512

    b2f4ef976eece8b6dee53f5c4236c2c18623b43a5f87f1a3fe4e894b52cf5b2dd865edc37c822f9100f6ccc383dbc92a68e6202cf5ce679524a7bb2aa0ea5005

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\18326323.exe

    Filesize

    175KB

    MD5

    3d10b67208452d7a91d7bd7066067676

    SHA1

    e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

    SHA256

    5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

    SHA512

    b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\18326323.exe

    Filesize

    175KB

    MD5

    3d10b67208452d7a91d7bd7066067676

    SHA1

    e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

    SHA256

    5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

    SHA512

    b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp433506.exe

    Filesize

    348KB

    MD5

    1b6b914aec47b0255742b156456229f0

    SHA1

    0fb2ad395dfda1227922af244c2323dced6f25fc

    SHA256

    2bbc822303bd5a1f6a4b00ccd5c9f82d3ed7cb931d973d27bf1f9ac14efd9ed7

    SHA512

    d00d9675d54627e3fedc457b902dd4edeb73144f14b3202c775c5ebba6a1c027f0675126e35d0129b5ccf866f09ce354a1499848a8e6ae8392b23c62ff49156e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp433506.exe

    Filesize

    348KB

    MD5

    1b6b914aec47b0255742b156456229f0

    SHA1

    0fb2ad395dfda1227922af244c2323dced6f25fc

    SHA256

    2bbc822303bd5a1f6a4b00ccd5c9f82d3ed7cb931d973d27bf1f9ac14efd9ed7

    SHA512

    d00d9675d54627e3fedc457b902dd4edeb73144f14b3202c775c5ebba6a1c027f0675126e35d0129b5ccf866f09ce354a1499848a8e6ae8392b23c62ff49156e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp433506.exe

    Filesize

    348KB

    MD5

    1b6b914aec47b0255742b156456229f0

    SHA1

    0fb2ad395dfda1227922af244c2323dced6f25fc

    SHA256

    2bbc822303bd5a1f6a4b00ccd5c9f82d3ed7cb931d973d27bf1f9ac14efd9ed7

    SHA512

    d00d9675d54627e3fedc457b902dd4edeb73144f14b3202c775c5ebba6a1c027f0675126e35d0129b5ccf866f09ce354a1499848a8e6ae8392b23c62ff49156e

  • memory/684-82-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-80-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-84-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-86-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-88-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-90-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-92-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-98-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-96-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-100-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-102-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-94-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-106-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-104-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-79-0x0000000000B10000-0x0000000000B23000-memory.dmp

    Filesize

    76KB

  • memory/684-78-0x0000000004AF0000-0x0000000004B30000-memory.dmp

    Filesize

    256KB

  • memory/684-77-0x0000000000B10000-0x0000000000B28000-memory.dmp

    Filesize

    96KB

  • memory/684-76-0x0000000004AF0000-0x0000000004B30000-memory.dmp

    Filesize

    256KB

  • memory/684-75-0x0000000000AD0000-0x0000000000AEA000-memory.dmp

    Filesize

    104KB

  • memory/684-74-0x0000000004AF0000-0x0000000004B30000-memory.dmp

    Filesize

    256KB

  • memory/1044-122-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-140-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-119-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-117-0x0000000003220000-0x000000000325C000-memory.dmp

    Filesize

    240KB

  • memory/1044-120-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-124-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-126-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-128-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-132-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-130-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-134-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-136-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-138-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-118-0x0000000003260000-0x000000000329A000-memory.dmp

    Filesize

    232KB

  • memory/1044-142-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-144-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-146-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-148-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-150-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-152-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-154-0x0000000003260000-0x0000000003295000-memory.dmp

    Filesize

    212KB

  • memory/1044-157-0x0000000002EE0000-0x0000000002F26000-memory.dmp

    Filesize

    280KB

  • memory/1044-159-0x0000000007170000-0x00000000071B0000-memory.dmp

    Filesize

    256KB

  • memory/1044-160-0x0000000007170000-0x00000000071B0000-memory.dmp

    Filesize

    256KB

  • memory/1044-915-0x0000000007170000-0x00000000071B0000-memory.dmp

    Filesize

    256KB

  • memory/1044-917-0x0000000007170000-0x00000000071B0000-memory.dmp

    Filesize

    256KB

  • memory/1044-919-0x0000000007170000-0x00000000071B0000-memory.dmp

    Filesize

    256KB