Analysis

  • max time kernel
    154s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 19:20

General

  • Target

    bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe

  • Size

    694KB

  • MD5

    dd2d202badee775ea9c9771189f215e3

  • SHA1

    62dd322096d3aff4a4d40bbf290bd59e28fa12f0

  • SHA256

    bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143

  • SHA512

    e9a04bcaa4387e8797e7baee6d0ccb4be6a7a739dc798dcee791357e6ce26284b74c37af22ee73983e8f4dc362be6dd844faada310e036cdd70220d53cbcb5de

  • SSDEEP

    12288:xy908CEt57Vv8Grha375FJ60qlniSVdUN0cRxbPDUBTOYGQBqm9T:xy+e7V0Gda37HJZqlVdUeEb1Y5q8

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe
    "C:\Users\Admin\AppData\Local\Temp\bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1628

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exe

          Filesize

          540KB

          MD5

          ef29a63423d3871a7796ead771fa4557

          SHA1

          949fb565e75663fef5470926003390be46055a03

          SHA256

          4fd1dbf5fa7440889733db01ea650a29e000e0f4cd878e58cfa9a6dd94e10a66

          SHA512

          9ddb1d4b9cf3502a7d95bd5caa63d9e667cb30e3902bd9a237ce1825a2eaaf14bbe354b5693d1d89d56e8e435a746f5fb9e7c9e5c21ab9368787fab85b41d91d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exe

          Filesize

          540KB

          MD5

          ef29a63423d3871a7796ead771fa4557

          SHA1

          949fb565e75663fef5470926003390be46055a03

          SHA256

          4fd1dbf5fa7440889733db01ea650a29e000e0f4cd878e58cfa9a6dd94e10a66

          SHA512

          9ddb1d4b9cf3502a7d95bd5caa63d9e667cb30e3902bd9a237ce1825a2eaaf14bbe354b5693d1d89d56e8e435a746f5fb9e7c9e5c21ab9368787fab85b41d91d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe

          Filesize

          258KB

          MD5

          bc4ee02854bd043f990dab2d8ad92db3

          SHA1

          60e767841bbf1617040953ef1579ddbb6a0a4566

          SHA256

          0431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07

          SHA512

          17e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe

          Filesize

          258KB

          MD5

          bc4ee02854bd043f990dab2d8ad92db3

          SHA1

          60e767841bbf1617040953ef1579ddbb6a0a4566

          SHA256

          0431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07

          SHA512

          17e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe

          Filesize

          258KB

          MD5

          bc4ee02854bd043f990dab2d8ad92db3

          SHA1

          60e767841bbf1617040953ef1579ddbb6a0a4566

          SHA256

          0431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07

          SHA512

          17e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe

          Filesize

          341KB

          MD5

          3a4a31e28202034c475024725a90472b

          SHA1

          8ff7a828dcaa0e7acc9cca46f36fb560e999bdda

          SHA256

          fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3

          SHA512

          c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe

          Filesize

          341KB

          MD5

          3a4a31e28202034c475024725a90472b

          SHA1

          8ff7a828dcaa0e7acc9cca46f36fb560e999bdda

          SHA256

          fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3

          SHA512

          c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe

          Filesize

          341KB

          MD5

          3a4a31e28202034c475024725a90472b

          SHA1

          8ff7a828dcaa0e7acc9cca46f36fb560e999bdda

          SHA256

          fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3

          SHA512

          c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exe

          Filesize

          540KB

          MD5

          ef29a63423d3871a7796ead771fa4557

          SHA1

          949fb565e75663fef5470926003390be46055a03

          SHA256

          4fd1dbf5fa7440889733db01ea650a29e000e0f4cd878e58cfa9a6dd94e10a66

          SHA512

          9ddb1d4b9cf3502a7d95bd5caa63d9e667cb30e3902bd9a237ce1825a2eaaf14bbe354b5693d1d89d56e8e435a746f5fb9e7c9e5c21ab9368787fab85b41d91d

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exe

          Filesize

          540KB

          MD5

          ef29a63423d3871a7796ead771fa4557

          SHA1

          949fb565e75663fef5470926003390be46055a03

          SHA256

          4fd1dbf5fa7440889733db01ea650a29e000e0f4cd878e58cfa9a6dd94e10a66

          SHA512

          9ddb1d4b9cf3502a7d95bd5caa63d9e667cb30e3902bd9a237ce1825a2eaaf14bbe354b5693d1d89d56e8e435a746f5fb9e7c9e5c21ab9368787fab85b41d91d

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe

          Filesize

          258KB

          MD5

          bc4ee02854bd043f990dab2d8ad92db3

          SHA1

          60e767841bbf1617040953ef1579ddbb6a0a4566

          SHA256

          0431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07

          SHA512

          17e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe

          Filesize

          258KB

          MD5

          bc4ee02854bd043f990dab2d8ad92db3

          SHA1

          60e767841bbf1617040953ef1579ddbb6a0a4566

          SHA256

          0431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07

          SHA512

          17e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe

          Filesize

          258KB

          MD5

          bc4ee02854bd043f990dab2d8ad92db3

          SHA1

          60e767841bbf1617040953ef1579ddbb6a0a4566

          SHA256

          0431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07

          SHA512

          17e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe

          Filesize

          341KB

          MD5

          3a4a31e28202034c475024725a90472b

          SHA1

          8ff7a828dcaa0e7acc9cca46f36fb560e999bdda

          SHA256

          fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3

          SHA512

          c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe

          Filesize

          341KB

          MD5

          3a4a31e28202034c475024725a90472b

          SHA1

          8ff7a828dcaa0e7acc9cca46f36fb560e999bdda

          SHA256

          fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3

          SHA512

          c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe

          Filesize

          341KB

          MD5

          3a4a31e28202034c475024725a90472b

          SHA1

          8ff7a828dcaa0e7acc9cca46f36fb560e999bdda

          SHA256

          fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3

          SHA512

          c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a

        • memory/676-112-0x0000000002CA0000-0x0000000002CCD000-memory.dmp

          Filesize

          180KB

        • memory/676-86-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-90-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-94-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-92-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-98-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-96-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-100-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-101-0x0000000007360000-0x00000000073A0000-memory.dmp

          Filesize

          256KB

        • memory/676-103-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-105-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-107-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-109-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-110-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/676-88-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-113-0x0000000000400000-0x0000000002B9B000-memory.dmp

          Filesize

          39.6MB

        • memory/676-84-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-82-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-81-0x0000000004690000-0x00000000046A3000-memory.dmp

          Filesize

          76KB

        • memory/676-80-0x0000000004690000-0x00000000046A8000-memory.dmp

          Filesize

          96KB

        • memory/676-79-0x00000000030B0000-0x00000000030CA000-memory.dmp

          Filesize

          104KB

        • memory/676-78-0x0000000002CA0000-0x0000000002CCD000-memory.dmp

          Filesize

          180KB

        • memory/1628-125-0x0000000004A60000-0x0000000004A9A000-memory.dmp

          Filesize

          232KB

        • memory/1628-142-0x0000000000290000-0x00000000002D6000-memory.dmp

          Filesize

          280KB

        • memory/1628-126-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-129-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-127-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-131-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-135-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-133-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-137-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-139-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-145-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-124-0x0000000004A20000-0x0000000004A5C000-memory.dmp

          Filesize

          240KB

        • memory/1628-141-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-144-0x00000000049D0000-0x0000000004A10000-memory.dmp

          Filesize

          256KB

        • memory/1628-147-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-149-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-157-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-159-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-155-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-153-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-151-0x0000000004A60000-0x0000000004A95000-memory.dmp

          Filesize

          212KB

        • memory/1628-920-0x00000000049D0000-0x0000000004A10000-memory.dmp

          Filesize

          256KB

        • memory/1628-923-0x00000000049D0000-0x0000000004A10000-memory.dmp

          Filesize

          256KB